Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments

Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments

Authors

  • Seema Kumari Independent Researcher, India

Downloads

Keywords:

Cloud transformation, data migration, AI cybersecurity

Abstract

The rapid adoption of cloud computing in recent years has driven enterprises to embark on cloud transformation journeys, seeking enhanced scalability, flexibility, and cost-efficiency. However, the migration of critical data to cloud environments poses significant challenges, especially in ensuring robust cybersecurity during the transformation process. The increasing complexity of cloud infrastructures and the diverse range of vulnerabilities that emerge during cloud migration have amplified the need for more advanced and automated security measures. Artificial Intelligence (AI) has emerged as a pivotal enabler in this context, offering advanced capabilities to secure data migration and optimize cloud operations. This research paper explores the application of AI-driven solutions for enhancing cybersecurity during cloud transformation, with a particular focus on securing data migration, detecting anomalies, and optimizing cloud operations in Agile environments.

Downloads

Download data is not yet available.

References

R. Buyya, C. S. Yeo, and S. Venugopal, "Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities," Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC), 2008, pp. 5-13.

P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Gaithersburg, MD, USA, NIST Special Publication 800-145, 2011.

A. R. Alhassan and M. A. Abu-Nimeh, "Cybersecurity challenges in cloud computing: A review," International Journal of Computer Applications, vol. 975, no. 8887, pp. 1-6, 2016.

T. H. H. Tran, H. A. Le, and P. A. Le, "A comprehensive survey of security in cloud computing," Journal of Network and Computer Applications, vol. 106, pp. 96-113, 2018.

A. M. B. Abed, D. Alashwal, and M. D. Ali, "Data migration strategies in cloud computing: A systematic literature review," International Journal of Cloud Computing and Services Science, vol. 9, no. 1, pp. 1-10, 2020.

P. K. Gupta, S. S. Gupta, and N. Gupta, "Cloud computing: Security issues and challenges," International Journal of Computer Applications, vol. 101, no. 3, pp. 12-18, 2014.

S. Rajab and S. Khanna, "A survey of AI-based cybersecurity systems," IEEE Access, vol. 8, pp. 22091-22110, 2020.

F. B. Bastani, R. Shahrani and H. R. Fard, "AI in cybersecurity: A review," International Journal of Information Security, vol. 18, no. 3, pp. 233-245, 2019.

J. S. M. Al-Jabri, K. N. Al-Mansoori, and A. H. M. Al-Tamimi, "Towards an intelligent cloud security model using machine learning," Proceedings of the 2019 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2019, pp. 7-12.

S. Lee, "Anomaly detection in cloud computing systems," Journal of Network and Computer Applications, vol. 83, pp. 40-48, 2017.

H. Chen, S. Zhao, Y. Li, and C. Wei, "Machine learning-based intrusion detection for cloud computing," IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 143-158, 2018.

Y. Guo, H. Liu, and C. Zhang, "A survey on cloud computing security issues and challenges," International Journal of Computer Applications, vol. 67, no. 21, pp. 36-42, 2013.

Z. Rahman, "Security and privacy issues in cloud computing: A survey," International Journal of Cloud Computing and Services Science, vol. 6, no. 3, pp. 197-204, 2017.

P. Sarathi, "AI-driven cloud security: A comprehensive survey," Computers & Security, vol. 85, pp. 212-228, 2019.

A. Shabazz, "Cloud computing: Security issues and challenges," Future Generation Computer Systems, vol. 28, no. 6, pp. 1049-1060, 2012.

Y. Zhu, "A survey of deep learning techniques for cybersecurity," IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 3, pp. 736-748, 2020.

S. Sarfraz, "An intelligent approach to cloud security: Using machine learning techniques," IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 56-69, 2019.

M. Alfalahi, "Cloud migration security challenges and solutions," International Journal of Cloud Computing and Services Science, vol. 8, no. 2, pp. 39-46, 2019.

Y. Chen, "Resource allocation in cloud computing: A survey," IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 85-111, 2016.

H. M. Alameri, "AI-based solutions for data protection in cloud computing," IEEE Access, vol. 8, pp. 23445-23458, 2020.

Downloads

Published

08-10-2020

How to Cite

Kumari, S. “Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments”. Journal of Science & Technology, vol. 1, no. 1, Oct. 2020, pp. 791-08, https://thesciencebrigade.com/jst/article/view/426.
PlumX Metrics

Plaudit

License Terms

Ownership and Licensing:

Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.

License Permissions:

Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.

Additional Distribution Arrangements:

Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.

Online Posting:

Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.

Responsibility and Liability:

Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.

Loading...