AI-Driven Security Mechanisms In IOT Cloud Solutions

Authors

DOI:

https://doi.org/10.22105/siot.v1i4.137

Keywords:

Cloud security, Artificial intelligence, Machine learning, Advanced persistent threats

Abstract

Artificial Intelligence (AI)-driven cloud security has emerged as a revolutionary approach to tackle the increasing complexity of cyber threats within cloud computing. This research investigates the incorporation of AI and Machine Learning (ML) methods to improve the capabilities of cloud-based security solutions in terms of threat detection, prevention, and response. The paper highlights the primary factors contributing to the adoption of AI-driven cloud security, such as the rapid growth of cloud-based data and applications, the rising occurrence of advanced persistent threats, and the necessity for real-time, adaptive security measures. It analyzes how AI and ML algorithms can process extensive volumes of security-related data, detect anomalies, and recognize new threats with higher precision and speed compared to traditional security methods. The study also examines the different capabilities of AI-driven security. Additionally, it looks into the challenges that come with the deployment of AI-enhanced cloud security. The study's findings offer significant knowledge for cloud service providers, security experts, and decision-makers aiming to harness AI and ML to bolster their cloud security initiatives. The Internet of Things (IoTs) has become a focal point of interest. It encompasses the connectivity of numerous devices and their integration with humans. IoTs necessitates a cloud computing framework to manage its data exchange and processing, while at the same time, it relies on AI to evaluate the data housed in cloud infrastructure and make prompt and accurate intelligent decisions. These interconnected IoTs devices utilize unique identifiers and embedded sensors within each device to communicate with one another and share information using the internet and cloud-based network infrastructure. We exist in the age of big data, where the need for applying AI/ML has become essential for the swift and precise processing and analysis of the gathered cloud-based big data. Nevertheless, despite the growing influence of AI in enhancing traditional cybersecurity measures, both cloud vulnerabilities and the networking of IoTs devices remain significant risks. In addition to the security challenges associated with cloud and IoTs devices, hackers are also leveraging AI, which continues to pose a threat to the cybersecurity landscape.

References

Parida, B. R., Rath, A. K., & Mohapatra, H. (2022). Binary self-adaptive salp swarm optimization-based dynamic load balancing in cloud computing. International journal of information technology and web engineering (IJITWE), 17(1), 1–25. https://doi.org/10.4018/IJITWE.295964

Parida, B. R., Rath, A. K., Pati, B., Panigrahi, C. R., Mohapatra, H., & Buyya, R. (2023). Energy efficient virtual machine placement in dynamic cloud milieu using a hybrid metaheuristic technique. Computación y sistemas, 27(4), 1147–1155. https://doi.org/10.13053/cys-27-4-4640

Amajuoyi, C., Nwobodo, L., & Adegbola, M. (2024). Transforming business scalability and operational flexibility with advanced cloud computing technologies. Computer science & it research journal, 5, 1469–1487. https://doi.org/10.51594/csitrj.v5i6.1248

Ahmed, W. (2024). Trends and challenges in securing cloud computing environments: An overview of current techniques. Premier journal of computer science. https://doi.org/10.70389/PJCS.100004

Abdel-Wahid, T. (2024). AI-powered cloud security: A study on the integration of artificial intelligence and machine learning for improved threat detection and prevention. International journal of information technology and electrical engineering, 13(3), 11–19. https://www.researchgate.net/publication/383095008

Gilbert, C., & Gilbert, M. (2024). AI-driven threat detection in the internet of things (IoT), exploring opportunities and vulnerabilities. International journal of research publication and reviews, 5(11), 219–236. https://www.researchgate.net/publication/385505597

Albshaier, L., Budokhi, A., & Aljughaiman, A. (2024). A Review of security issues when integrating IoT with cloud computing and blockchain. IEEE access, 1. http://dx.doi.org/10.1109/ACCESS.2024.3435845

Zewdie, T. G., & Girma, A. (2020). IoT security and the role of ai/ml to combat emerging cyber threats in cloud computing environment. Issues in information systems, 21(4), 253–263. http://dx.doi.org/10.48009/4_iis_2020_253-263

Harris, L. (2024). Using machine learning to detect and prevent cloud data breaches. B2n.ir/x03530

Goswami, M. (2024). AI-based anomaly detection for real-time cybersecurity. International journal of research and review techniques, 3(1), 45-53. https://www.researchgate.net/publication/381044167

Sharma, H. (2024). The role of artificial intelligence and machine learning in strengthening cloud security: A comprehensive review and analysis. IJARCCE, 13. https://doi.org/10.17148/IJARCCE.2024.13808

Bhardwaj, A., & Kaushik, K. (2022). Predictive analytics-based cybersecurity framework for cloud infrastructure. International journal of cloud applications and computing, 12, 1–20. https://doi.org/10.4018/IJCAC.297106

Pathak, M., Mishra, K. N., & Singh, S. P. (2024). Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard. Artificial intelligence review, 57(10), 269. https://doi.org/10.1007/s10462-024-10908-x

Published

2024-12-09

How to Cite

Prachi *, P. . (2024). AI-Driven Security Mechanisms In IOT Cloud Solutions. Smart Internet of Things, 1(4), 260-264. https://doi.org/10.22105/siot.v1i4.137