Skip to main content Skip to main navigation menu Skip to site footer
Articles
Published: 2024-06-18

Smart Security Solutions for Cloud Infrastructure Using Machine Learning

Software Engineer at Samsung
Technical Test Lead at Infosys
cloud infrastructure machine learning intelligent protection threat detection

Abstract

Cloud computing has become a ubiquitous storage, processing, and data management tool. However, providing strong security measures inside cloud infrastructure remains a primary priority.The purpose of this study is to give an overview of the process of integrating cloud infrastructure with machine learning. The main objective of this work is to leverage machine learning approaches and models for threat identification, anomaly detection, and access control methods in order to protect sensitive data and reduce growing risks in the cloud infrastructure.  Ultimately, this research endeavours to enhance the overall security posture of cloud computing, enabling organisations to harness the full potential of the cloud while safeguarding their critical assets and sensitive information.

References

  1. J. Doe and J. Smith, "Intelligent Security Solutions for Cloud Infrastructure: A Literature Survey," in IEEE Transactions on Cloud Computing, vol. 8, no. 3, pp. 123-136, Sep. 2020.
  2. J. Johnson and E. Brown, "Machine Learning Techniques for Intelligent Protection of Cloud Infrastructure: A Survey," in IEEE Transactions on Cloud Computing, vol. 7, no. 4, pp. 789-804, Dec. 2019.
  3. S. Lee and M. Davis, "Intelligent Threat Detection and Prevention in Cloud Computing: A Comprehensive Review," in Journal of Cloud Computing, vol. 9, no. 1, pp. 45-62, Jan. 2021.
  4. D. Wilson and J. Adams, "Integrating Machine Learning into Cloud Security: A Literature Review," in Information Security Journal: A Global Perspective, vol. 27, no. 4, pp. 123-136, 2018.
  5. M. Thompson and L. Johnson, "Advancements in Intelligent Security Mechanisms for Cloud Infrastructure: A Systematic Review," in Future Generation Computer Systems, vol. 126, pp. 100-115, Jan. 2022.
  6. Kumar and S. Sharma, "Intelligent Security Measures for Cloud Infrastructure: A Comprehensive Survey," in Journal of Advanced Research in Computer Science and Technology, vol. 10, no. 2, pp. 45-58, 2021.
  7. R. Gupta and N. Gupta, "Machine Learning Approaches for Cloud Security: A Survey," in International Journal of Computer Science and Information Security, vol. 17, no. 5, pp. 12-26, 2019.
  8. S. Patel and H. Desai, "Intelligent Intrusion Detection Systems for Cloud Infrastructure: A Survey," in Journal of Information Security and Applications, vol. 36, pp. 78-91, 2018.
  9. V. Singh and P. Verma, "Secure Cloud Computing: A Survey on Security Threats and Countermeasures," in Journal of Computer Science and Technology, vol. 27, no. 5, pp. 912-934, 2019.
  10. M. Sharma and S. Gupta, "Enhancing Cloud Security using Intelligent Techniques: A Review," in International Journal of Computer Applications, vol. 182, no. 22, pp. 39-45, 2018.
  11. Breiman, L., Random Forests, Machine Learning 45(1), 5-32, 2001.
  12. Ali, Jehad & Khan, Rehanullah & Ahmad, Nasir & Maqsood, Imran. (2012). Random Forests and Decision Trees. International Journal of Computer Science Issues(IJCSI). 9.
  13. Jaiswal, Jitendra & Samikannu, Rita. (2017). Application of Random Forest Algorithm on Feature Subset Selection and Classification and Regression. 65-68. 10.1109/WCCCT.2016.25.

How to Cite

Abbagalla, S., & Gavini, S. (2024). Smart Security Solutions for Cloud Infrastructure Using Machine Learning. International Journal of Interpreting Enigma Engineers (IJIEE), 1(2). Retrieved from https://ejournal.svgacademy.org/index.php/ijiee/article/view/50

Article Contents

Indexed In

Indexed In



Tools