CFP last date
20 December 2024
Reseach Article

Beyond Encryption: A Multidimensional approach to Data Security in Cloud Computing and the Impact of AI/ML

by Vamsi Krishna Thatikonda
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 28
Year of Publication: 2023
Authors: Vamsi Krishna Thatikonda
10.5120/ijca2023923032

Vamsi Krishna Thatikonda . Beyond Encryption: A Multidimensional approach to Data Security in Cloud Computing and the Impact of AI/ML. International Journal of Computer Applications. 185, 28 ( Aug 2023), 31-33. DOI=10.5120/ijca2023923032

@article{ 10.5120/ijca2023923032,
author = { Vamsi Krishna Thatikonda },
title = { Beyond Encryption: A Multidimensional approach to Data Security in Cloud Computing and the Impact of AI/ML },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 28 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 31-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number28/32870-2023923032/ },
doi = { 10.5120/ijca2023923032 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:18.447871+05:30
%A Vamsi Krishna Thatikonda
%T Beyond Encryption: A Multidimensional approach to Data Security in Cloud Computing and the Impact of AI/ML
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 28
%P 31-33
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing, a significant digital entity, enables many enterprises to access flexible and adjustable resources. The growing reliance on cloud technologies calls for stronger data protection measures, marking a pivotal challenge. This paper investigates the importance of data security in the cloud computing landscape, emphasizing its significance in maintaining trust and facilitating operations in this digital era. It explores various technical and administrative hurdles including the necessity for encryption, potential data breaches, and compliance with data protection regulations, presenting possible solutions and leading methodologies. The paper further explores how emergent trends such as artificial intelligence (AI) and machine learning (ML) are transforming strategies to identify and mitigate threats, in addition to ongoing research in this domain. The final consideration is imperative for businesses and cloud service providers to stay vigilant and adaptable in the rapidly evolving cybersecurity landscape, focusing on continuous advancements and progress in cloud computing data security to safeguard the digital future.

References
  1. I. A. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. Ullah Khan, "The rise of 'Big data' on cloud computing: Review and open research issues," Information Systems, vol. 47, pp. 98–115, 2015. doi: 10.1016/j.is.2014.07.006.
  2. M. K. Gourisaria, A. Samanta, A. Saha, S. S. Patra, and P. M. Khilar, "An extensive review on cloud computing," Advances in Intelligent Systems and Computing, pp. 53–78, 2020. doi: 10.1007/978-981-15-1097-7_6.
  3. IBM, "Cost of a data breach report 2022 - IBM," 2022. [Online]. Available: https://www.ibm.com/downloads/cas/3R8N1DZJ. [Accessed: Jun. 25, 2023].
  4. P. M. Mell and T. Grance, "The NIST definition of cloud computing," 2011. doi: 10.6028/nist.sp.800-145.
  5. IBM, "What is Data Security? data security definition and overview," 2023. [Online]. Available: https://www.ibm.com/topics/data-security. [Accessed: Jun. 25, 2023].
  6. F. Skopik, G. Settanni, and R. Fiedler, "A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing," Computers & Security, vol. 60, pp. 154–76, 2016. doi: 10.1016/j.cose.2016.04.003
  7. S. Khan, I. Kabanov, Y. Hua, and S. Madnick, "A systematic analysis of the Capital One Data Breach: Critical Lessons Learned," ACM Transactions on Privacy and Security, vol. 26, no. 1, pp. 1–29, 2022. doi: 10.1145/3546068.
  8. The Guardian, "Adobe warns 2.9 million customers of data breach after cyber-attack," Guardian News and Media, 2013. [Online]. Available: https://www.theguardian.com/technology/2013/oct/03/adobe-hacking-data-breach-cyber-attack. [Accessed: Jun. 25, 2023].
  9. IBM, "Cost of a data breach report 2020 - IBM," 2020. [Online]. Available: https://www.ibm.com/security/digital-assets/cost-data-breach-report/1Cost%20of%20a%20Data%20Breach%20Report%202020.pdf. [Accessed: Jun. 25, 2023]
  10. FPF, "Comparing privacy laws: GDPR v. CCPA - Future of Privacy Forum," 2018. [Online]. Available: https://fpf.org/wp-content/uploads/2018/11/GDPR_CCPA_Comparison-Guide.pdf. [Accessed: Jun. 25, 2023]
  11. M. Almorsy, J. Grundy, and I. Müller, "An Analysis of the Cloud Computing Security Problem," 2016. doi: 10.48550/arXiv.1609.01107
  12. Stackscale, “Main Cloud Service models: Iaas, paas and SAAS,” Stackscale, https://www.stackscale.com/blog/cloud-service-models/ (accessed Jul. 31, 2023).
  13. S. M. Kerner, “34 cybersecurity statistics to lose sleep over in 2023,” WhatIs.com, https://www.techtarget.com/whatis/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020 (accessed Jul. 31, 2023)
  14. A. Petrosyan, “Global average cost of a data breach by industry 2022,” Statista, https://www.statista.com/statistics/387861/cost-data-breach-by-industry/ (accessed Jul. 31, 2023)
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Security Cybersecurity Data Breaches Encryption Data Protection Laws Artificial Intelligence Machine Learning