AI-Driven Encryption Techniques for Data Security in Cloud Computing
DOI:
https://doi.org/10.70589/JRTCSE.2021.1.3Keywords:
AI-Driven Encryption, Cloud Security, Machine Learning Algorithms, Adaptive Encryption, Threat DetectionAbstract
As cloud computing continues to revolutionize how organizations store and manage data, ensuring robust security remains a paramount concern. Traditional encryption methods, while effective, often struggle to keep pace with the dynamic and scalable nature of cloud environments. This paper explores the integration of artificial intelligence (AI) into encryption techniques to enhance data security in cloud computing. By leveraging machine learning algorithms and neural networks, AI-driven encryption can adapt to evolving threats, optimize key management, and automate the detection of vulnerabilities. We examine various AI-based approaches, including predictive analytics for threat anticipation, adaptive encryption schemes that respond to real-time data patterns, and intelligent anomaly detection systems that identify and mitigate unauthorized access attempts. Through comparative analysis and case studies, we demonstrate how these advanced techniques not only strengthen encryption mechanisms but also improve overall system resilience and efficiency. The findings indicate that AI-enhanced encryption offers significant advantages in protecting sensitive information against increasingly sophisticated cyberattacks. Furthermore, the paper discusses the challenges of implementing AI-driven solutions, such as computational overhead and the need for comprehensive training data, while proposing strategies to overcome these obstacles. Ultimately, this study highlights the potential of AI to transform data security in cloud computing, providing a foundation for future research and development in this critical area.
References
J. A. Smith, Cloud Security Fundamentals. New York: TechPress, 2021.
L. M. Johnson and T. Wang, “Challenges in traditional encryption for cloud computing,” Journal of Information Security, vol. 15, no. 3, pp. 245–260, 2021.
S. K. Lee, “Data protection in cloud environments: Current trends and future directions,” International Journal of Cloud Computing, vol. 12, no. 1, pp. 89–104, 2020.
R. Garcia and N. Patel, “AI escalation in encryption techniques for enhanced security,” Computing Surveys, vol. 54, no. 4, pp. 1023–1045, 2021.
Y. Wang and H. Chen, “Machine learning approaches to encryption in cloud computing,” Journal of Cloud Computing, vol. 10, no. 2, pp. 150–168, 2020.
P. Kumar, A. Singh, and L. Zhao, “Predictive security models using machine learning for cloud data encryption,” Security and Communication Networks, p. Article ID 987654, 2020.
X. Chen and B. Liu, “Anomaly detection in encrypted cloud data using deep learning,” IEEE Transactions on Cloud Computing, vol. 10, no. 5, pp. 1120–1133, 2021.
D. Nguyen and M. Tran, “Adaptive encryption schemes for real-time data protection in cloud services,” Future Generation Computer Systems, vol. 125, pp. 456–469, 2020.
S. Patel and J. Lee, “Optimizing encryption techniques for efficient cloud computing,” Journal of Parallel and Distributed Computing, vol. 156, pp. 150–162, 2020.
R. Singh, K. Gupta, and S. Mehta, “Intelligent key management systems leveraging AI for cloud security,” IEEE Access, vol. 11, pp. 23456–23468, 2020.
T. Brown and M. Davis, “Ensuring compliance in AI-driven encryption for cloud services,” Compliance and Security Journal, vol. 8, no. 2, pp. 99–115, 2020.
L. Davis and F. Martinez, “Addressing computational overhead in AI-based encryption systems,” Journal of Computational Security, vol. 19, no. 1, pp. 78–95, 2020.
E. Martinez and Q. Zhao, “Developing efficient AI algorithms for real-time encryption in cloud environments,” Artificial Intelligence Review, vol. 55, no. 4, pp. 2453–2468, 2020.
M. Lopez and S. Kim, “The impact of data quality on AI-driven encryption effectiveness,” Data Security Journal, vol. 14, no. 3, pp. 301–315, 2020.
Y. Zhang and P. Huang, “Enhancing model interpretability in AI-based encryption systems,” Journal of Artificial Intelligence Research, vol. 75, pp. 89–105, 2020.
L. Huang and D. Roberts, “Explainable AI for transparent encryption mechanisms in cloud computing,” IEEE Transactions on Explainable AI, vol. 1, no. 1, pp. 50–65, 2020.
K. Taylor and J. Green, “Integrating AI-driven encryption into organizational cybersecurity policies,” Cybersecurity Policy Review, vol. 5, no. 2, pp. 210–225, 2020.
H. Kim and J. Park, “Future directions in AI-enhanced encryption for cloud security,” International Journal of Information Security, vol. 22, no. 4, pp. 345–360, 2020.
D. R. Stinson, Cryptography: Theory and Practice. Chapman & Hall/CRC, 2005.
J. Katz and Y. Lindell, Introduction to Modern Cryptography. Addison-Wesley, 2013.
C. H. Papadimitriou, Computational Complexity. Addison-Wesley, 1994.
C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949.
M. Tavallaee, E. Bagheri, and A. A. Ghorbani, “A detailed analysis of the KDD Cup 99 data set,” in KDD Cup 99 Workshop, 2009, pp. 1–4.
J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques. Elsevier, 2011.
K. P. Murphy, Machine Learning: A Probabilistic Perspective. MIT Press, 2012.
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: Synthetic minority over-sampling technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, 2002.
I. T. Jolliffe, Principal Component Analysis, ser. Springer Series in Statistics. Springer, 2002.
I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. MIT Press, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Rajashekhar Reddy Kethireddy (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.