Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments

Authors

  • Seema Kumari Independent Researcher, India Author
  • Sahil Dhir Independent Researcher Author

Keywords:

Cloud transformation, data migration, AI cybersecurity

Abstract

The rapid adoption of cloud computing in recent years has driven enterprises to embark on cloud transformation journeys, seeking enhanced scalability, flexibility, and cost-efficiency. However, the migration of critical data to cloud environments poses significant challenges, especially in ensuring robust cybersecurity during the transformation process. The increasing complexity of cloud infrastructures and the diverse range of vulnerabilities that emerge during cloud migration have amplified the need for more advanced and automated security measures. Artificial Intelligence (AI) has emerged as a pivotal enabler in this context, offering advanced capabilities to secure data migration and optimize cloud operations. This research paper explores the application of AI-driven solutions for enhancing cybersecurity during cloud transformation, with a particular focus on securing data migration, detecting anomalies, and optimizing cloud operations in Agile environments.

Downloads

Download data is not yet available.

References

R. Buyya, C. S. Yeo, and S. Venugopal, "Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities," Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC), 2008, pp. 5-13.

P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Gaithersburg, MD, USA, NIST Special Publication 800-145, 2011.

A. R. Alhassan and M. A. Abu-Nimeh, "Cybersecurity challenges in cloud computing: A review," International Journal of Computer Applications, vol. 975, no. 8887, pp. 1-6, 2016.

T. H. H. Tran, H. A. Le, and P. A. Le, "A comprehensive survey of security in cloud computing," Journal of Network and Computer Applications, vol. 106, pp. 96-113, 2018.

A. M. B. Abed, D. Alashwal, and M. D. Ali, "Data migration strategies in cloud computing: A systematic literature review," International Journal of Cloud Computing and Services Science, vol. 9, no. 1, pp. 1-10, 2020.

P. K. Gupta, S. S. Gupta, and N. Gupta, "Cloud computing: Security issues and challenges," International Journal of Computer Applications, vol. 101, no. 3, pp. 12-18, 2014.

S. Rajab and S. Khanna, "A survey of AI-based cybersecurity systems," IEEE Access, vol. 8, pp. 22091-22110, 2020.

F. B. Bastani, R. Shahrani and H. R. Fard, "AI in cybersecurity: A review," International Journal of Information Security, vol. 18, no. 3, pp. 233-245, 2019.

J. S. M. Al-Jabri, K. N. Al-Mansoori, and A. H. M. Al-Tamimi, "Towards an intelligent cloud security model using machine learning," Proceedings of the 2019 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2019, pp. 7-12.

S. Lee, "Anomaly detection in cloud computing systems," Journal of Network and Computer Applications, vol. 83, pp. 40-48, 2017.

H. Chen, S. Zhao, Y. Li, and C. Wei, "Machine learning-based intrusion detection for cloud computing," IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 143-158, 2018.

Y. Guo, H. Liu, and C. Zhang, "A survey on cloud computing security issues and challenges," International Journal of Computer Applications, vol. 67, no. 21, pp. 36-42, 2013.

Z. Rahman, "Security and privacy issues in cloud computing: A survey," International Journal of Cloud Computing and Services Science, vol. 6, no. 3, pp. 197-204, 2017.

P. Sarathi, "AI-driven cloud security: A comprehensive survey," Computers & Security, vol. 85, pp. 212-228, 2019.

A. Shabazz, "Cloud computing: Security issues and challenges," Future Generation Computer Systems, vol. 28, no. 6, pp. 1049-1060, 2012.

Y. Zhu, "A survey of deep learning techniques for cybersecurity," IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 3, pp. 736-748, 2020.

S. Sarfraz, "An intelligent approach to cloud security: Using machine learning techniques," IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 56-69, 2019.

M. Alfalahi, "Cloud migration security challenges and solutions," International Journal of Cloud Computing and Services Science, vol. 8, no. 2, pp. 39-46, 2019.

Y. Chen, "Resource allocation in cloud computing: A survey," IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 85-111, 2016.

H. M. Alameri, "AI-based solutions for data protection in cloud computing," IEEE Access, vol. 8, pp. 23445-23458, 2020.

Downloads

Published

08-10-2020

How to Cite

[1]
S. Kumari and S. Dhir, “Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments”, J. Sci. Tech., vol. 1, no. 1, pp. 791–808, Oct. 2020, Accessed: Oct. 29, 2025. [Online]. Available: https://thesciencebrigade.org/jst/article/view/426

Most read articles by the same author(s)