Machine Learning-Enhanced Security for Multi-Cloud Oracle Database Deployments

Authors

  • Raghu Murthy Shankeshi Sr. MTS, Oracle America Inc., Virginia, USA Author

DOI:

https://doi.org/10.55662/JST.2024.5301

Abstract

Multi-cloud Oracle Database deployments based on machine learning-enhanced security represents a sophisticated approach to reduce the emerging cyber threats at the same time assuring data integrity, confidentiality, and availability. The rapid adaptation of multi cloud strategies in organisation to optimise performance and scalability, complexity of securing Oracle Database instances across heterogeneous cloud environments increases. Traditional security mechanisms are not able to adapt to the dynamic nature of cloud infrastructure. This problem makes it necessary to integrate machine learning-driven threat detection, anomaly identification, and adaptive access control. This research paper aims to explore the application of advanced machine learning models which includes supervised, unsupervised, and reinforcement learning techniques, which is used to detect malicious activities, optimize database security configurations, and enhance compliance with regulatory frameworks.

Downloads

Download data is not yet available.

References

M. Qayyum, M. Usama, M. A. Qadir, and A. Al-Fuqaha, "Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security," IEEE Access, vol. 8, pp. 86942-86957, 2020. DOI: https://doi.org/10.3389/fdata.2020.587139

M. A. Beyer and D. Laney, "The Importance of 'Big Data': A Definition," Gartner Research, 2012.

S. Zawoad and R. Hasan, "Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems," arXiv preprint arXiv:1302.6312, 2013.

J. Dean and S. Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters," Communications of the ACM, vol. 51, no. 1, pp. 107-113, 2008. DOI: https://doi.org/10.1145/1327452.1327492

P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, 2011. DOI: https://doi.org/10.6028/NIST.SP.800-145

M. Armbrust et al., "A View of Cloud Computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010. DOI: https://doi.org/10.1145/1721654.1721672

D. Agrawal, S. Das, and A. El Abbadi, "Big Data and Cloud Computing: Current State and Future Opportunities," in Proceedings of the 14th International Conference on Extending Database Technology, 2011, pp. 530-533. DOI: https://doi.org/10.1145/1951365.1951432

K. Hwang and D. Li, "Trusted Cloud Computing with Secure Resources and Data Coloring," IEEE Internet Computing, vol. 14, no. 5, pp. 14-22, 2010. DOI: https://doi.org/10.1109/MIC.2010.86

S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011. DOI: https://doi.org/10.1016/j.jnca.2010.07.006

C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing," The Journal of Supercomputing, vol. 63, no. 2, pp. 561-592, 2013. DOI: https://doi.org/10.1007/s11227-012-0831-5

W. A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing," in Proceedings of the 44th Hawaii International Conference on System Sciences, 2011, pp. 1-10. DOI: https://doi.org/10.1109/HICSS.2011.103

S. Pearson and A. Benameur, "Privacy, Security and Trust Issues Arising from Cloud Computing," in Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, 2010, pp. 693-702. DOI: https://doi.org/10.1109/CloudCom.2010.66

C. Cachin, I. Keidar, and A. Shraer, "Trusting the Cloud," ACM SIGACT News, vol. 40, no. 2, pp. 81-86, 2009. DOI: https://doi.org/10.1145/1556154.1556173

R. Buyya, C. S. Yeo, and S. Venugopal, "Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities," in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008, pp. 5-13. DOI: https://doi.org/10.1109/HPCC.2008.172

L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A Break in the Clouds: Towards a Cloud Definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, 2008. DOI: https://doi.org/10.1145/1496091.1496100

S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud Computing—The Business Perspective," Decision Support Systems, vol. 51, no. 1, pp. 176-189, 2011. DOI: https://doi.org/10.1016/j.dss.2010.12.006

G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall, "Cloud Computing," IBM White Paper, 2007.

Downloads

Published

12-06-2024

How to Cite

[1]
R. Murthy Shankeshi, “Machine Learning-Enhanced Security for Multi-Cloud Oracle Database Deployments ”, J. Sci. Tech., vol. 5, no. 3, pp. 90–132, Jun. 2024, doi: 10.55662/JST.2024.5301.