0% found this document useful (0 votes)
62 views8 pages

Final

Uploaded by

komlikataru01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views8 pages

Final

Uploaded by

komlikataru01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

PVG’s college of Science and Commerce, Pune – 09

presentation on
“Improving Cloud Security with Artificial Intelligence”
by
Komlika Taru
Samruddhi Khopade
Department of Computer Science
2024-25
Topic Name

Improving Cloud Security with Artificial


Intelligence
INTRODUCTION

Cloud computing has transformed how organizations manage data


and applications, offering flexibility, scalability, and cost-efficiency.
However, it also poses significant security challenges like data
breaches, identity and access management (IAM) issues, and
regulatory compliance. Traditional measures often fail to address
these risks in the dynamic cloud environment. This report presents
a secure cloud architecture integrating best practices and advanced
technologies to mitigate threats and enhance overall security.
LITERATURE REVIEW

The review highlights critical security challenges in cloud


environments, including data protection, IAM complexities, and
multi-cloud security management. Data breaches, such as the
Capital One incident, underscore the importance of robust IAM
solutions like Identity-as-a-Service (IDaaS). The increasing use of
multi-cloud strategies introduces further complexities, requiring
unified security solutions for effective protection of sensitive data.
PROBLEM IDENTIFICATION

Traditional security measures are inadequate for cloud


environments, struggling with vulnerabilities like unauthorized
access and data breaches. Managing security across different cloud
providers is challenging due to inconsistent policies. Additionally,
continuous monitoring and compliance demand real-time threat
detection and adaptive measures to meet evolving regulatory
requirements.
METHODOLOGY

A mixed-methods approach was used, incorporating literature


reviews, case studies, and surveys/interviews with IT
professionals. This approach aims to develop a secure cloud
architecture framework emphasizing holistic integration,
compliance management, and AI-driven tools for real-time threat
detection and mitigation.
RESULT AND CONCLUSION

Secure cloud architecture enables organizations to harness cloud


computing benefits while safeguarding sensitive data. A
comprehensive framework, incorporating advanced technologies
and best practices, mitigates risks and adapts to emerging threats.
Future research should evaluate these frameworks empirically
across various organizational contexts for broader applicability.
REFERENCES
1. Ahmadi, S. (2024). Zero Trust
Architecture in Cloud Networks:
Application, Challenges, and Future
Opportunities.

2. Gudimetla, S. R. (2024). Data


Encryption in Cloud Storage.

3. Khan, K. (2013). Identity and Access


Management in Cloud Environments:
Security Challenges and Solutions.

4. Najana, M. (2024). Compliance and


Regulatory Challenges in Cloud
Computing: A Sector-Wise Analysis.

5. Paul, A. L. (2024). Security


Challenges and Solutions in Multi-
Cloud Environments.

You might also like