Monitor Cloud Performance and Data Safety With Artificial Intelligence

Monitor Cloud Performance and Data Safety With Artificial Intelligence

DOI: 10.4018/978-1-6684-7348-1.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Artificial intelligence (AI) techniques, particularly those in machine learning (ML), have been successfully applied in various areas, leading to widespread belief that AI will collectively play an important role in future wireless communications. Risks associated with the utilisation of cloud components during service delivery can be mitigated through the implementation of safety measures. Protection and efficiency are the two pillars upon which the security and scalability of cloud computing rest. AI is the study of algorithmic enhancements to the real world. The issues and worries associated with utilising one or more AI algorithms in the cloud are outlined, including supervised, unregulated, semi-controlled, and enhanced cloud safety issues. In the future framework, cutting-edge algorithms usher in a new era of cloud data security. Specifically, it is the aim of improving cloud security and privacy. Computers with AI are particularly keen on voice recognition technology, ML systems, decision-planning systems, and problem-solving systems.
Chapter Preview
Top

Introduction

Massive amounts of dynamic data, including as semi-structured and unstructured data, must be processed, maintained, exchanged, and analysed in a secure manner in order to recognise patterns and trends. Improve health care while simultaneously making the country safer and developing alternate energy sources (Hiran & Doshi, 2013; Ramasamy et al., 2020). The exceedingly sensitive nature of the programmes necessitates ensuring the security of the clouds. The most serious security vulnerability of cloud computing is that the owner of the storage cannot monitor where the information is located. This is because, even if you choose not to take advantage of the benefits of cloud computing, you may still use cloud planning and resource distribution. As a result, we must protect the security of records even when our systems are inefficient (Choubisa et al., 2022).

Cloud storage poses a variety of security problems since it necessitates more modern technology. Networks, servers, web browsers, application development, infrastructure planning, information retrieval, memory management, and storage location tracking are all examples of this. With all of these varied ideas and techniques, cloud computing provides its own set of distinct data security issues (Peprah et al., 2020). For example, the network that connects the numerous devices that comprise a cloud must be secure. Furthermore, the virtualization strategy utilised in cloud computing contributes to a variety of security issues. Our technology and a fundamental principle for constructing a secure grid were used on a reliable server. To ensure that cloud computing is risk-free, a secure virtual machinery layer, an encrypted cloud layer, a data storage layer, and a private web special network layer have all been built. Cloud computing refers not only to the applications that Internet service providers make available in the datacenters where these services are stored, but also to the hardware and software that comprise these systems (Hiran, 2021; Hiran and Doshi, 2014). The NIST defines four basic architectural types for cloud distribution, each of which is determined by the type of cloud provider. Firms will either use a single model or a combination of several different models to create efficient and ideal apps and commercial services.

The following are the four models of distribution:

  • A private cloud is a type of cloud computing dedicated to a single organisation and managed by that organisation or a third party. These facilities can be accessed outside of the main building (Mahrishi et al., 2021a, 2021b).

  • Cloud infrastructure, also known as cloud data, is information that is stored in the cloud and distributed to users via cloud-based services, such as those provided by a cloud provider.

  • The collaborative cloud is a cloud ecosystem in which different businesses employ cloud resources to serve a common audience. These facilities are located off-site and are either maintained by the corporation or provided by a third party. The government cloud, colloquially known as the G-cloud, was a subset of the group cloud. One or more organisations provide this type of cloud computing services to the vast majority, if not all, public bodies (service provider role).

  • A hybrid cloud is one that is built by integrating several cloud architectures. A hybrid cloud is data that is stored in a cloud service connection committee but is subsequently used by a cloud computing programme (Hiran & Henten, 2020; Lakhwani et al., 2020).

Complete Chapter List

Search this Book:
Reset