IT PROJECT RISK MANAGEMENT FOR CLOUD ENVIRONMENT LEVERAGING ARTIFICIAL INTELLIGENCE
Keywords:Artificial Intelligence, Cloud Security, Risk Management, Risk Mitigation Strategies, Proactive Risk Prediction
Cloud security contributes to multiple risk parameters like multitenancy, Insecure interfaces/APIs, Malicious Insiders, Malware injections, the lack of information on location of storage of data, the unavailability of details on type of data saved in the same server, hacking. AI or Artificial Intelligence works on pre-collected data and scenarios fed into the computers thereby predicting in advance the possibilities of risk, warning if there is any unusual occurrence in the cloud and proposing the Risk Mitigation plans based on various scenarios. Proactive risk prediction will have a huge impact on risk mitigation, cost saving as well as customer satisfaction. A pilot study has been conducted to ascertain the impact of various risk factors identified by circulating the questionnaire among practitioners from the relevant domains. The questionnaire is circulated among the current industry practitioners and experts in this area and facilitates to conduct the pilot survey on the significance of various risk parameter. The impact of each risk factor is identified and is subjected to analysis. With the help of prediction algorithms, the possibility of occurrence of risk, the impact, and consequences of that particular event, as well as the mitigation strategies could be foretold. This objective of this paper is to propose management perspective of a framework of AI, that can contribute to proactive risk management in cloud. This paper deals only with the management overview of implementation of AI in risk mitigation strategies and not the technical aspects of AI. The futuristic scope of this paper would be a management overview on automation of risk mitigation strategies in cloud platform using AI.
Akinrolabu, O., Nurse, J. R. C., Martin, A., and New, S. (2019). Cyber Risk Assessment In Cloud Provider Environments: Current Models And Future Needs, Computers And Security, 87, 101600. https://doi.org/10.1016/j.cose.2019.101600.
Aljahdali, H., Albatli, A., Garraghan, P., Townend, P., Lau, L., and Xu, J. (2014). Multi-Tenancy in Cloud Computing 8th International Symposium on Service Oriented System Engineering, 2014. IEEE Publications. https://doi.org/10.1109/SOSE.2014.50.
Chandra, D. G., and Borah, M. D. (2012). Cost Benefit Analysis of Cloud Computing in Education International Conference on Computing, Communication and Applications, 2012, 1-6. https://doi.org/10.1109/ICCCA.2012.6179142.
Chonka, A., Xiang, Y., Zhou, W., and Bonti, A. (2011). Cloud Security Defence To Protect Cloud Computing Against HTTP-Dos and XML-Dos Attacks. Journal of Network and Computer Applications, 34(4), 1097-1107. https://doi.org/10.1016/j.jnca.2010.06.004.
Choudhary Kishor, N., and Rayalwar Arvind, P. (2011). Opportunities and Challenges for Rural Women Entrepreneurship in India. Variorum Multi-Disciplinary E-Research Journal, 01(III, February).
Gheyas, I. A., and Abdallah, A. E. (2016). Detection and Prediction of Insider Threats to Cyber Security : A Systematic Literature Review and Meta-Analysis. Big Data Analytics, 1(1), 6. https://doi.org/10.1186/s41044-016-0006-0.
Hoyle, R. H. (Ed.). (1995). Structural Equation Modeling : Concepts, Issues, and Applications. Sage Publications, Inc.
Jansen, W. A. (2011). Cloud Hooks: Security and Privacy Issues in Cloud Computing 44th Hawaii International Conference on System Sciences, 2011. https://doi.org/10.1109/HICSS.2011.103.
Kaufman, L. M. (2009). Data Security In the World of Cloud Computing. IEEE Security and Privacy Magazine, 7(4), 61-64. https://doi.org/10.1109/MSP.2009.87.
Khorshed, M. T., Ali, A. B. M. S., And Wasimi, S. A. (2012). A Survey on Gaps, Threat Remediation Challenges and Some Thoughts for Proactive Attack Detection in Cloud Computing. Future Generation Computer Systems, 28(6), 833-851. https://doi.org/10.1016/j.future.2012.01.006.
Maccallum, R. C., and Austin, J. T. (2000). Applications of Structural Equation Modeling In Psychological Research. Annual Review of Psychology, 51, 201-226. https://doi.org/10.1146/annurev.psych.51.1.201.
Mao, B., Jiang, H., Wu, S., Fu, Y., and Tian, L. (2012). SAR : SSD Assisted Restore Optimization for Deduplication- Based Storage Systems in the Cloud IEEE Seventh International Conference on Networking, Architecture, and Storage, 2012, 328-337. https://doi.org/10.1109/NAS.2012.48.
Mauch, V., Kunze, M., and Hillenbrand, M. (2013). High Performance Cloud Computing. Future Generation Computer Systems, 29(6), 1408-1416, ISSN 0167-739X. https://doi.org/10.1016/j.future.2012.03.011.
Minsky, M. (1961). Steps Toward Artificial Intelligence. In Proceedings of The IRE, 49(1), 8-30. https://doi.org/10.1109/JRPROC.1961.287775.
Mishra, G., and Kiran, U. V. (2014). Rural Women Entrepreneurs : Concerns and Importance. International Journal of Science and Research (IJSR), 3, 93-98.
Mollah, M. B., Islam, K. R., and Islam, S. S. (2012). Next Generation of Computing Through Cloud Computing Technology. In 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), 1-6. https://doi.org/10.1109/CCECE.2012.6334973.
Nair, R., and Dr Meenakumari, J. (2021). Conceptual Model Depicting Risk Factors Influenzing Cloud Data Security. International Journal of Research -Granthaalayah, 9(8), 100-108. https://doi.org/10.29121/granthaalayah.v9.i8.2021.4160.
Priyadarshinee, P., Raut, R. D., Jha, M. K., and Gardas, B. B. (2017). Understanding and Predicting the Determinants of Cloud Computing Adoption : A Two Staged Hybrid SEM - Neural Networks Approach. Computers in Human Behavior, 76, 341-362. https://doi.org/10.1016/j.chb.2017.07.027.
Rao, R. V., and Selvamani, K. (2015). Data Security Challenges and its Solutions In Cloud Computing. Procedia Computer Science, 48, 204-209. https://doi.org/10.1016/j.procs.2015.04.171.
Rigdon, E. E. (1998). Structural Equation Modeling. In G. A. Marcoulides (Ed.), Modern Methods for Business Research, 251-294. Lawrence Erlbaum Associates Publishers.
Shucheng, Y., Wang, C., Ren, K., and Lou, W. (2010). Achieving Secure, Scalable and Fine-Grained Data Access Control in Cloud Computing. In IN-FOCOM, 2010. Proceedings of The IEEE, 1-9. https://doi.org/10.1109/INFCOM.2010.5462174.
Subashini, S., and Kavitha, V. (2011). A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1), 1-11. https://doi.org/10.1016/j.jnca.2010.07.006.
Turing, A. M. (1950). I- Computing Machinery and Intelligence. Mind, LIX(236, October), 433-460. https://doi.org/10.1093/mind/LIX.236.433.
Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M. (2008). A Break in the Clouds: Towards A Cloud Definition. In ACM Sigcomm Computer Communication Review, 39(1), 50-55. https://doi.org/10.1145/1496091.1496100.
Weinman, J. (2017). Fogonomics-The Strategic, Ecsonomic, and Financial Aspects of the Cloud 41st Annual Computer Software and Applications Conference (COMPSAC), 2017, 705-705. IEEE Publications. https://doi.org/10.1109/COMPSAC.2017.283.
Xu, G., Li, H., Ren, H., Yang, K., and Deng, R. H. (2019). Data Security Issues in Deep Learning : Attacks, Countermeasures, and Opportunities. In IEEE Communications Magazine, 57(11), 116-122. https://doi.org/10.1109/MCOM.001.1900091.
Zhang, X., Wuwong, N., Li, H., and Zhang, X. (2010). Information Security Risk Management Framework for the Cloud Computing Environments 10th IEEE International Conference on Computer and Information Technology, 2010, 1328-1334. https://doi.org/10.1109/CIT.2010.501.
Zissis, D., and Lekkas, D. (2012). Addressing Cloud Computing Security Issues. Future Generation Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future.2010.12.006.
How to Cite
Copyright (c) 2022 Remya Nair, Dr. J. Meenakumari
This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.