IT PROJECT RISK MANAGEMENT FOR CLOUD ENVIRONMENT LEVERAGING ARTIFICIAL INTELLIGENCE

Authors

  • Remya Nair Research Scholar, Registered with University of Mysore, International School of Management Excellence (ISME), Bangalore, India
  • Dr. J. Meenakumari Research Supervisor, International School of Management Excellence (ISME), Bangalore, India

DOI:

https://doi.org/10.29121/granthaalayah.v10.i12.2022.4940

Keywords:

Artificial Intelligence, Cloud Security, Risk Management, Risk Mitigation Strategies, Proactive Risk Prediction

Abstract [English]

Cloud security contributes to multiple risk parameters like multitenancy, Insecure interfaces/APIs, Malicious Insiders, Malware injections, the lack of information on location of storage of data, the unavailability of details on type of data saved in the same server, hacking. AI or Artificial Intelligence works on pre-collected data and scenarios fed into the computers thereby predicting in advance the possibilities of risk, warning if there is any unusual occurrence in the cloud and proposing the Risk Mitigation plans based on various scenarios. Proactive risk prediction will have a huge impact on risk mitigation, cost saving as well as customer satisfaction. A pilot study has been conducted to ascertain the impact of various risk factors identified by circulating the questionnaire among practitioners from the relevant domains. The questionnaire is circulated among the current industry practitioners and experts in this area and facilitates to conduct the pilot survey on the significance of various risk parameter. The impact of each risk factor is identified and is subjected to analysis. With the help of prediction algorithms, the possibility of occurrence of risk, the impact, and consequences of that particular event, as well as the mitigation strategies could be foretold. This objective of this paper is to propose management perspective of a framework of AI, that can contribute to proactive risk management in cloud. This paper deals only with the management overview of implementation of AI in risk mitigation strategies and not the technical aspects of AI. The futuristic scope of this paper would be a management overview on automation of risk mitigation strategies in cloud platform using AI.

Downloads

Download data is not yet available.

References

Akinrolabu, O., Nurse, J. R. C., Martin, A., and New, S. (2019). Cyber Risk Assessment In Cloud Provider Environments: Current Models And Future Needs, Computers And Security, 87, 101600. https://doi.org/10.1016/j.cose.2019.101600. DOI: https://doi.org/10.1016/j.cose.2019.101600

Aljahdali, H., Albatli, A., Garraghan, P., Townend, P., Lau, L., and Xu, J. (2014). Multi-Tenancy in Cloud Computing 8th International Symposium on Service Oriented System Engineering, 2014. IEEE Publications. https://doi.org/10.1109/SOSE.2014.50. DOI: https://doi.org/10.1109/SOSE.2014.50

Chandra, D. G., and Borah, M. D. (2012). Cost Benefit Analysis of Cloud Computing in Education International Conference on Computing, Communication and Applications, 2012, 1-6. https://doi.org/10.1109/ICCCA.2012.6179142. DOI: https://doi.org/10.1109/ICCCA.2012.6179142

Chonka, A., Xiang, Y., Zhou, W., and Bonti, A. (2011). Cloud Security Defence To Protect Cloud Computing Against HTTP-Dos and XML-Dos Attacks. Journal of Network and Computer Applications, 34(4), 1097-1107. https://doi.org/10.1016/j.jnca.2010.06.004. DOI: https://doi.org/10.1016/j.jnca.2010.06.004

Choudhary Kishor, N., and Rayalwar Arvind, P. (2011). Opportunities and Challenges for Rural Women Entrepreneurship in India. Variorum Multi-Disciplinary E-Research Journal, 01(III, February).

Gheyas, I. A., and Abdallah, A. E. (2016). Detection and Prediction of Insider Threats to Cyber Security : A Systematic Literature Review and Meta-Analysis. Big Data Analytics, 1(1), 6. https://doi.org/10.1186/s41044-016-0006-0. DOI: https://doi.org/10.1186/s41044-016-0006-0

Hoyle, R. H. (Ed.). (1995). Structural Equation Modeling : Concepts, Issues, and Applications. Sage Publications, Inc.

Jansen, W. A. (2011). Cloud Hooks: Security and Privacy Issues in Cloud Computing 44th Hawaii International Conference on System Sciences, 2011. https://doi.org/10.1109/HICSS.2011.103. DOI: https://doi.org/10.1109/HICSS.2011.103

Kaufman, L. M. (2009). Data Security In the World of Cloud Computing. IEEE Security and Privacy Magazine, 7(4), 61-64. https://doi.org/10.1109/MSP.2009.87. DOI: https://doi.org/10.1109/MSP.2009.87

Khorshed, M. T., Ali, A. B. M. S., And Wasimi, S. A. (2012). A Survey on Gaps, Threat Remediation Challenges and Some Thoughts for Proactive Attack Detection in Cloud Computing. Future Generation Computer Systems, 28(6), 833-851. https://doi.org/10.1016/j.future.2012.01.006. DOI: https://doi.org/10.1016/j.future.2012.01.006

Maccallum, R. C., and Austin, J. T. (2000). Applications of Structural Equation Modeling In Psychological Research. Annual Review of Psychology, 51, 201-226. https://doi.org/10.1146/annurev.psych.51.1.201. DOI: https://doi.org/10.1146/annurev.psych.51.1.201

Mao, B., Jiang, H., Wu, S., Fu, Y., and Tian, L. (2012). SAR : SSD Assisted Restore Optimization for Deduplication- Based Storage Systems in the Cloud IEEE Seventh International Conference on Networking, Architecture, and Storage, 2012, 328-337. https://doi.org/10.1109/NAS.2012.48. DOI: https://doi.org/10.1109/NAS.2012.48

Mauch, V., Kunze, M., and Hillenbrand, M. (2013). High Performance Cloud Computing. Future Generation Computer Systems, 29(6), 1408-1416, ISSN 0167-739X. https://doi.org/10.1016/j.future.2012.03.011. DOI: https://doi.org/10.1016/j.future.2012.03.011

Minsky, M. (1961). Steps Toward Artificial Intelligence. In Proceedings of The IRE, 49(1), 8-30. https://doi.org/10.1109/JRPROC.1961.287775. DOI: https://doi.org/10.1109/JRPROC.1961.287775

Mishra, G., and Kiran, U. V. (2014). Rural Women Entrepreneurs : Concerns and Importance. International Journal of Science and Research (IJSR), 3, 93-98.

Mollah, M. B., Islam, K. R., and Islam, S. S. (2012). Next Generation of Computing Through Cloud Computing Technology. In 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), 1-6. https://doi.org/10.1109/CCECE.2012.6334973. DOI: https://doi.org/10.1109/CCECE.2012.6334973

Nair, R., and Dr Meenakumari, J. (2021). Conceptual Model Depicting Risk Factors Influenzing Cloud Data Security. International Journal of Research -Granthaalayah, 9(8), 100-108. https://doi.org/10.29121/granthaalayah.v9.i8.2021.4160. DOI: https://doi.org/10.29121/granthaalayah.v9.i8.2021.4160

Priyadarshinee, P., Raut, R. D., Jha, M. K., and Gardas, B. B. (2017). Understanding and Predicting the Determinants of Cloud Computing Adoption : A Two Staged Hybrid SEM - Neural Networks Approach. Computers in Human Behavior, 76, 341-362. https://doi.org/10.1016/j.chb.2017.07.027. DOI: https://doi.org/10.1016/j.chb.2017.07.027

Rao, R. V., and Selvamani, K. (2015). Data Security Challenges and its Solutions In Cloud Computing. Procedia Computer Science, 48, 204-209. https://doi.org/10.1016/j.procs.2015.04.171. DOI: https://doi.org/10.1016/j.procs.2015.04.171

Rigdon, E. E. (1998). Structural Equation Modeling. In G. A. Marcoulides (Ed.), Modern Methods for Business Research, 251-294. Lawrence Erlbaum Associates Publishers.

Shucheng, Y., Wang, C., Ren, K., and Lou, W. (2010). Achieving Secure, Scalable and Fine-Grained Data Access Control in Cloud Computing. In IN-FOCOM, 2010. Proceedings of The IEEE, 1-9. https://doi.org/10.1109/INFCOM.2010.5462174. DOI: https://doi.org/10.1109/INFCOM.2010.5462174

Subashini, S., and Kavitha, V. (2011). A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1), 1-11. https://doi.org/10.1016/j.jnca.2010.07.006. DOI: https://doi.org/10.1016/j.jnca.2010.07.006

Turing, A. M. (1950). I- Computing Machinery and Intelligence. Mind, LIX(236, October), 433-460. https://doi.org/10.1093/mind/LIX.236.433. DOI: https://doi.org/10.1093/mind/LIX.236.433

Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M. (2008). A Break in the Clouds: Towards A Cloud Definition. In ACM Sigcomm Computer Communication Review, 39(1), 50-55. https://doi.org/10.1145/1496091.1496100. DOI: https://doi.org/10.1145/1496091.1496100

Weinman, J. (2017). Fogonomics-The Strategic, Ecsonomic, and Financial Aspects of the Cloud 41st Annual Computer Software and Applications Conference (COMPSAC), 2017, 705-705. IEEE Publications. https://doi.org/10.1109/COMPSAC.2017.283. DOI: https://doi.org/10.1109/COMPSAC.2017.283

Xu, G., Li, H., Ren, H., Yang, K., and Deng, R. H. (2019). Data Security Issues in Deep Learning : Attacks, Countermeasures, and Opportunities. In IEEE Communications Magazine, 57(11), 116-122. https://doi.org/10.1109/MCOM.001.1900091. DOI: https://doi.org/10.1109/MCOM.001.1900091

Zhang, X., Wuwong, N., Li, H., and Zhang, X. (2010). Information Security Risk Management Framework for the Cloud Computing Environments 10th IEEE International Conference on Computer and Information Technology, 2010, 1328-1334. https://doi.org/10.1109/CIT.2010.501. DOI: https://doi.org/10.1109/CIT.2010.501

Zissis, D., and Lekkas, D. (2012). Addressing Cloud Computing Security Issues. Future Generation Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future.2010.12.006. DOI: https://doi.org/10.1016/j.future.2010.12.006

Downloads

Published

2022-12-31

How to Cite

Nair, R., & Meenakumari, J. (2022). IT PROJECT RISK MANAGEMENT FOR CLOUD ENVIRONMENT LEVERAGING ARTIFICIAL INTELLIGENCE. International Journal of Research -GRANTHAALAYAH, 10(12), 55–68. https://doi.org/10.29121/granthaalayah.v10.i12.2022.4940