IMPROVING CLOUD SECURITY VIA AI-DRIVEN CLOUD INFRASTRUCTURE AUTOMATION AND HUMAN-AI COLLABORATION IN IAM

Authors

  • Kiran Kumar Suram Massachusetts Mutual Life Insurance Company, USA Author

Keywords:

Human-AI Collaboration In Cloud Security, AI-Driven Identity, Access Management (IAM), Cloud Infrastructure Automation, Security Threat Detection, Prevention, Adaptive Access Control Systems

Abstract

This article investigates the integration of Artificial Intelligence (AI) and human collaboration in enhancing cloud security, with particular emphasis on Identity and Access Management (IAM) and infrastructure automation. The article examines how AI-driven systems reshape cloud security operations through advanced threat detection, dynamic access privilege management, and automated vulnerability analysis while maintaining crucial human oversight and decision-making capabilities. The article evaluated the effectiveness of human-AI collaborative frameworks across multiple dimensions, including security optimization, regulatory compliance, and operational efficiency. The article findings demonstrate significant improvements in security metrics, including a reduction in threat detection time, continuous compliance achievement, and substantial enhancements in operational efficiency. The article reveals that the successful integration of AI capabilities with human expertise creates a more robust and adaptive security environment than either component alone. Key challenges in implementation are identified and developed practical solutions through structured training programs and systematic integration approaches. The article also provides insights into future research directions, particularly in areas of quantum computing applications and privacy-preserving AI techniques. The article findings contribute to the growing body of knowledge on human-AI collaboration in cloud security and offer practical guidelines for organizations seeking to enhance their security posture through integrated AI-human security frameworks.

References

Cloud Security Alliance, "The Current State of Cloud Data Security" CSA Research, 2023. [Online] Available: https://cloudsecurityalliance.org/blog/2023/11/02/the-current-state-of-cloud-data-security

Möller, Dietmar PF. "NIST cybersecurity framework and MITRE cybersecurity criteria." Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices. Cham: Springer Nature Switzerland, 2023. 231-271. [Online] Available: https://link.springer.com/chapter/10.1007/978-3-031-26845-8_5

Gartner, "Market Guide for AI Trust, Risk and Security Management" Gartner Research, 2024. [Online] Available: https://www.gartner.com/en/documents/4022879

Ramirez, Robert, and Nazli Choucri. "Improving interdisciplinary communication with standardized cyber security terminology: a literature review." IEEE Access 4 (2016): 2216-2243. [Online] Available: https://ieeexplore.ieee.org/abstract/document/7437356/

Chauhan, M.; Shiaeles, S. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network 2023, 3, 422-450.[Online] Available: https://doi.org/10.3390/network3030018

Zhang, Min-Hua, and Jianyu Wei. "Human-AI Collaboration Frameworks in Cloud Computing for Enhanced Productivity." Asian American Research Letters Journal 1.2 (2024). [Online] Available: https://aarlj.com/index.php/AARLJ/article/view/35

Mimecast, “Top 10 Cybersecurity Metrics and KPIs”. [Online] Available: https://www.mimecast.com/blog/top-10-cybersecurity-metrics-and-kpis/

Cloud Native Computing Foundation, "The state of security in cloud native development 2024" CNCF Research Publications, 2024. [Online] Available: https://www.cncf.io/blog/2024/09/26/the-state-of-security-in-cloud-native-development-2024/

Downloads

Published

2024-12-26

How to Cite

Kiran Kumar Suram. (2024). IMPROVING CLOUD SECURITY VIA AI-DRIVEN CLOUD INFRASTRUCTURE AUTOMATION AND HUMAN-AI COLLABORATION IN IAM. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY (IJCET), 15(6), 1734-1742. https://mylib.in/index.php/IJCET/article/view/IJCET_15_06_148