"The Evolution of Cyber Security: AI and Cloud Technologies Take the Lead"

Authors

  • Yogesh Jaiswal Chamariya

Keywords:

Cybersecurity, Artificial Intelligence (AI), Cloud Computing, Threat Detection, Security Automation.

Abstract

The landscape of cybersecurity has evolved significantly over the past few decades. From traditional antivirus and firewall protection to the integration of advanced artificial intelligence (AI) and cloud technologies, the field of cybersecurity is undergoing a radical transformation. Cloud technologies provide scalability, flexibility, and global reach, while AI is enhancing threat detection, response, and prevention. This paper explores the evolution of cybersecurity, focusing on how AI and cloud technologies are becoming central to modern security solutions. It discusses the benefits, challenges, and future implications of this evolution, with a particular emphasis on the growing intersection of AI and cloud-based security systems.

Downloads

Download data is not yet available.

References

M. Shafiq, P. K. K. R. T. J., & A. H. G. (2021). Cloud Computing and Cybersecurity: A Comprehensive Review. Journal of Cyber Security Technology, 1(3), 12–35.

A. Shamsuddin, M. K. K. (2020). Artificial Intelligence for Cybersecurity: A Survey. International Journal of Computer Applications, 180(5), 25–31.

G. Z. Z. S. J. (2019). Machine Learning Techniques for Cybersecurity. IEEE Transactions on Network and Service Management, 6(3), 22–37.

S. K. V. R. M. (2019). Cybersecurity and Artificial Intelligence: Trends and Challenges. Journal of Cyber Security, 15(2), 14–29.

P. N. S. M. (2021). AI and Cloud Technologies in Security: Review and Implications. Journal of Cloud Computing: Advances, Systems and Applications, 8(4), 125–139.

Y. S. N. T. A. (2020). Cloud Computing Security Issues and Challenges: A Survey. International Journal of Cloud Computing and Services Science, 4(2), 101–115.

B. H. M. (2020). Detecting and Preventing Security Threats in Cloud Computing Using AI-Based Techniques. Cybersecurity 7(2), 101–115.

B. G. G. T. (2018). Applying Artificial Intelligence in Cloud Security. IEEE Cloud Computing, 5(3), 22–29.

L. H. R. S. (2019). The Role of Cloud Computing in Cybersecurity: Trends and Future Directions. Computers & Security, 82, 73–88.

F. Z. W. M. (2020). Artificial Intelligence in Cloud Security: Challenges and Future Prospects. Information Systems Frontiers, 22(4), 755–769.

N. H. A. P. (2020). An Overview of AI-Powered Security Solutions. Cloud Computing Journal, 5(2), 45–53.

L. G. Z. B. (2020). The Impact of Cloud Computing on Cybersecurity Solutions. International Journal of Computer Science and Network Security, 18(3), 220–227.

D. W. A. H. (2021). AI-based Detection Systems for Cyber Threats. Cybersecurity Engineering Journal, 29(1), 12–25.

E. J. L. S. (2019). Artificial Intelligence and Cloud Technologies for Cybersecurity Automation. Journal of Network and Systems Management, 27(2), 324–342.

C. M. F. J. (2020). AI-based Anomaly Detection in Network Traffic for Cloud Security. International Journal of Network Security, 22(6), 789–801.

R. H. G. K. (2021). Predictive Security Analysis Using Machine Learning in Cloud Environments. Journal of Cloud Security, 4(2), 68–84.

J. M. A. P. (2020). Leveraging Cloud Security Tools with AI for Threat Management. Journal of Cloud Computing and Applications, 9(4), 99–115.

A. P. M. D. (2019). Cloud Security and Artificial Intelligence: Prospects and Challenges. Cyber Defense Review, 10(5), 15–30.

M. M. P. R. (2019). A Comparative Review of Cybersecurity Tools for Cloud Infrastructure. International Journal of Cybersecurity, 19(7), 1023–1041.

H. S. V. W. (2020). Enhancing Cloud Security with AI and Machine Learning. Computational Intelligence in Cybersecurity, 25(3), 15–32.

Downloads

Published

14.05.2022

How to Cite

Yogesh Jaiswal Chamariya. (2022). "The Evolution of Cyber Security: AI and Cloud Technologies Take the Lead". International Journal of Intelligent Systems and Applications in Engineering, 10(2), 337 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7497

Issue

Section

Research Article