Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published July 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Security for Cloud-Native Systems with an AI-Ops Engine

  • 1. Department of Computer Science and Engineering, College: RV College of Engineering, Chikmagalur (Karnataka), India.
  • 2. Department of Computer Science and Engineering, RVCE, College: RV College of Engineering, Bengaluru (Karnataka), India. Email: krishnappahk@rvce.edu.in
  • 3. Founder and Director, Neridio System, Bengaluru (Karnataka), India.

Contributors

Contact person:

  • 1. Department of Computer Science and Engineering, College: RV College of Engineering, Chikmagalur (Karnataka), India.

Description

Abstract: Cybersecurity is referred to the process, technologies and practices for protection of devices, networks, data from damage and unauthorized access. Cybersecurity has always been important because military, government, financial and corporate organizations collect, store and process enormous amounts of data on computers and on the other devices. As the older threats are eradicated, newer threats are being added to the system by the adversaries. This project is aimed to provide a secure communication between a server and a client. Many cryptographic libraries are available for this purpose but many libraries do not have adequate documentation. Now a days it is necessary to monitor and regulate the data security systems for controlling unauthorized access and many of the attacks. Intelligent Vault is a cyber security tool to protect and monitor the available data. In the way of 360-degree security in automation, surveillance, Storage Intrusion Threat Intelligence and Real-Time Response through its Intelligent Vault. It sync’s the data from the proxy systems. The data processing will be performed in R-client and R-server using Nervio-Guard package. Telemetry validation and Real time processing of Advance SecOps will be processed in Intelligent Vault

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

B71010711222.pdf

Files (526.9 kB)

Name Size Download all
md5:d8746baf244d68448b8575a72421fdaf
526.9 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

References

  • Tufail, S., Parvez, I., Batool, S., & Sarwat, A. (2021). A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies, 14(18), 1–22.
  • Aslan, Ö., Ozkan-Okay, M., & Gupta, D. (2021). A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges. European Journal of Engineering and Technology Research, 6(3), 1–8.
  • Sen, J. (2018). Security and privacy issues in cloud computing. Architectures and Protocols for Secure Information Technology Infrastructures, iv, 1–45.
  • Liang, J., Qin, Z., Xue, L., Lin, X., & Shen, X. (2021). Verifiable and Secure SVM Classification for Cloud-based Health Monitoring Services. IEEE Internet of Things Journal, 4662(c), 1–14.
  • Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access, 9(Ml), 94318–94337.
  • Zhang, D., Feng, G., Shi, Y., & Srinivasan, D. (2021). Physical Safety and Cyber Security Analysis of Multi-Agent Systems: A Survey of Recent Advances. IEEE/CAA Journal of Automatica Sinica, 8(2), 319–333.
  • Gordin, A. Graur, A. Potorac and D. Balan, "Security assessment of OpenStack cloud using outside and inside software tools," 2018 International Conference on Development and Application Systems (DAS), 2018, pp. 170-174, doi: 10.1109/DAAS.2018.8396091.
  • X. Sun, "Critical Security Issues in Cloud Computing: A Survey," 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2018, pp. 216-221, doi: 10.1109/BDS/HPSC/IDS18.2018.00053.
  • Arora, A. Khanna, A. Rastogi and A. Agarwal, "Cloud security ecosystem for data security and privacy," 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, 2017, pp. 288-292, doi: 10.1109/CONFLUENCE.2017.7943164.
  • Shabbir, M., Shabbir, A., Iwendi, C., Javed, A. R., Rizwan, M., Herencsar, N., & Lin, J. C.-W. (2021). Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing. IEEE Access, 1–1. doi:10.1109/access.2021.3049564.

Subjects

ISSN: 2277-3878 (Online)
https://portal.issn.org/resource/ISSN/2277-3878
Retrieval Number: 100.1/ijrte.B71010711222
https://www.ijrte.org/portfolio-item/b71010711222/
Journal Website: www.ijrte.org
https://www.ijrte.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/