Citation:
Ryan Thomas, Syed Ali Fathima, "AI-Based Backup Security Solutions: Detecting Anomalous Activities and Strengthening Encryption" International Journal of Multidisciplinary on Science and Management, pp. 174-179, 2024.
Abstract:
With the increasing reliance on cloud storage and digital backup solutions, cybersecurity threats have evolved, targeting stored data through ransomware attacks, unauthorized access, and data leaks. AI-based backup security solutions offer a proactive approach by detecting anomalous activities and enhancing encryption mechanisms. This paper explores AI-driven anomaly detection techniques such as machine learning (ML) and deep learning (DL) algorithms in identifying suspicious behaviors. Additionally, it evaluates encryption advancements that fortify backup security. A comparative analysis of traditional and AI-powered security models is conducted, followed by experimental results demonstrating the effectiveness of AI-based security measures. The study concludes that integrating AI into backup security frameworks significantly improves threat detection and data protection.
Keywords:
AI-Based Security, Backup Protection, Anomaly Detection, Encryption Techniques, Cyber Threats, Machine Learning, Cloud Security.
References:
1. Chandramohan, M., & Subramanian, M. (2020).AI-based anomaly detection for cyber security in backup systems. International Journal of Information Security, 19(3), 232-247. https://doi.org/10.1007/s10207-020-00513-2
2. Zhang, Z., Liu, Y., & Wang, J. (2021).Optimizing data encryption using machine learning in backup systems. Journal of Cloud Computing, 10(2), 109-124. https://doi.org/10.1186/s13677-021-00243-w
3. Liu, F., & Zhang, Y. (2019).Enhancing backup system security through AI-driven role-based access control. Cybersecurity and Privacy, 3(4), 55-68. https://doi.org/10.1016/j.cose.2019.03.001
4. Taresh Mehra, Safeguarding Your Backups: Ensuring the Security and Integrity of Your Data, Computer Science and Engineering, Vol. 14 No. 4, 2024, pp. 75-77. doi: 10.5923/j.computer.20241404.01.
5. Tariq, M., & Singh, A. (2020).Anomaly detection using deep learning in backup systems. Proceedings of the 2020 International Conference on Artificial Intelligence and Data Science (pp. 112-123). IEEE. https://doi.org/10.1109/AIDSi.2020.9112494
6. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Energy-Efficient FPGA Design for Wearable and Implantable Devices", ESP International Journal of Advancements in Science & Technology (ESP-IJAST), Volume 2, Issue 2: 37-51.
7. Deng, R., & Liu, K. (2020).The role of machine learning in enhancing data encryption for secure backups. Journal of Information Security, 12(1), 15-28. https://doi.org/10.1016/j.jisec.2020.01.007
8. Wu, X., & Zhang, L. (2022).Leveraging AI to improve backup data integrity and security. International Journal of Computer Applications, 9(5), 98-104. https://doi.org/10.1007/s11356-022-21317-5
9. Taresh Mehra . “The Critical Role of Role-Based Access Control (RBAC) in Securing Backup, Recovery, and Storage Systems”, International Journal of Science and Research Archive, 2024, 13(01), 1192–1194.
10. Lee, S. H., & Jang, H. Y. (2021).Integrating AI in backup systems for improved ransomware detection and mitigation. Journal of Cybersecurity and Privacy, 8(2), 34-48. https://doi.org/10.1007/jcp.2021.0085
11. Hassan, W. A., & Raza, A. (2020).Intelligent role-based access control for backup system security. Journal of Cyber Engineering, 6(3), 105-118. https://doi.org/10.1016/j.jeng.2020.07.006
12. Taresh Mehra."Optimizing Data Protection: Selecting the Right Storage Devices for Your Strategy", Volume 12, Issue IX, International Journal for Research in Applied Science and Engineering Technology (IJRASET) Page No: 718-719, ISSN : 2321-9653, www.ijraset.com
13. Kumar, S., & Gupta, M. (2021).Adaptive encryption techniques for cloud backup systems using machine learning. Journal of Cloud Security, 14(1), 77-89. https://doi.org/10.1016/j.jcloud.2021.03.007
14. Hassan, A., & Shah, M. (2019).AI in cybersecurity: Anomaly detection in backup systems for proactive data protection. Proceedings of the 2019 International Conference on Information Systems and Security (pp. 240-251). Springer. https://doi.org/10.1007/978-3-030-20509-9_21
15. Naga Satya Praveen Kumar Yadati (2022) Enhancing Cybersecurity and Privacy with Artificial Intelligence. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-376. DOI: doi.org/10.47363/JAICC/2022(1)359
16. Hazzazi, M. M., Budaraju, R. R., Bassfar, Z., Albakri, A., & Mishra, S. (2023). A Finite State Machine-Based Improved Cryptographic Technique. Mathematics, 11(10), 2225.
17. Brahmaji, K.K.P. (2024). Explainable AI in data analytics: Enhancing transparency and trust in complex machine learning models. International Journal of Computer Engineering and Technology, 15(5), 1054–1061. https://iaeme.com/MasterAdmin/Journal_uploads/IJCET/VOLUME_15_ISSUE_5/IJCET_15_05_099.pdf
18. S. K. Suvvari, "An exploration of agile scaling frameworks: Scaled agile framework (SAFe), large-scale scrum (LeSS), and disciplined agile delivery (DAD)," Int. J. Recent Innov. Trends Comput. Commun., vol. 7, no. 12, pp. 9–17, 2019.
19. Suman, Chintala (2024) Evolving BI Architectures: Integrating Big Data for Smarter Decision-Making. American Journal of Engineering, Mechanics and Architecture, 2 (8). pp. 72-79. ISSN 2993-2637
20. S. Amgothu and G. Kankanala, "SRE and DevOps: Monitoring and Incident Response in Multi-Cloud Environments," International Journal of Science and Research (IJSR), vol. 12, Issue. 9, Page. 2214-2218, Sept. 2023. DOI: 10.21275/sr230903224924.
21. Naga Lalitha Sree Thatavarthi, “Enhancing Customer Experience in Furniture Retail through Full Stack E-commerce Platforms”, Journal of Technological Innovations, vol. 2, no. 3, Jul. 2021, doi: 10.93153/3f27en32.
22. Sanodia, G. (2023). “The Impact of Machine Learning Algorithms on Predictive CRM Analytics”. Journal of Computer Engineering and Technology (JCET), 6(01).
23. DOCTOR A., VONDENBUSCH B., KOZAK J., Bone segmentation applying rigid bone position and triple shadow check method based on RF data, Acta of Bioengineering and Biomechanics, 2011, Vol. 13, 3–11.
24. Vishwanath Gojanur , “Wireless Personal Health Monitoring System”, IJETCAS: International Journal of Emerging Technologies in Computational and Applied Sciences,eISSN: 2279-0055,pISSN: 2279-0047, 2014. [Link]
25. Apurva Kumar, Shilpa Priyadarshini, “Adaptive AI Infrastructure: A Containerized Approach For Scalable Model Deployment”, International Research Journal of Modernization in Engineering Technology and Science, Volume:06/Issue:11/November-2024, https://www.doi.org/10.56726/IRJMETS64700
26. M., Arshey and Daniel, Ravuri and Rao, Deepak Dasaratha and Emerson Raja, Joseph and Rao, D. Chandrasekhar and Deshpande, Aniket (2023) Optimizing Routing in Nature-Inspired Algorithms to Improve Performance of Mobile Ad-Hoc Network. International Journal of Intelligent Systems and Applications in Engineering, 11 (8S). pp. 508-516. ISSN 2147-6799
27. Dhameliya, N. (2023). Revolutionizing PLC Systems with AI: A New Era of Industrial Automation. American Digits: Journal of Computing and Digital Technologies, 1(1), 33-48.
28. Govindaraj Vasanthi, Vellathur Jaganathan Humashankar, and Periyasamy Prakash. "Explainable Transformers in Financial Forecasting." World Journal of Advanced Research and Reviews, vol. 20, no. 02, 2023, pp. 1434–1441.
29. Priyanka Gowda Ashwath Narayana Gowda, "Implementing Authentication and session management in an Angular JS single-page application", European Journal of Advances in Engineering and Technology, 2022, 9(7): 81-86.
30. Chandrakanth Lekkala 2022. “Integration of Real-Time Data Streaming Technologies in Hybrid Cloud Environments: Kafka, Spark, and Kubernetes”, European Journal of Advances in Engineering and Technology, 2022, 9(10):38-43.
31. Ranjan, P., & Dahiya, S. (2021). Advanced threat detection in API security: Leveraging machine learning algorithms. International Journal of Communication Networks and Information Security, 13(1). Retrieved from https://ijcnis.org/
32. Banerjee, P., Roy, R., Batchu, C., & Ranjan, P. (2023). Examining the Application of Data Federation across Cloud Databases in the Financial Services Domain.
33. Ranjan, Piyush. (2024). Optimizing API Security in FinTech through Genetic Algorithm based Machine Learning Model. International Journal of Computer Network and Information Security. 13. 24.
34. Choudhary, S. K., Ranjan, P., Dahiya, S., & Singh, S. K. DETECTING MALWARE ATTACKS BASED ON MACHINE LEARNING TECHNIQUES FOR IMPROVE CYBERSECURITY.
35. Sreedhar Yalamati, 2023. "AI and Risk Management: Predicting Market Volatility" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 1, Issue 2: 89-101.
36. Palakurti, N. R. (2024). Bridging the Gap: Frameworks and Methods for Collaborative Business Rules Management Solutions. International Scientific Journal for Research, 6(6), 1–22. Retrieved from https://isjr.co.in/index.php/ISJR/article/view/207
37. Karthik Hosavaranchi Puttaraju, "Augmenting Classical Strategic Tools with Artificial Intelligence: A Systematic Review of Enhanced Decision - Making Methodologies", International Journal of Science and Research (IJSR), Volume 12 Issue 11, November 2023, pp. 2242-2247, https://www.ijsr.net/getabstract.php?paperid=SR23114091158, DOI: https://www.doi.org/10.21275/SR23114091158
38. Aparna Bhat, Rajeshwari Hegde, “Comprehensive Study of Renewable Energy Resources and Present Scenario in India,” 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, TN, India, 2015.
39. Dhamotharan Seenivasan, Muthukumaran Vaithianathan, 2023. "Real-Time Adaptation: Change Data Capture in Modern Computer Architecture", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 1, Issue 2: 49-61.
40. Karthik Chowdary Tsaliki, "Revolutionizing Identity Management with AI: Enhancing Cyber Security and Preventing ATO", International Research Journal of Modernization in Engineering Technology and Science, volume: 6/Issue: 04/April-2024.
41. Chandrakanth Lekkala 2022. “Automating Infrastructure Management with Terraform: Strategies and Impact on Business Efficiency”, European Journal of Advances in Engineering and Technology, 2022, 9(11): 82-88.
42. Dixit, A., Sabnis, A., Balgude, D., Kale, S., Gada, A., Kudu, B., Mehta, K., Kasar, S., Handa, D., Mehta, R. and Kshirsagar, S., 2023. Synthesis and characterization of citric acid and itaconic acid-based two-pack polyurethane antimicrobial coatings. Polymer Bulletin, 80(2), pp.2187-2216.
43. Chandrakanth Lekkala, “Utilizing Cloud – Based Data Warehouses for Advanced Analytics: A Comparative Study”, International Journal of Science and Research (IJSR), Volume 11 Issue 1, January 2022, pp. 1639-1643, https://www.ijsr.net/getabstract.php?paperid=SR24628182046
44. Vinay Panchal, 2025. “Designing for Longer Battery Life: Power Optimization Strategies in Modern Mobile SOCS”, International Journal of Electrical Engineering and Technology (IJEET) Volume 16, Issue 1, January-February 2025, pp. 1-17, Article ID: IJEET_16_01_001 Available online at https://iaeme.com/Home/issue/IJEET?Volume=16&Issue=1
45. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Integrating AI and Machine Learning with UVM in Semiconductor Design", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 3: 37-51.
46. Dixit, A., Sabnis, A. and Shetty, A., 2022. Antimicrobial edible films and coatings based on N, O-carboxymethyl chitosan incorporated with ferula asafoetida (Hing) and adhatoda vasica (Adulsa) extract. Advances in Materials and Processing Technologies, 8(3), pp.2699-2715.
47. Muvva S. Optimizing Spark Data Pipelines: A Comprehensive Study of Techniques for Enhancing Performance and Efficiency in Big Data Processing, Journal of Artificial Intelligence, Machine Learning and Data Science, 2023, 1 (4), 1862-1865. Doi: doi.org/10.51219/JAIMLD/sainath-muvva/412
48. Sainath Muvva (2023). Standardizing Open Table Formats for Big Data Analysis: Implications for Machine Learning and AI Applications. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-E241. DOI: doi.org/10.47363/JAICC/2023(2)E241
49. Sainath Muvva, “DataMesh: A Decentralized Approach to Big Data and AI/ML Management”, Internaitonal Journal of Scientific Research in Engineering and Management, Volume: 08 Issue: 01 | Jan – 2024.
50. Chandrakanth Lekkala (2023) Deploying and Managing Containerized Data Workloads on Amazon EKS. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-342. DOI: doi.org/10.47363/JAICC/2023 (2)324.
51. M. Rele and D. Patil, "Revolutionizing Liver Disease Diagnosis: AI-Powered Detection and Diagnosis", International Journal of Science and Research (IJSR), 2023.https://doi.org/10.21275/SR231105021910
52. V. Kakani, B. Kesani, N. Thotakura, J. D. Bodapati and L. K. Yenduri, "Decoding Animal Emotions: Predicting Reactions with Deep Learning for Enhanced Understanding," 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), Pune, India, 2024, pp. 1-6, doi: 10.1109/I2CT61223.2024.10543616.
53. Vinay Panchal, 2024. “Thermal and Power Management Challenges in High-Performance Mobile Processors”, International Journal of Innovative Research of Science, Engineering and Technology (IJIRSET), Volume 13, Issue 11, November 2024 |DOI: 10.15680/IJIRSET.2024.1311014.
54. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Low-Power FPGA Design Techniques for Next-Generation Mobile Devices", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 82-93.
55. Nimeshkumar Patel, 2022. ”Quantum Cryptography In Healthcare Information Systems: Enhancing Security in Medical Data Storage and Communication”, Journal of Emerging Technologies and Innovative Research, volume 9, issue 8, pp.g193-g202.
56. Patel, N. (2024, March). Secure Access Service Edge (Sase): “Evaluating The Impact Of Convereged Network Security architectures In Cloud Computing.” Journal of Emerging Technologies and Innovative Research. https://www.jetir.org/papers/JETIR2403481.pdf
57. Naresh Kumar Miryala, Divit Gupta, "Big Data Analytics in Cloud – Comparative Study," International Journal of Computer Trends and Technology, vol. 71, no. 12, pp. 30-34, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I12P107
58. Naresh Kumar Miryala, Divit Gupta, "Data Security Challenges and Industry Trends" IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, vol. 11, no.11, pp. 300-309, 2022, Crossref https://doi.org/10.17148/IJARCCE.2022.111160
59. Venkata Sathya Kumar Koppisetti, 2024. "Robotic Process Automation: Streamlining Operations in the Digital Era", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 74-81.
60. Venkata Sathya Kumar Koppisetti, 2024. "Deep Learning: Advancements and Applications in Artificial Intelligence" ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 106-113.
61. Arnab Dey (2022). Automation for CI/CD Pipeline for Code Delivery with Multiple Technologies. Journal of Mathematical & Computer Applications. SRC/JMCA-170. DOI: doi.org/10.47363/JMCA/2022(1)138
62. Kushal Walia, 2024. "Accelerating AI and Machine Learning in the Cloud: The Role of Semiconductor Technologies", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 34-41. | Google Scholar
63. Kuraku, Sivaraju and Kalla, Dinesh and Smith, Nathan and Samaah, Fnu, Safeguarding FinTech: Elevating Employee Cybersecurity Awareness In Financial Sector (December 29, 2023). International Journal of Applied Information Systems (IJAIS), Volume 12– No.42, December 2023, Available at SSRN: https://ssrn.com/abstract=4678581
64. Shreyaskumar Patel "Enhancing Image Quality in Wireless Transmission through Compression and De-noising Filters" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3, April 2021, pp.1318-1323, URL: https://www.ijtsrd.com/papers/ijtsrd41130.pdf
65. Chanthati, Sasibhushan Rao. (2024). How the power of machine -machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks. 100-119. 10.30574/gjeta.2024.20.2.0149.Sasibhushan Rao Chanthati. https://doi.org/10.30574/gjeta.2024.20.2.0149, https://gjeta.com/sites/default/files/GJETA-2024-0149.pdf
66. Chanthati, Sasibhushan Rao. (2021). A segmented approach to encouragement of entrepreneurship using data science. World Journal of Advanced Engineering Technology and Sciences. https://doi.org/10.30574/wjaets.2024.12.2.0330,
67. Aparna K Bhat, Rajeshwari Hegde, 2014. “Comprehensive Analysis of Acoustic Echo Cancellation Algorithms on DSP Processor”, International Journal of Advance Computational Engineering and Networking (IJACEN), volume 2, Issue 9, pp.6-11.
68. A. Bhat, V. Gojanur, and R. Hegde. 2015. “4G protocol and architecture for BYOD over Cloud Computing”. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313.
69. Kumar, A. (2024). AI-Driven Innovations in Modern Cloud Computing. arXiv preprint arXiv:2410.15960
6B New Colony, Edamalaipatti Pudur, Tiruchirappalli.
International Journal of Multidisciplinary on Science and Management [IJMSM] is a scholarly double-blind peer-reviewed journal published by Golden Sun-Rise.
2024 © Golden Sun-Rise.