Citation:
Amelia Brown, Syed Ali Fathima, "Combining AI and RBAC for Preventing Data Loss in Cloud Backup Systems", International Journal of Multidisciplinary on Science and Management, pp. 196-202, 2024.
Abstract:
Data security in cloud backup systems has become a critical challenge due to the increasing volume of sensitive data being stored remotely. Role-Based Access Control (RBAC) has been widely adopted to restrict unauthorized access, but its static nature often fails to detect advanced threats. Integrating Artificial Intelligence (AI) with RBAC enhances security by dynamically adapting access controls based on real-time analysis of user behavior. This paper explores the synergy between AI and RBAC, presenting a novel framework to prevent data loss in cloud environments. The proposed system utilizes machine learning (ML) models for anomaly detection, predictive analytics, and automated policy adjustments. The study also discusses real-world applications, performance evaluation, and security implications. The results indicate that AI-enhanced RBAC significantly reduces unauthorized access incidents while maintaining system efficiency. Future research directions and challenges are also highlighted.
Keywords:
AI in Cloud Security, Role-Based Access Control (RBAC), Data Loss Prevention, Machine Learning, Anomaly Detection, Cloud Backup Systems.
References:
1. Amini, S., & Ghaffari, A. (2019). Role-based access control for data loss prevention in cloud environments. Journal of Cloud Computing, 8(1), 12-27. https://doi.org/10.1007/s12165-019-00434-6
2. Bhardwaj, P., & Ziegler, K. (2020). Securing backup systems with encryption and access control: A comprehensive approach. International Journal of Information Security, 18(3), 345-361. https://doi.org/10.1007/s10207-020-00524-5
3. Dastjerdi, A. V., & Buyya, R. (2020). AI-driven anomaly detection for secure backup systems in cloud environments. Journal of Cloud Computing: Advances, Systems, and Applications, 9(2), 53-69. https://doi.org/10.1186/s13677-020-00223-5
4. Gupta, S., & Dhawan, M. (2021). The role of encryption in data protection: Ensuring backup data confidentiality. International Journal of Cyber Security, 19(4), 421-437. https://doi.org/10.1109/IJCYS.2021.01123
5. Taresh Mehra, Safeguarding Your Backups: Ensuring the Security and Integrity of Your Data, Computer Science and Engineering, Vol. 14 No. 4, 2024, pp. 75-77. doi: 10.5923/j.computer.20241404.01.
6. Hasan, S., & Jiang, Y. (2018). Implementing role-based access control in backup systems: A systematic review. International Journal of Information Management, 40, 83-97. https://doi.org/10.1016/j.ijinfomgt.2018.01.009
7. Kim, H., & Lee, K. (2019). Backup system security: Enhancing resilience against data loss through encryption and role-based access control. Computer Security, 82, 47-62. https://doi.org/10.1016/j.cose.2018.12.008
8. Sainath Muvva, “DataMesh: A Decentralized Approach to Big Data and AI/ML Management”, Internaitonal Journal of Scientific Research in Engineering and Management, Volume: 08 Issue: 01 | Jan – 2024.
9. Taresh Mehra."Optimizing Data Protection: Selecting the Right Storage Devices for Your Strategy", Volume 12, Issue IX, International Journal for Research in Applied Science and Engineering Technology (IJRASET) Page No: 718-719, ISSN : 2321-9653, www.ijraset.com
10. Taresh Mehra . “The Critical Role of Role-Based Access Control (RBAC) in Securing Backup, Recovery, and Storage Systems”, International Journal of Science and Research Archive, 2024, 13(01), 1192–1194.
11. Zhang, P., & Li, S. (2019). A hybrid approach to backup data protection: Integrating encryption, access control, and AI-based monitoring. International Journal of Computer Applications, 182(8), 28-38. https://doi.org/10.5120/ijca2019918558.
12. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Low-Power FPGA Design Techniques for Next-Generation Mobile Devices", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 82-93.
13. Naga Ramesh Palakurti, 2022. "AI Applications in Food Safety and Quality Control" ESP Journal of Engineering & Technology Advancements, 2(3): 48-61.
14. Sanodia, G. (2023). “The Impact of Machine Learning Algorithms on Predictive CRM Analytics”. Journal of Computer Engineering and Technology (JCET), 6(01).
15. Shrikaa Jadiga, "Big Data Engineering Using Hadoop and Cloud (GCP/AZURE) Technologies," International Journal of Computer Trends and Technology, vol. 72, no. 8, pp.60-69, 2024.
16. Suvvari, S. K. (2024). Ensuring security and compliance in agile cloud infrastructure projects. International Journal of Computing and Engineering, 6(4), 54–73. https://doi.org/10.47941/ijce.2222
17. Chintala, Suman. (2024). Emotion AI in Business Intelligence: Understanding Customer Sentiments and Behaviors. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY E-ISSN. 06. 8.
18. Kanagarla, Krishna Prasanth Brahmaji, The Role of Synthetic Data in Ensuring Data Privacy and Enabling Secure Analytics. European Journal of Advances in Engineering and Technology, 2024, 11(10):75-79 , Available at SSRN: https://ssrn.com/abstract=5012479 or http://dx.doi.org/10.2139/ssrn.5012479
19. Sudheer Amgothu, "An End-to-End CI/CD Pipeline Solution Using Jenkins and Kubernetes", International Journal of Science and Research (IJSR), Volume 13 Issue 8, August 2024, pp. 1576-1578, https://www.ijsr.net/getabstract.php?paperid=SR24826231120, DOI: https://www.doi.org/10.21275/SR24826231120
20. Naga Satya Praveen Kumar Yadati (2022) Enhancing Cybersecurity and Privacy with Artificial Intelligence. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-376. DOI: doi.org/10.47363/JAICC/2022(1)359
21. Akbar Doctor,2023.” Biomedical Signal and Image Processing with Artificial Intelligence Chapter Manufacturing of Medical Devices Using Artificial Intelligence-Based Troubleshooters”, Springer Nature Switzerland AG, Volume 1, PP-195-206.
22. V. Gojanur, and R. Hegde. 2015. 4G protocol and architecture for BYOD over Cloud Computing. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313. Google Scholar.
23. Apurva Kumar, "Building Autonomous AI Agents based AI Infrastructure," International Journal of Computer Trends and Technology, vol. 72, no. 11, pp. 116-125, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I11P112
24. Chandrakanth, AI-Driven Dynamic Resource Allocation in Cloud Computing: Predictive Models and Real-Time Optimization (February 06, 2024). J Artif Intell Mach Learn & Data Sci | Vol: 2 & Iss: 2, Available at SSRN: https://ssrn.com/abstract=4908420 or http://dx.doi.org/10.2139/ssrn.4908420
25. Dasaratha, D. A., A. Prasad, M. Kumar, P. Kamal, S. V., S. (2024). Strategizing IoT Network Layer Security through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of Intelligent Systems and Internet of Things, (), 195-207. DOI: https://doi.org/10.54216/JISIoT.120215
26. Apurva Kumar, Shilpa Priyadarshini, “Adaptive AI Infrastructure: A Containerized Approach For Scalable Model Deployment”, International Research Journal of Modernization in Engineering Technology and Science, Volume:06/Issue:11/November-2024, https://www.doi.org/10.56726/IRJMETS64700
27. Dhameliya, N. (2022). Power Electronics Innovations: Improving Efficiency and Sustainability in Energy Systems. Asia Pacific Journal of Energy and Environment, 9(2), 71-80.
28. Dhamotharan Seenivasan, Muthukumaran Vaithianathan, 2023. "Real-Time Adaptation: Change Data Capture in Modern Computer Architecture", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 1, Issue 2: 49-61.
29. Priyanka Gowda Ashwath Narayana Gowda, “Securing Microservices Architecture Using JSON Web Tokens (JWS)”, N. American. J. of Engg. Research, vol. 4, no. 3, Aug. 2023, Accessed: Dec. 31, 2024. [Online]. Available: https://najer.org/najer/article/view/75
30. Singh, S. K., Choudhary, S. K., Ranjan, P., Cognizant, N. J., & Dahiya, S. COMPARATIVE ANALYSIS OF MACHINE LEARNING MODELS AND DATA ANALYTICS TECHNIQUES FOR FRAUD DETECTION IN BANKING SYSTEM.
31. Lekkala, Chandrakanth, AI-Driven Dynamic Resource Allocation in Cloud Computing: Predictive Models and Real-Time Optimization (February 06, 2024). J Artif Intell Mach Learn & Data Sci | Vol: 2 & Iss: 2, Available at SSRN: https://ssrn.com/abstract=4908420 or http://dx.doi.org/10.2139/ssrn.4908420
32. Palakurti, N. R., & Kolasani, S. (2024). AI-Driven Modeling: From Concept to Implementation. In Practical Applications of Data Processing, Algorithms, and Modeling (pp. 57-70). IGI Global.
33. Karthik Hosavaranchi Puttaraju, "A Roadmap for Business Model and Capability Transformation in the Digital Age: Strategies for Success", International Journal of Business Quantitative Economics and Applied Management Research, Volume-7, Issue-7, 2023.
34. Karthik Chowdary Tsaliki, "Revolutionizing Identity Management with AI: Enhancing Cyber Security and Preventing ATO", International Research Journal of Modernization in Engineering Technology and Science, volume: 6/Issue: 04/April-2024.
35. Chandrakanth Lekkala (2023) Deploying and Managing Containerized Data Workloads on Amazon EKS. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-342. DOI: doi.org/10.47363/JAICC/2023 (2)324.
36. Vishwanath Gojanur, Aparna Bhat, “Wireless Personal Health Monitoring System”, IJETCAS: International Journal of Emerging Technologies in Computational and Applied Sciences, eISSN: 2279-0055, pISSN: 2279-0047, 2014.
37. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Integrating AI and Machine Learning with UVM in Semiconductor Design", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 3: 37-51.
38. Aparna Bhat, “Comparison of Clustering Algorithms and Clustering Protocols in Heterogeneous Wireless Sensor Networks: A Survey,” 2014 INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) - ISSN: 2349-4689 Volume 04- NO.1, 2014.
39. Aparna Bhat, Rajeshwari Hegde, “Comprehensive Study of Renewable Energy Resources and Present Scenario in India,” 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, TN, India, 2015.
40. Venkata Sathya Kumar Koppisetti, 2024. "The Role of Explainable AI in Building Trustworthy Machine Learning Systems", ESP International Journal of Advancements in Science & Technology (ESP-IJAST), Volume 2, Issue 2: 16-21.
41. Chanthati, S. R. (2024). Website Visitor Analysis & Branding Quality Measurement Using Artificial Intelligence. Sasibhushan Rao Chanthati. https://journals.e-palli.com/home/index.php/ajet. https://doi.org/10.54536/ajet.v3i3.3212
42. Vinay Panchal, 2025. “Designing for Longer Battery Life: Power Optimization Strategies in Modern Mobile SOCS”, International Journal of Electrical Engineering and Technology (IJEET) Volume 16, Issue 1, January-February 2025, pp. 1-17, Article ID: IJEET_16_01_001 Available online at https://iaeme.com/Home/issue/IJEET?Volume=16&Issue=1
43. Chanthati, Sasibhushan Rao. (2024). How the power of machine -machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks. 100-119. 10.30574/gjeta.2024.20.2.0149.Sasibhushan Rao Chanthati. https://doi.org/10.30574/gjeta.2024.20.2.0149, https://gjeta.com/sites/default/files/GJETA-2024-0149.pdf
44. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2024. "Energy-Efficient FPGA Design for Wearable and Implantable Devices", ESP International Journal of Advancements in Science & Technology (ESP-IJAST), Volume 2, Issue 2: 37-51.
45. Mistry, H., Shukla, K., & Patel, N. (2024). Transforming Incident Responses, Automating Security Measures, and Revolutionizing Defence Strategies throughAI-Powered Cybersecurity. Journal of Emerging Technologies and Innovative Research, 11(3), 25. https://www.jetir.org/
46. Shashikant Tank Kumar Mahendrabhai Shukla, Nimeshkumar Patel, Veeral Patel, 2024. ”AI Based Cyber Security Data Analytic Device”, 414425-001,
47. Naresh Kumar Miryala, Divit Gupta, "Big Data Analytics in Cloud – Comparative Study," International Journal of Computer Trends and Technology, vol. 71, no. 12, pp. 30-34, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I12P107
48. Naresh Kumar Miryala, Divit Gupta, "Data Security Challenges and Industry Trends" IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, vol. 11, no.11, pp. 300-309, 2022, Crossref https://doi.org/10.17148/IJARCCE.2022.111160
49. Sridhar Selvaraj, 2024. "Futuristic SAP Fiori Dominance" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 1: 32-37. | Google Scholar
50. Venkata Sathya Kumar Koppisetti, "Automation of Triangulation, Inter-Company, or Intra-Company Procurement in SAP SCM," International Journal of Computer Trends and Technology, vol. 71, no. 9, pp. 7-14, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I9P102
51. Kushal Walia, 2024. "Accelerating AI and Machine Learning in the Cloud: The Role of Semiconductor Technologies", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 2, Issue 2: 34-41. | Google Scholar
52. Arnab Dey, "Innovative Approach to Mitigate Man-in-the-Middle Attacks i Secure Communication Channels", International Journal of Science and Research (IJSR), Volume 11 Issue 8, August 2022, pp. 1497-1500. https://www.ijsr.net/getabstract.php?paperid=SR24320191712
53. S. E. Vadakkethil Somanathan Pillai and K. Polimetla, "Analyzing the Impact of Quantum Cryptography on Network Security," 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, 2024, pp. 1-6, doi: 10.1109/ICICACS60521.2024.10498417.
54. Shreyaskumar Patel "Performance Analysis of Acoustic Echo Cancellation using Adaptive Filter Algorithms with Rician Fading Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2, February 2022, pp.1541-1547, URL: https://www.ijtsrd.com/papers/ijtsrd49144.pdf
55. Chandrakanth Lekkala 2023. “Implementing Efficient Data Versioning and Lineage Tracking in Data Lakes”, Journal of Scientific and Engineering Research, Volume 10, Issue 8, pp. 117-123.
56. Chandrakanth Lekkala 2022. “Automating Infrastructure Management with Terraform: Strategies and Impact on Business Efficiency”, European Journal of Advances in Engineering and Technology, 2022, 9(11): 82-88.
57. Sateesh Reddy Adavelli, Ravi Teja Madhala, "Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats", International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Volume 10, Issue 8, August 2021.
58. Sunil Kumar Suvvari, “The Role of Leadership in Agile Transformation: A Case Study”. Journal of Advanced Management Studies, vol.1, no2, pp. 31-41, 2024.
59. Dixit, A., Sabnis, A. and Shetty, A., 2022. Antimicrobial edible films and coatings based on N, O-carboxymethyl chitosan incorporated with ferula asafoetida (Hing) and adhatoda vasica (Adulsa) extract. Advances in Materials and Processing Technologies, 8(3), pp.2699-2715.
60. Dixit, A., Wazarkar, K. and Sabnis, A.S., 2021. Antimicrobial uv curable wood coatings based on citric acid. Pigment & Resin Technology, 50(6), pp.533-544.
61. Sainath Muvva, 2021. "Cloud-Native Data Engineering: Leveraging Scalable, Resilient, and Efficient Pipelines for the Future of Data", ESP Journal of Engineering & Technology Advancements 1(2): 287-292.
62. M. Rele and D. Patil, "Revolutionizing Liver Disease Diagnosis: AI-Powered Detection and Diagnosis", International Journal of Science and Research (IJSR), 2023.https://doi.org/10.21275/SR231105021910
63. Sateesh Reddy Adavelli, 2021. "Policy Center to the Cloud: An Analysis of AWS and Snowflake’s Role in Cloud-Based Policy Management Solutions", ESP Journal of Engineering & Technology Advancements 1(1): 253-261.
64. Suvvari, S. K. (2022). Project portfolio management: Best practices for strategic alignment. Innovative Research Thoughts, 8(4), 372-384. https://doi.org/10.36676/irt.v8.i4.1476
65. V. Kakani, B. Kesani, N. Thotakura, J. D. Bodapati and L. K. Yenduri, "Decoding Animal Emotions: Predicting Reactions with Deep Learning for Enhanced Understanding," 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), Pune, India, 2024, pp. 1-6, doi: 10.1109/I2CT61223.2024.10543616.
66. Vinay Panchal, 2024. “Thermal and Power Management Challenges in High-Performance Mobile Processors”, International Journal of Innovative Research of Science, Engineering and Technology (IJIRSET), Volume 13, Issue 11, November 2024 |DOI: 10.15680/IJIRSET.2024.1311014.
67. Kumar, A. (2024). AI-Driven Innovations in Modern Cloud Computing. arXiv preprint arXiv:2410.15960
6B New Colony, Edamalaipatti Pudur, Tiruchirappalli.
International Journal of Multidisciplinary on Science and Management [IJMSM] is a scholarly double-blind peer-reviewed journal published by Golden Sun-Rise.
2024 © Golden Sun-Rise.