ICETETI-2024 | View PDF
Paper Id:ICETETI-MSM136
doi: 10.71141/30485037/ICETETI-MSM136
Securing Backup Systems with Multi-Layered Encryption, RBAC, and Real-Time Threat Analysis
Charlotte Lee, Karthikeyan Muthusamy
Citation:
Charlotte Lee, Karthikeyan Muthusamy, "Securing Backup Systems with Multi-Layered Encryption, RBAC, and Real-Time Threat Analysis", International Journal of Multidisciplinary on Science and Management, pp. 262-267, 2024.
Abstract:
Backup systems are a critical component of modern cybersecurity frameworks, ensuring data availability, integrity, and confidentiality. However, traditional backup security mechanisms are increasingly vulnerable to cyber threats, including ransomware attacks, unauthorized access, and data breaches. This research presents a comprehensive approach to securing backup systems through multi-layered encryption, Role-Based Access Control (RBAC), and real-time threat analysis. Multi-layered encryption enhances data protection by integrating AES-256 and RSA encryption techniques, ensuring robust security against brute force attacks. RBAC enforces strict access control policies, minimizing unauthorized access risks. Real-time threat analysis leverages AI-driven anomaly detection to identify and mitigate potential cyber threats proactively. Performance evaluations demonstrate that the proposed approach significantly improves encryption efficiency, access control security, and threat detection accuracy. This study highlights the necessity of adopting multi-faceted security frameworks to fortify backup systems against evolving cyber threats.
Keywords:
Backup Security, Multi-Layered Encryption, Role-Based Access Control, Real-Time Threat Analysis, Cybersecurity, Data Integrity, Data Breach Prevention.
References:
1. Gartner, J. (2021). AI in Cybersecurity: Leveraging Artificial Intelligence for Data Protection. Journal of Cybersecurity and Data Protection, 35(2), 114-130.
2. Kim, S., & Park, H. (2022). Enhancing Backup Security with AI-Driven Encryption Techniques. International Journal of Information Security, 40(1), 45-59.
3. Taresh Mehra . “The Critical Role of Role-Based Access Control (RBAC) in Securing Backup, Recovery, and Storage Systems”, International Journal of Science and Research Archive, 2024, 13(01), 1192–1194.
4. Bertino, E., Sandhu, R., & Liu, P. (2019). Role-Based Access Control: A Survey of the State of the Art. IEEE Transactions on Software Engineering, 45(9), 784-801.
5. Singh, P., & Gupta, R. (2020). Anomaly Detection in Backup Systems Using Machine Learning Approaches. Journal of Computer Security, 28(6), 450-468.
6. Wang, Z., & Zhang, X. (2023). Blockchain and AI for Immutable Backup Solutions: Future Directions and Challenges. Blockchain and Data Security, 12(4), 99-115.
7. Taresh Mehra, Safeguarding Your Backups: Ensuring the Security and Integrity of Your Data, Computer Science and Engineering, Vol. 14 No. 4, 2024, pp. 75-77. doi: 10.5923/j.computer.20241404.01.
8. Taresh Mehra."Optimizing Data Protection: Selecting the Right Storage Devices for Your Strategy", Volume 12, Issue IX, International Journal for Research in Applied Science and Engineering Technology (IJRASET) Page No: 718-719, ISSN : 2321-9653, www.ijraset.com
9. Naga Lalitha Sree Thatavarthi. Driving Operational Excellence: Implementing Robotic Process Automation (RPA) in Credit Card Automation. Journal of Artificial Intelligence, Machine Learning and Data Science, 2023, 1(3), 938-941. DOI: doi.org/10.51219/JAIMLD/naga-lalitha-sree-thatavarthi/224.
10. Naga Ramesh Palakurti, 2023. AI-Driven Personal Health Monitoring Devices: Trends and Future Directions, ESP Journal of Engineering & Technology Advancements, 3(3): 41-51.
11. Giridhar Kankanala, Sudheer Amgothu, 2024. Choosing Right Computing Resources for SAP Environments: Hyperscaler Connectivity, Networking For Your Server Management Strategies, ESP Journal of Engineering & Technology Advancements, 4(2): 134-136.
12. Suman Chintala, "Harnessing AI and BI for Smart Cities: Transforming Urban Life with Data Driven Solutions", International Journal of Science and Research (IJSR), Volume 13 Issue 9, September 2024, pp. 337-342, https://www.ijsr.net/getabstract.php?paperid=SR24902235715, DOI: https://www.doi.org/10.21275/SR24902235715
13. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2023. "Comparative Study of FPGA and GPU for High-Performance Computing and AI", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 1, Issue 1: 37-46.
14. Kanagarla, Krishna Prasanth Brahmaji, Data Mesh: Decentralised Data Management. IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.14, Issue No 1, Jan 2024 , Available at SSRN: https://ssrn.com/abstract=5024895
15. Apurva Kumar, "Building Autonomous AI Agents based AI Infrastructure," International Journal of Computer Trends and Technology, vol. 72, no. 11, pp. 116-125, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I11P112
16. Sunil Kumar Suvvari, The Role of Leadership in Agile Transformation: A Case Study. Journal of Advanced Management Studies, vol.1, no2, pp. 31-41, 2024.
17. Geetesh Sanodia, “Framework for Efficient Data Management in Salesforce Using APIS”, International Journal of Computer Applications (IJCA), 2(2), 2021. pp. 29-38.
18. Amrish Solanki, Kshitiz Jain, Shrikaa Jadiga, "Building a Data-Driven Culture: Empowering Organizations with Business Intelligence," International Journal of Computer Trends and Technology, 2024; 72, 2: 46-55.
19. Chandrakanth Lekkala 2022. “Automating Infrastructure Management with Terraform: Strategies and Impact on Business Efficiency”, European Journal of Advances in Engineering and Technology, 2022, 9(11): 82-88.
20. DOCTOR A., VONDENBUSCH B., KOZAK J., Bone segmentation applying rigid bone position and triple shadow check method based on RF data, Acta of Bioengineering and Biomechanics, 2011, Vol. 13, 3–11.
21. Vishwanath Gojanur “Wireless Personal Health Monitoring System”, IJETCAS: International Journal of Emerging Technologies in Computational and Applied Sciences,eISSN: 2279-0055,pISSN: 2279-0047, 2014.
22. Chandrakanth Lekkala 2022. “Integration of Real-Time Data Streaming Technologies in Hybrid Cloud Environments: Kafka, Spark, and Kubernetes”, European Journal of Advances in Engineering and Technology, 2022, 9(10):38-43.
23. Muthukumaran Vaithianathan, "Real-Time Object Detection and Recognition in FPGA-Based Autonomous Driving Systems," International Journal of Computer Trends and Technology, vol. 72, no. 4, pp. 145-152, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I4P119
24. Apurva Kumar, Shilpa Priyadarshini, “Adaptive AI Infrastructure: A Containerized Approach For Scalable Model Deployment”, International Research Journal of Modernization in Engineering Technology and Science, Volume:06/Issue:11/November-2024, https://www.doi.org/10.56726/IRJMETS64700
25. Rao, Deepak Dasaratha, Sairam Madasu, Srinivasa Rao Gunturu, Ceres D’britto, and Joel Lopes. "Cybersecurity Threat Detection Using Machine Learning in Cloud-Based Environments: A Comprehensive Study." International Journal on Recent and Innovation Trends in Computing and Communication 12, no. 1 (January, 2024): 285. Available at: http://www.ijritcc.org.
26. Dhameliya, N. (2022). Power Electronics Innovations: Improving Efficiency and Sustainability in Energy Systems. Asia Pacific Journal of Energy and Environment, 9(2), 71-80.
27. Karthik Hosavaranchi Puttaraju, "Strategic Innovation Management: A Framework for Digital Product Portfolio Optimization", International Scientific Journal of Engineering and Management, VOLUME: 01 ISSUE: 01|AUG – 2022 DOI: 10.55041/ISJEM0018
28. Karthik Chowdary Tsaliki, "Leveraging Large Language Models for Fraud Prevention in E-commerce", International Journal of Innovative Research in Science, Engineering and Technology, Volume 13, Issue 8, August 2024.
29. Palakurti, N. R. (2024). Challenges and Future Directions in Anomaly Detection. In Practical Applications of Data Processing, Algorithms, and Modeling (pp. 269-284). IGI Global.
30. Aparna Bhat, Rajeshwari Hegde, “Comprehensive Study of Renewable Energy Resources and Present Scenario in India,” 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, TN, India, 2015.
31. Julian, Anitha , Mary, Gerardine Immaculate , Selvi, S. , Rele, Mayur & Vaithianathan, Muthukumaran (2024) Blockchain based solutions for privacy-preserving authentication and authorization in networks, Journal of Discrete Mathematical Sciences and Cryptography, 27:2-B, 797–808, DOI: 10.47974/JDMSC-1956
32. Aparna K Bhat, Rajeshwari Hegde, 2014. “Comprehensive Analysis of Acoustic Echo Cancellation Algorithms on DSP Processor”, International Journal of Advance Computational Engineering and Networking (IJACEN), volume 2, Issue 9, pp.6-11.
33. Bhat, V. Gojanur, and R. Hegde. 2015. “4G protocol and architecture for BYOD over Cloud Computing”. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313.
34. Chanthati, Sasibhushan Rao. (2024). How the power of machine -machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks. 100-119. 10.30574/gjeta.2024.20.2.0149.Sasibhushan Rao Chanthati. https://doi.org/10.30574/gjeta.2024.20.2.0149, https://gjeta.com/sites/default/files/GJETA-2024-0149.pdf
35. Chanthati, Sasibhushan Rao. (2021). A segmented approach to encouragement of entrepreneurship using data science. World Journal of Advanced Engineering Technology and Sciences. https://doi.org/10.30574/wjaets.2024.12.2.0330.
36. Artificial Intelligence-Based Cloud Planning and Migration to Cut the Cost of Cloud SR Chanthati - Authorea Preprints, 2024 http://dx.doi.org/10.22541/au.172115306.64736660/v1 Sasi-Rao: SR Chanthati will pick up the Google scholar and Chanthati, S. R. (2024).
37. Patel, N. (2024, March). “Secure Access Service Edge (SASE): “Evaluating The Impact Of Convereged Network Security Architectures In Cloud Computing.” Journal of Emerging Technologies and Innovative Research. https://www.jetir.org/papers/JETIR2403481.pdf
38. Mistry, H., Shukla, K., & Patel, N. (2024). Transforming Incident Responses, Automating Security Measures, and Revolutionizing Defence Strategies throughAI-Powered Cybersecurity. Journal of Emerging Technologies and Innovative Research, 11(3), 25. https://www.jetir.org/
39. Shashikant Tank Kumar Mahendrabhai Shukla, Nimeshkumar Patel, Veeral Patel, 2024. ”AI Based Cyber Security Data Analytic Device”, 414425-001,
40. Arnab Dey, "Innovative Approach to Mitigate Man-in-the-Middle Attacks i Secure Communication Channels", International Journal of Science and Research (IJSR), Volume 11 Issue 8, August 2022, pp. 1497-1500. https://www.ijsr.net/getabstract.php?paperid=SR24320191712
41. Chandrakanth Lekkala (2023) Deploying and Managing Containerized Data Workloads on Amazon EKS. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-342. DOI: doi.org/10.47363/JAICC/2023 (2)324.
42. Sateesh Reddy Adavelli, "AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in DataDriven Transformation", International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Volume 12, Issue 6, June 2023.
43. Vinay Panchal, 2025. “Designing for Longer Battery Life: Power Optimization Strategies in Modern Mobile SOCS”, International Journal of Electrical Engineering and Technology (IJEET) Volume 16, Issue 1, January-February 2025, pp. 1-17, Article ID: IJEET_16_01_001 Available online at https://iaeme.com/Home/issue/IJEET?Volume=16&Issue=1
44. Chandrakanth Lekkala, “Utilizing Cloud – Based Data Warehouses for Advanced Analytics: A Comparative Study”, International Journal of Science and Research (IJSR), Volume 11 Issue 1, January 2022, pp. 1639-1643, https://www.ijsr.net/getabstract.php?paperid=SR24628182046
45. Dixit, A., Sabnis, A. and Shetty, A., 2022. Antimicrobial edible films and coatings based on N, O-carboxymethyl chitosan incorporated with ferula asafoetida (Hing) and adhatoda vasica (Adulsa) extract. Advances in Materials and Processing Technologies, 8(3), pp.2699-2715.
46. Dixit, A., Wazarkar, K. and Sabnis, A.S., 2021. Antimicrobial uv curable wood coatings based on citric acid. Pigment & Resin Technology, 50(6), pp.533-544.
47. Muvva S. Optimizing Spark Data Pipelines: A Comprehensive Study of Techniques for Enhancing Performance and Efficiency in Big Data Processing, Journal of Artificial Intelligence, Machine Learning and Data Science, 2023, 1 (4), 1862-1865. Doi: doi.org/10.51219/JAIMLD/sainath-muvva/412
48. M. Rele and D. Patil, "Revolutionizing Liver Disease Diagnosis: AI-Powered Detection and Diagnosis", International Journal of Science and Research (IJSR), 2023.https://doi.org/10.21275/SR231105021910
49. Sateesh Reddy Adavelli, "Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations", International Journal of Science and Research (IJSR), Volume 12 Issue 9, September 2023, pp. 2219-2231, https://www.ijsr.net/getabstract.php?paperid=SR23092085343, DOI: https://www.doi.org/10.21275/SR23092085343
50. Lakshmana Kumar Yenduri, 2024. "Low Latency High Throughput Data Serving Layer for Generative AI Applications using the REST-based APIs" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 3: 61-76.
51. Sainath Muvva (2023). Standardizing Open Table Formats for Big Data Analysis: Implications for Machine Learning and AI Applications. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-E241. DOI: doi.org/10.47363/JAICC/2023(2)E241
52. Bodapati, J.D., Veeranjaneyulu, N. & Yenduri, L.K. A Comprehensive Multi-modal Approach for Enhanced Product Recommendations Based on Customer Habits. J. Inst. Eng. India Ser. B (2024). https://doi.org/10.1007/s40031-024-01064-5
53. Vinay Panchal, 2024. “Thermal and Power Management Challenges in High-Performance Mobile Processors”, International Journal of Innovative Research of Science, Engineering and Technology (IJIRSET), Volume 13, Issue 11, November 2024 |DOI: 10.15680/IJIRSET.2024.1311014