1A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
Srinivasa Rao Gundu1, Charanarur Panem2* and J. Vijaylaxmi3
1Department of Computer Science, Government Degree College-Sitaphalmandi, Hyderabad, Telangana, India
2School of Cyber Security and Digital Forensic, National Forensic Sciences University, Goa Campus, Goa, India
3PVKK Degree & PG College, Anantapur, Andhra Pradesh, India
Abstract
Since cloud computing is becoming an increasingly vital component of both big and small businesses, ensuring its integrity and confidentiality has emerged as a top priority in this space. There are a few different approaches that may be used to secure the cloud. Techniques are implemented through protocols. The protocols that are used in cloud computing may also be used in other types of security systems, such as authentication systems, mailing systems, and cryptonet systems. Cloud computing has challenges in the areas of security on-demand application resource management, and self-monitoring without delay. These challenges arise because of the massive amount of data that is made accessible via cloud computing. When it comes to improving the capabilities of security and privacy in cloud storage, Artificial Intelligence (AI) and machine learning have the potential to play a pivotal role. Therefore, incorporating methods for machine learning into the cloud that already exists with the potential to give enhanced efficiency. ...
Get Robotic Process Automation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.