Dynamic Cloud Workloads Security Policy with Reinforcement Learning

Authors

  • Dr. Rajesh Patel Research Associate, Manipal Institute of Technology, Manipal, India Author

Keywords:

Reinforcement learning, proactive security, cloud workloads, dynamic environments

Abstract

Dynamic cloud workload security is crucial when an enterprise expands and shifts its operation to cloud computing. Traditional security is not able to adapt to the changes in the cloud ecosystem and its threats. Reinforcement learning which is a subset of machine learning algorithm are able to automatically learns the threat mechanism and proactively deploys security policy to counter the attack and it continuously learns the appropriate defence for new threats.

Downloads

Download data is not yet available.

References

Alpaydin, E. (2020). Introduction to Machine Learning. MIT Press.

Anderson, R. (2021). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.

S. Kumari, “Kanban and AI for Efficient Digital Transformation: Optimizing Process Automation, Task Management, and Cross-Departmental Collaboration in Agile Enterprises”, Blockchain Tech. & Distributed Sys., vol. 1, no. 1, pp. 39–56, Mar. 2021

Sivaraman, Hariprasad. (2020). Integrating Large Language Models for Automated Test Case Generation in Complex Systems.

Singu, Santosh Kumar. "Real-Time Data Integration: Tools, Techniques, and Best Practices." ESP Journal of Engineering & Technology Advancements 1.1 (2021): 158-172.

S. Kumari, “Kanban-Driven Digital Transformation for Cloud-Based Platforms: Leveraging AI to Optimize Resource Allocation, Task Prioritization, and Workflow Automation”, J. of Artificial Int. Research and App., vol. 1, no. 1, pp. 568–586, Jan. 2021

S. Kumari, “Kanban and Agile for AI-Powered Product Management in Cloud-Native Platforms: Improving Workflow Efficiency Through Machine Learning-Driven Decision Support Systems”, Distrib Learn Broad Appl Sci Res, vol. 5, pp. 867–885, Aug. 2019

S. Kumari, “Digital Transformation Frameworks for Legacy Enterprises: Integrating AI and Cloud Computing to Revolutionize Business Models and Operational Efficiency ”, Journal of AI-Assisted Scientific Discovery, vol. 1, no. 1, pp. 186–204, Jan. 2021

Sivaraman, Hariprasad. (2020). Intelligent Deployment Orchestration Using ML for Multi-Environment CI/CD Pipelines.

S. Kumari, “AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence ”, J. Sci. Tech., vol. 1, no. 1, pp. 809–828, Dec. 2020.

S. Kumari, “Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments”, J. Sci. Tech., vol. 1, no. 1, pp. 791–808, Oct. 2020.

Singu, Santosh Kumar. "Designing scalable data engineering pipelines using Azure and Databricks." ESP Journal of Engineering & Technology Advancements 1.2 (2021): 176-187.

Sivaraman, Hariprasad. (2021). INTELLIGENT AUTOMATION FOR SERVICE DEGRADATION PREDICTION USING LLMS AND OBSERVABILITY DATA. International Journal of Engineering Management. 6. 10.5281/zenodo.14342920.

S. Kumari, “AI-Powered Cloud Security for Agile Transformation: Leveraging Machine Learning for Threat Detection and Automated Incident Response ”, Distrib Learn Broad Appl Sci Res, vol. 6, pp. 467–488, Oct. 2020

Sutton, R. S., & Barto, A. G. (2018). Reinforcement Learning: An Introduction. MIT Press.

Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

Papernot, N., et al. (2018). "Technical challenges of machine learning in cybersecurity." ACM Computing Surveys, 51(3), 65.

Mnih, V., et al. (2015). "Human-level control through deep reinforcement learning." Nature, 518(7540), 529-533.

Howard, M., & LeBlanc, D. (2020). Writing Secure Code. Microsoft Press.

Silver, D., et al. (2017). "Mastering the game of Go with deep neural networks and tree search." Nature, 550(7676), 354-359.

Hinton, G. E., & Salakhutdinov, R. R. (2006). "Reducing the dimensionality of data with neural networks." Science, 313(5786), 504-507.

Ng, A. Y., & Jordan, M. I. (2000). "PEGASUS: A policy search method for large MDPs and POMDPs." Proceedings of UAI, 406-415.

Smith, J., & Brown, T. (2019). "Case study on RL for cloud security." IEEE Transactions on Security and Privacy, 17(4), 453-468.

Egele, M., et al. (2012). "A survey on automated dynamic malware analysis techniques." ACM Computing Surveys, 44(2), 6.

Dean, J., & Ghemawat, S. (2008). "MapReduce: Simplified data processing on large clusters." Communications of the ACM, 51(1), 107-113.

He, K., et al. (2016). "Deep residual learning for image recognition." Proceedings of CVPR, 770-778.

Ross, S., et al. (2011). "A reduction of imitation learning and structured prediction to no-regret online learning." Proceedings of AISTATS, 627-635.

Schulman, J., et al. (2017). "Proximal policy optimization algorithms." arXiv preprint arXiv:1707.06347.

Trivedi, N., & Singh, K. (2020). "RL for resource allocation in cloud." Journal of Cloud Computing Research, 12(3), 78-89.

Mohan, A., et al. (2021). "AI-driven dynamic access control policies." ACM Transactions on Cybersecurity, 9(2), 345-367.

Zaharia, M., et al. (2010). "Spark: Cluster computing with working sets." Proceedings of HotCloud, 10(10-10).

Taylor, M. E., & Stone, P. (2009). "Transfer learning for reinforcement learning domains." Journal of Machine Learning Research, 10, 1633-1685.

Downloads

Published

15-01-2021

How to Cite

[1]
Dr. Rajesh Patel, “Dynamic Cloud Workloads Security Policy with Reinforcement Learning”, American J Data Sci Artif Intell Innov, vol. 1, pp. 1–6, Jan. 2021, Accessed: Mar. 07, 2026. [Online]. Available: https://ajdsai.org/index.php/publication/article/view/1