The Role of AI in Enhancing Data Security and Compliance in Oracle Cloud Infrastructures

Authors

  • Raghu Murthy Shankeshi Sr. MTS , Oracle America Inc., Virginia, USA Author

Keywords:

Artificial Intelligence, Machine Learning, Oracle Cloud Infrastructure, Data Security

Abstract

Cloud computing has dramatically changed data management, bringing considerable threats to data security and compliance. The Oracle Cloud Infrastructure (OCI) is a strong enabler to SaaS applications; however, the complexity of regulatory requirements calls for an innovative response to aid SaaS compliance. This paper focuses on the role of AI and ML in helping enhance security compliance for OCI's SaaS services. With an AI compliance monitoring tool in place, organizations can automate the discovery of compliance violations, forecast security threats, and remain compliant with applicable laws.

The research outlines an ingenious framework for implementing AI into OCI that considers data results, pseudo code, flowcharts, and other supportive visuals. The proposed system will leverage AI in analyzing tons of data, spotting anomalies, and generating actionable insights within seconds. This means compliance monitoring can be done efficiently and accurately and breaches of data and regulatory fines can be minimized.

AI-based systems, the conclusion emphasizes, allow for scalability and proactive measures for firms in complex cloud settings. With compliance automated, businesses can improve their security stance, lower their operational cost, and maintain continuous compliance with changing regulatory Standards. The paper presents concrete recommendations for the application of artificial intelligence to the challenges posed to current cloud infrastructure; as such, it will also serve as a valuable resource for practitioners and researchers around the world in the field of cloud security and application of AI.

Downloads

Download data is not yet available.

References

Ahmad, I., Bakht, H., Mohan, U.: Cloud computing- threats and challenges. J. Comput. Manage. Stud. 1(1), 1–12 (2017). https://www.researchgate.net/publication/319725257_Cloud_Computing__Threats_and_Challenges

Alsmadi, D., Prybutok, V.: Sharing and storage behavior via cloud computing: security and privacy in research and practice. Comput. Hum. Behav. 85, 218–226 (2018). https://doi.org/10.1016/j.chb.2018.04.003

Bianchini, R., Fontoura, M., Cortez, E., Bonde, A., Muzio, A., Constantin, A., Moscibroda, T., Magalhaes, G., Bablani, G., Russinovich, M.: Toward ML-centric cloud platforms. Commun. ACM 63(2), 50–59 (2020). https://doi.org/10.1145/3364684

Bildosola, I., Río-Bélver, R., Cilleruelo, E., Garechana, G.: Design and implementation of a cloud computing adoption decision tool: generating a cloud road. PLoS ONE 10(7), e0134563 (2015b). https://doi.org/10.1371/journal.pone.0134563

Das, A., Patterson, S., Wittie, M.: EdgeBench: benchmarking Edge computing platforms. In: 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), Zurich, pp. 175–180 (2018). https://doi.org/10.1109/UCC-Companion.2018.00053

Duncan, R.: A multi-cloud world requires a multi-cloud security approach. Comput. Fraud Secur. 2020(5), 11–12 (2020). https://doi.org/10.1016/S1361-3723(20)30052-X

Elmonem, M.A., Nasr, E.S., Geith, M.H.: Benefits and challenges of cloud ERP systems – a systematic literature review. Future Comput. Inf. J. 1(1–2), 1–9 (2016). https://doi.org/10.1016/j.fcij.2017.03.003

Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.: Security issues in cloud environments: a survey. Int. J Inf. Secur. 13(2), 113–170 (2013). https://doi.org/10.1007/s10207-013-0208-7

Gholami, A.: Security and privacy of sensitive data in cloud computing. Doctoral Thesis, Stockholm, Sweden (2016). https://www.diva-portal.org/smash/get/diva2:925669/FULLTEXT01.pdf

Kamal, M.A., Raza, H.W., Alam, M.M., Su’ud, M.M.: Highlight the features of AWS, GCP and Microsoft Azure that have an impact when choosing a cloud service provider. Int. J. Recent Technol. Eng. (IJRTE) 8(5), 4124–4132 (2020). https://doi.org/10.35940/ijrte.D8573.018520

Kofahi, N., Al-Rabadi, A.: Identifying the top threats in cloud computing and its suggested solutions: a survey. Adv. Netw 6(1), 1–13 (2018). https://doi.org/10.11648/j.net.20180601.11

Kumar, P.R., Raj, P.H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691–697 (2018). https://doi.org/10.1016/j.procs.2017.12.089

Kushwah, V.S., Bajpai, A.: Cloud computing: a future e-learning environment. Int. J Res. Electron. Comput. Eng. 5(4), 63–67 (2017). https://www.researchgate.net/publication/321016275_Cloud_Computing_A_Future_eLearning_Environment

Lo’ai, A.T., Saldamli, G.: Reconsidering big data security and privacy in cloud and mobile cloud systems. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.05.007

Muheidat, F., Tawalbeh, L.: Mobile and cloud computing security. In: Maleh, Y., Shojafar, M., Alazab, M., Baddi, Y. (eds.) Machine Intelligence and Big Data Analytics for Cybersecurity Applications. SCI, vol. 919, pp. 461–483. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-57024-8_21

Nemade, B., Moorthy, S., Kadam, O.: Cloud computing: Windows Azure platform. In: ICWET 2011: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 1361–1362, February 2011. https://doi.org/10.1145/1980022.1980341

Opara, C.M.: Cloud computing in Amazon Web Services, Microsoft Windows Azure, Google App Engine and IBM cloud platforms: A comparative study. A Thesis Submitted to the Graduate School of Applied Sciences of Near East University (2019). https://docs.neu.edu.tr/library/6842203396.pdf

Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48, 204–209 (2015). https://doi.org/10.1016/j.procs.2015.04.171

Rath, A., Spasic, B., Boucart, N., Thiran, P.: Security pattern for cloud SaaS: from system and data security to privacy case study in AWS and Azure. Computers 8(34), 1–8 (2019). https://doi.org/10.3390/computers8020034

Saeed, I., Baras, S., Hajjdiab, H.: Security and privacy of AWS S3 and Azure Blob storage services. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, pp. 388–394 (2019). https://doi.org/10.1109/CCOMS.2019.8821735

Sharif, H.U., Datta, R.: Cloud data transfer and secure data storage. Int. J. Eng. Appl. Sci. (IJEAS) 7(6), 11–15 (2020). https://doi.org/10.31873/IJEAS.7.06.04

Singh, I., Mishra, K.N., Alberti, A.M., Singh, D., Jara, A.: A novel privacy and security framework for the cloud network services. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2015). https://doi.org/10.1109/IMIS.2015.93

Subramaniam, T.K., Deepa, B.: Security attack issues and mitigation techniques in cloud computing environments. Int. J. UbiComp (IJU) 7(1), 1–11 (2016). https://doi.org/10.5121/iju.2016.7101

Taherdoost, H.: A review of technology acceptance and adoption models and theories. Proceedia Manufact. 22, 960–967 (2018). https://doi.org/10.1016/j.promfg.2018.03.137

Downloads

Published

19-05-2023

How to Cite

[1]
R. Murthy Shankeshi, “The Role of AI in Enhancing Data Security and Compliance in Oracle Cloud Infrastructures”, American J Data Sci Artif Intell Innov, vol. 3, pp. 53–67, May 2023, Accessed: Mar. 07, 2026. [Online]. Available: https://ajdsai.org/index.php/publication/article/view/24