AI-Powered Risk Assessment and Compliance in Cloud Cybersecurity |
||
![]() |
![]() |
|
© 2025 by IJCTT Journal | ||
Volume-73 Issue-3 |
||
Year of Publication : 2025 | ||
Authors : Thiyagarajan Mani Chettier, Venkata Ashok Kumar Boyina, Sandeep Rangineni | ||
DOI : 10.14445/22312803/IJCTT-V73I3P107 |
How to Cite?
Thiyagarajan Mani Chettier, Venkata Ashok Kumar Boyina, Sandeep Rangineni, "AI-Powered Risk Assessment and Compliance in Cloud Cybersecurity," International Journal of Computer Trends and Technology, vol. 73, no. 3, pp. 49-56, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I3P107
Abstract
Cloud Computing, revolutionary for digital infrastructure can potentially allow organizations to function at scale. While Cloud computing has its merits, it comes with new security threats and thus requires elaborate risk assessment and compliance processes. Utilizing ML and AI to improve threat detection, automate compliance monitoring, and reduce vulnerabilities, we present an AI-powered cloud cybersecurity risk assessment and regulation compliance approach. Apply behavioral analytics, anomaly detection, and predictive analytics to detect cyber threats before they happen. Artificial intelligence systems lower response latency to stop security breaches by monitoring data harvested from the cloud system for repeat behaviour patterns indicative of malefaction. The framework’s real-time risk assessment allows organizations to prioritize security actions based on potential effects and probability. AI can sift through huge datasets to identify compliance gaps, recommend remedies, and deliver audit-ready reports while minimizing operational overhead and human error. Scalable architecture and the flexibility to respond to new cybersecurity risks make it an ideal system for use in multi-cloud and hybrid cloud settings. It is a huge advantage for risk identification and compliance monitoring as this system has the potential to learn and adapt over time. This bolsters APT, zero-day, and insider threat defenses. Integrating AI with SIEM systems enhances incident response and real-time threat correlation. Some benefits organizations could enjoy by using AI for compliance management include reduced audit costs, improved security governance, and faster regulatory reporting. The finding indicates the necessity of AI applications to secure cloud environments and recommends further adoption within cybersecurity frameworks. Future studies will focus on improved AI-driven models toward cybersecurity, prioritizing explainability, ethical use of AI, and adapting regulations.
Keywords
Compliance Automation, Cloud Security, Risk Detection AI, Predictive Modelling, Anomaly Detection.
Reference
[1] Clémentine Gritti, Willy Susilo, and Thomas Plantard, “Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy,” Information Security and Privacy: 20th Australasian Conference, Brisbane, QLD, Australia, pp. 395-412, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Debiao He et al., “Insecurity of an Identity-Based Public Auditing Protocol for the Outsourced Data in Cloud Storage,” Information Sciences, vol. 375, pp. 48-53, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Wayne A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th Hawaii International Conference on System Sciences, Kauai, HI, USA, pp. 1-10, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Ru Jia et al., “A Systematic Review of Scheduling Approaches on Multi-Tenancy Cloud Platforms,” Information and Software Technology, vol. 132, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Snehal G. Kene, and Deepti P. Theng, “A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges,” 2nd International Conference on Electronics and Communication Systems, Coimbatore, India, pp. 227-232, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Aiping Li, Shuang Tan, and Yan Jia, “A Method for Achieving Provable Data Integrity in Cloud Computing,” The Journal of Supercomputing, vol. 75, pp. 92-108, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Yongjun Ren et al., “Attributed Based Provable Data Possession in Public Cloud Storage,” Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, pp. 710-713, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Wenting Shen et al., “Light-Weight and Privacy-Preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium,” Journal of Network and Computer Applications, vol. 82, pp. 56-64, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Boyang Wang, Baochun Li, and Hui Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud,” Proceedings of International Conference on Applied Cryptography and Network Security, Berlin, Heidelberg, vol. 7341, pp. 507-525, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Cong Wang et al., “Ensuring Data Storage Security in Cloud Computing in Quality of Service,” Proceedings of WQOS IEEE 17th International Workshop, vol. 1, pp. 1-9, 2009.
[Google Scholar] [Publisher Link]