Smart Artificial Intelligence Framework for Cloud Centric Systems and Continuous Threat Intelligence Evolution

Main Article Content

Rajabhushanam .C

Abstract

Cloud-centric systems have become the backbone of modern digital infrastructure, enabling scalable, flexible, and cost-efficient computing environments. However, the widespread adoption of cloud technologies has introduced complex cybersecurity challenges, including data breaches, misconfigurations, insider threats, and advanced persistent attacks. This research proposes a smart artificial intelligence (AI) framework designed to enhance security in cloud-centric systems through continuous threat intelligence evolution. The framework integrates machine learning, deep learning, and adaptive analytics to monitor cloud environments, detect anomalies, and predict potential threats in real time. By leveraging dynamic data streams from cloud platforms, the system continuously learns from new attack patterns and updates its threat intelligence models. The proposed approach emphasizes automation, scalability, and proactive defense mechanisms, enabling rapid response to emerging cyber risks. Additionally, the framework incorporates secure data handling, governance, and compliance measures to ensure data integrity and privacy. Experimental evaluation demonstrates improved detection accuracy, reduced response latency, and enhanced adaptability compared to traditional security systems. The study concludes that integrating AI with cloud security infrastructure provides a robust and intelligent solution for safeguarding cloud-based systems against evolving cyber threats.

Article Details

Section

Articles

How to Cite

Smart Artificial Intelligence Framework for Cloud Centric Systems and Continuous Threat Intelligence Evolution. (2023). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(6), 9831-9840. https://doi.org/10.15662/IJRPETM.2023.0606025

References

1. Soundappan, S. J. (2022). AI-based fault detection and isolation for reliability in modern power systems. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(4), 7106-7110.

2. Raja, G. V. (2022). Integrating Network Forensics with Data Mining for Advanced Cybercrime Investigation. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(5), 5321-5326.

3. Mallireddy, S. (2022). Digital services and usage of ServiceNow among patients and citizens living at homes. International Journal of Future Innovative Science and Technology, 5(2), 1–3.

4. Dave, B. L. (2022). Unlocking the power of AI for Salesforce metadata: Migration strategies and business advantages. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(4), 83–92.

5. Potel, R. (2020). AI-Enabled Post-Quantum Solutions for Anti-Counterfeiting and Digital Trust in Global Supply Chains. International Journal of Computer Technology and Electronics Communication, 3(6), 2937-2944.

6. Narayanan, S. (2022). Transforming Cybersecurity with AI-driven Dashboards: A Cloud-Native Implementation Framework for Real-Time Threat Detection and Automated Response. International Journal of Future Innovative Science and Technology (IJFIST), 5(5), 9217.

7. Balamuralidhar Sarabu, V. (2021). System-of-record governance in enterprise retail platforms: Architectural design principles for financial data ownership and consistency. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(2), 1–16.

8. Thumala, S. R. (2022). Importance of Business Continuity and Disaster Recovery (BCDR) Methodologies for Organizations: A Comparison Study between AWS and Azure. International Journal of Science and Research (IJSR), 11(12), 1406-1415.

9. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

10. Myakala, P. K. (2022). Adversarial robustness in transfer learning models. Iconic Research And Engineering Journals, 6(1), 772-779.

11. Sengupta, J. (2019). Automated Inception Network based Cardiac Image Segmentation Analysis. International Journal of Advanced Science and Technology, 28(20), 953-962.

12. Kunadi, S. K. (2022). Building scalable master data management systems for enterprise data platforms. International Journal of Computer Technology and Electronics Communication (IJCTEC), 5(2), 4830–4843.

13. T. K. Nallamothu (2022). Transforming clinical documentation and analytics using Power BI and DAX Copilot. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(4), 7111–7119.

14. Gentyala, R. (2021). The Silent Interruption: Assessing the Impact of an AI Driven Sepsis Alert on Emergency Clinician Cognitive Load and Point-of-Care Efficiency. IACSE - International Journal of Computer Technology (IACSE-IJAIA), 2(1), 7–79.

15. Gopinathan, V. R. (2024). Secure explainable AI on Databricks–SAP cloud for risk-sensitive healthcare analytics and swarm-based QoS control. International Journal of Engineering & Extended Technologies Research (IJEETR), 6(4), 8452-8459.

16. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2 (6), 62–64.

17. Mathew, A. (2022). Leveraging Big Data Analytics to Power AI and ML (Machine Learning) Automation. Educational Research (IJMCER), 4(5), 131-134.

18. Adepu, G. (2022). Machine learning-driven environmental monitoring systems for real-time regulatory compliance and risk detection. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(2), 22–37.

19. Adepu, R. (2022). Building secure multi-cloud infrastructure for mission-critical enterprise workloads. The International Journal of Research Publications in Engineering, Technology and Management, 5(5), 14–32.

20. Lanka, S. (2022). Building smarter security systems with AI: Inside Citrix analytics for security. Journal of Advanced Research Engineering and Technology (JARET), 1(2), 93–109. https://doi.org/10.34218/JARET_01_02_009

21. Sugumar, R. (2025). Unified AI Framework for Predictive Data Engineering and Real Time Prescription and Billing Systems. International Journal of Advanced Engineering Science and Information Technology (IJAESIT), 8(5), 17261.

22. Sammy, F., Chettier, T., Boyina, V., Shingne, H., Saluja, K., Mali, M., ... & Shobana, A. (2025). Deep Learning-Driven Visual Analytics Framework for Next-Generation Environmental Monitoring. Journal of Applied Science and Technology Trends, 114-122.

23. Mathew, A., & Alex, H. (2022). Detect & protect-medical device cybersecurity. Curr. Overview Sci. Technol. Res, 1, 60-68.

24. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.

25. Vankayala, S. C. (2021). Designing an Advanced Quality Assurance Framework to Ensure Accuracy, Regulatory Compliance, and Operational Reliability across End-to-End Mortgage Origination and Underwriting Platforms. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(6), 4034-4044.

26. Appani, C., & Guda, D. P. (2023). Self-supervised representation learning for zero-day attack detection in encrypted network traffic. Computer Fraud & Security, 2023(7), 20–31. Retrieved from: https://computerfraudsecurity.com/index.php/journal/article/view/661

27. Chaturvedi V. (2023). Modern software development with Java, Spring Boot, and Python: A survey of frameworks and best practices. ESP Journal of Engineering & Technology Advancements, 3(4), 188–197.

28. Gupta, S. (2023). Designing fair and transparent AI systems with implementation of algorithms. International Research Journal of Engineering and Technology (IRJET), 10(5). Retrieved April 25, 2026, from https://www.researchgate.net/publication/394311649_Designing_Fair_and_Transparent_AI_Systems_with_Implementation_of_Algorithms

29. Yamsani, N. (2022). Predictive data stewardship as an enterprise control function: Machine learning approaches for quality anticipation and governance. European Journal of Advances in Engineering and Technology, 9(3), 213–223. https://doi.org/10.5281/zenodo.18629342

30. Hossain, M. S., Rahman, M. W., Hossain, M. S., & Ali, M. (2023). Applying Predictive Analytics to Optimize Government Operations and Improve Public Service Delivery in the United States. Applying Predictive Analytics to Optimize Government Operations and Improve Public Service Delivery in the United States, 1(8), 170-196.

31. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

32. Mudunuri, P. R. (2023). Governance-Aware Infrastructure-as-Code for Regulated Research Environments. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(4), 9017-9027.

33. Viswanathan, Venkatraman. "AI-Augmented Decision Intelligence for Enterprise Systems: Integrating Cognitive Analytics for Resource and Talent Optimization." (2023).

34. Vayyasi, N. K. (2023). Optimizing factory maintenance and downtime prediction through Java-driven AI pipelines. International Journal of Research and Applied Innovations (IJRAI), 6(3).

35. Karvannan, R. (2023). Empowering healthcare operations with next-generation compliance and inventory solutions. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(4), 297–313.

36. Anand, L., Krishnan, M. B. M., Senthil Kumar, K. U., & Jeeva, S. (2020). AI multi agent shopping cart system based web development. AIP Conference Proceedings, 2282(1), 020041.

37. Boddupally, H. L. (2022). Toward self-optimizing enterprise applications: AI-guided profiling and performance optimization for C# and SQL-based systems. SSRN. https://doi.org/10.2139/ssrn.6270498