Threat Mitigation and Privacy Strategies for Secure Artificial Intelligence and Machine Learning Workflows in Cloud Environments

Authors

  • G. Suvarna Kumar Department of IT& CA, Andhra University, Visakhapatnam, Andhra Pradesh, India
  • G. Sandhya Devi Department of CS&SE, Andhra University, Visakhapatnam, Andhra Pradesh, India
  • P. Mohamed Sajid Department of ECE, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, Tamil Nadu, India
  • K. A. Jyostna Department of ECE, CVR College of Engineering, Ibrahimpatnam, Hyderabad, Telangana, India
  • V. Sangeetha Department of Computer Science with Data Analytics, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, India
  • Sateesh Gorikapudi Department of CSE, Koneru Lakshmaiah Education Foundation, Green Fields, Vaddeswaram, Guntur District, Andhra Pradesh, India
  • Tanweer Alam Faculty of Computer and Information Systems, Islamic University of Madinah, Madinah, Saudi Arabia
  • T. Prabhakaran Department of CSE, Joginpally B.R. Engineering College, Hyderabad, Telangana, India
Volume: 15 | Issue: 6 | Pages: 28700-28705 | December 2025 | https://doi.org/10.48084/etasr.12327

Abstract

The adoption of Artificial Intelligence (AI) and Machine Learning (ML) in cloud computing has established new means of scalability and efficiency for data-driven applications. However, such integration also raises security and privacy risks, including adversarial attacks, and is subject to the leakage of sensitive data. To address such issues, this paper proposes a substantial threat mitigation and privacy-protection framework specifically designed for AI/ML workflows deployed on the cloud. The developed framework incorporates adversarial robustness techniques and differential privacy methods to establish a robust security model. Through comparative analysis and extensive experimentation, the framework significantly improves both robustness and privacy. Specifically, it attains 92% accuracy, 85% adversarial robustness, and 90% privacy score, outperforming the state-of-the-art algorithms. The results demonstrate the effectiveness of the proposed methodology for safeguarding AI pipelines in distributed environments, providing a practical foundation for designing secure, privacy-aware cloud-based AI/ML systems.

Keywords:

cloud AI security, adversarial attacks, access control, data poisoning, differential privacy

Downloads

Download data is not yet available.

Author Biographies

K. A. Jyostna, Department of ECE, CVR College of Engineering, Ibrahimpatnam, Hyderabad, Telangana, India

 

 

 

V. Sangeetha, Department of Computer Science with Data Analytics, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, India

 

 

 

References

D. Patel et al., "Cloud Platforms for Developing Generative AI Solutions: A Scoping Review of Tools and Services." arXiv, Dec. 08, 2024.

A. Habbal, M. K. Ali, and M. A. Abuzaraida, "Artificial Intelligence Trust, Risk and Security Management (AI TRiSM): Frameworks, applications, challenges and future research directions," Expert Systems with Applications, vol. 240, Apr. 2024, Art. no. 122442. DOI: https://doi.org/10.1016/j.eswa.2023.122442

A. Saini and R. Sehrawat, "Enhancing Data Security through Machine Learning-based Key Generation and Encryption," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14148–14154, Jun. 2024. DOI: https://doi.org/10.48084/etasr.7181

S. K. Jagatheesaperumal, M. Rahouti, K. Ahmad, A. Al-Fuqaha, and M. Guizani, "The Duo of Artificial Intelligence and Big Data for Industry 4.0: Applications, Techniques, Challenges, and Future Research Directions," IEEE Internet of Things Journal, vol. 9, no. 15, pp. 12861–12885, Aug. 2022. DOI: https://doi.org/10.1109/JIOT.2021.3139827

J. S. Kumar, A. Gupta, S. Tanwar, N. Kumar, and S. Akleylek, "Security enhancement in cellular networks employing D2D friendly jammer for V2V communication," Cluster Computing, vol. 26, no. 2, pp. 865–878, Apr. 2023. DOI: https://doi.org/10.1007/s10586-022-03551-0

M. A. M. Farzaan, M. C. Ghanem, A. El-Hajjar, and D. N. Ratnayake, "AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments." arXiv, Jan. 12, 2025. DOI: https://doi.org/10.1109/TMLCN.2025.3564912

J. Robertson, J. M. Fossaceca, and K. W. Bennett, "A Cloud-Based Computing Framework for Artificial Intelligence Innovation in Support of Multidomain Operations," IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3913–3922, Dec. 2022. DOI: https://doi.org/10.1109/TEM.2021.3088382

V. H. Das Chowdary, A. Shanmukh, T. P. Nikhil, B. S. Kumar, and F. Khan, "DevOps 2.0: Embracing AI/ML, Cloud-Native Development, and a Culture of Continuous Transformation," in 2024 4th International Conference on Pervasive Computing and Social Networking, Salem, India, 2024, pp. 673–679. DOI: https://doi.org/10.1109/ICPCSN62568.2024.00112

S. Tuli, G. Casale, and N. R. Jennings, "MCDS: AI Augmented Workflow Scheduling in Mobile Edge Cloud Computing Systems," IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 11, pp. 2794–2807, Nov. 2022.

E. Zeydan, S. S. Arslan, and M. Liyanage, "Managing Distributed Machine Learning Lifecycle for Healthcare Data in the Cloud," IEEE Access, vol. 12, pp. 115750–115774, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3443520

P. Abinaya and J. S. Kumar, "Assured and Provable Data Expuncturing in cloud using Ciphertext Policy–Attribute Based Encryption (CP-ABE)," Cybernetics and Systems, vol. 55, no. 4, pp. 786–803, May 2024. DOI: https://doi.org/10.1080/01969722.2023.2176654

J. Ejarque et al., "Enabling dynamic and intelligent workflows for HPC, data analytics, and AI convergence," Future Generation Computer Systems, vol. 134, pp. 414–429, Sep. 2022. DOI: https://doi.org/10.1016/j.future.2022.04.014

A. Giannopoulos et al., "Supporting Intelligence in Disaggregated Open Radio Access Networks: Architectural Principles, AI/ML Workflow, and Use Cases," IEEE Access, vol. 10, pp. 39580–39595, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3166160

E. e Oliveira, M. Rodrigues, J. P. Pereira, A. M. Lopes, I. I. Mestric, and S. Bjelogrlic, "Unlabeled learning algorithms and operations: overview and future trends in defense sector," Artificial Intelligence Review, vol. 57, no. 3, Feb. 2024, Art. no. 66. DOI: https://doi.org/10.1007/s10462-023-10692-0

M. Rahouti, D. Lyons, S. K. Jagatheesaperumal, and K. Xiong, "A Decentralized Cooperative Navigation Approach for Visual Homing Networks," IT Professional, vol. 25, no. 6, pp. 71–81, Nov. 2023. DOI: https://doi.org/10.1109/MITP.2023.3323865

"MNIST Dataset." Kaggle. [Online]. Available: https://www.kaggle.com/datasets/hojjatk/mnist-dataset.

W. Cukierski, "CIFAR-10 - Object Recognition in Images." Kaggle, 2013. [Online]. Available: https://kaggle.com/cifar-10.

C. Niloor, R. Agarwal, and P. Mishra, "Using MNIST Dataset for De-Pois Attack and Defence," in Fourth International Conference on Recent Trends in Communication and Intelligent Systems, Jaipur, India, 2023, pp. 213–227. DOI: https://doi.org/10.1007/978-981-99-5792-7_17

X. Cao, M. Rahouti, S. K. Jagatheesaperumal, and K. Xiong, "Psychological Information Sharing Using Ethereum Blockchain and Smart Contracts," in 2023 Fifth International Conference on Blockchain Computing and Applications, Kuwait, Kuwait, 2023, pp. 561–568. DOI: https://doi.org/10.1109/BCCA58897.2023.10338936

M. Uddin, S. Islam, and A. Al-Nemrat, "A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control," IEEE Access, vol. 7, pp. 166676–166689, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2947377

T. Zhu, D. Ye, W. Wang, W. Zhou, and P. S. Yu, "More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence," IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 6, pp. 2824–2843, Jun. 2022. DOI: https://doi.org/10.1109/TKDE.2020.3014246

J. Pang and G. Cheung, "Graph Laplacian Regularization for Image Denoising: Analysis in the Continuous Domain," IEEE Transactions on Image Processing, vol. 26, no. 4, pp. 1770–1785, Apr. 2017. DOI: https://doi.org/10.1109/TIP.2017.2651400

T. Elgamrani, R. Elgaf, and Y. Chtouki, "Adversarial Attack Defense Techniques: A Study of Defensive Distillation and Adversarial Re-Training on CIFAR-10 and MNIST," in 2024 International Conference on Computer and Applications, Cairo, Egypt, 2024, pp. 1–4. DOI: https://doi.org/10.1109/ICCA62237.2024.10927831

J. J. Hathaliya, S. Tanwar, and P. Sharma, "Adversarial learning techniques for security and privacy preservation: A comprehensive review," Security and Privacy, vol. 5, no. 3, May 2022, Art. no. e209. DOI: https://doi.org/10.1002/spy2.209

Downloads

How to Cite

[1]
G. S. Kumar, “Threat Mitigation and Privacy Strategies for Secure Artificial Intelligence and Machine Learning Workflows in Cloud Environments”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 28700–28705, Dec. 2025.

Metrics

Abstract Views: 398
PDF Downloads: 235

Metrics Information