173,99 €
ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering. Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engineering, software engineering, mathematics, and other subjects are all included in robotics. Robots can be employed in a variety of scenarios and for a variety of objectives, but many are now being used in hazardous areas (such as radioactive material inspection, bomb detection, and deactivation), manufacturing operations, or in conditions where humans are unable to live (e.g. in space, underwater, in high heat, and clean up and containment of hazardous materials and radiation). Walking, lifting, speaking, cognition, and any other human activity are all attempted by robots. Many of today's robots are influenced by nature, making bio-inspired robotics a growing area. Defusing explosives, seeking survivors in unstable ruins, and investigating mines and shipwrecks are just a few of the activities that robots are designed to undertake. This groundbreaking new volume presents a Robotic Process Automation (RPA) software technique that makes it simple to create, deploy, and manage software robots that mimic human movements while dealing with digital systems and software. Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch or take a coffee break.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 708
Veröffentlichungsjahr: 2023
Cover
Table of Contents
Series Page
Title Page
Copyright Page
Preface
1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
1.1 Introduction
1.2 Aim of the Study
1.3 Architecture of Cloud Computing
1.4 The Impact of Cloud Computing on Business
1.5 The Benefits of Cloud Computing on Business
1.6 Generic Security Protocol Features
1.7 Cloud Computing Security Protocol Design
1.8 AI Based Cloud Security
1.9 Various Neuronal Network Architectures and Their Types
1.10 Conclusion
Acknowledgement
References
2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
2.1 Introduction
2.2 Aim of the Study
2.3 Motivation for the Study
2.4 Detecting the Dark Web
2.5 Preventing the Dark Web
2.6 Recommendations
2.7 Conclusion
Acknowledgement
References
3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
3.1 Introduction
3.2 Aim of the Study
3.3 Motivation for the Study
3.4 Nature of LASERS
3.5 Ongoing Laser Weapon Projects
3.6 Directed Energy Weapons (DEWs)
3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
3.8 Methodology
3.9 Conclusion
Acknowledgement
References
4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning]
4.1 Introduction
4.2 Aim of the Study
4.3 Motivation for the Study
4.4 Supervised and Unsupervised Machine Learning for UAVs
4.5 Unsupervised Solution
4.6 Conclusion
4.7 Scope for the Future Work
Acknowledgement
References
5 FLASH: Web-Form’s Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web
5.1 Introduction
5.2 Literature Review
5.3 How FLASH Offers Better Results
5.4 Methodology
5.5 Results
5.6 Limitations and Future Work
5.7 Conclusion
References
6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review
6.1 Introduction
6.2 Microstrip Antenna Design
6.3 Challenges of Terahertz Antenna Development
6.4 Antenna Performance Attributes
6.5 Comparative Analysis of Microstrip THZ Antennas
6.6 Conclusion
References
7 Smart Antenna for Home Automation Systems
7.1 Introduction
7.2 Home Automation Antenna Geometry and Robotics Process Automation
7.3 Results for Home Automation Smart Antenna
7.4 Conclusion
References
8 Special Military Application Antenna for Robotics Process Automation
8.1 Introduction
8.2 Special Military Application Antenna for Robotics Process Automation
8.3 Results for Special Military Application Antenna
8.4 Conclusion
References
9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda
9.1 Introduction
9.2 Conceptual Foundation
9.3 Motivation
9.4 Blockchain and Robotics Overview
9.5 Human-Robot Interaction
9.6 Applications of HRI
9.7 Transactions between Robots and Human Beings
9.8 Escrow Services
9.9 Challenges for HRI
9.10 Discussion and Future Work
9.11 Conclusion
References
10 Secured Automation in Business Processes
10.1 Introduction
10.2 Literature Survey
10.3 Background
10.4 Proposed Model
10.5 Analysis of the Work
10.6 Conclusion
References
11 Future of Business Organizations Based on Robotic Process Automation: A Review
11.1 Introduction
11.2 Literature Review
11.3 Technology: A Need of Robotic Process Automation
11.4 Business Enterprise
11.5 Conclusion and Future Scope
References
12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis
12.1 Introduction
12.2 FER Method Review Based Analysis
12.3 Feature Extraction Techniques
12.4 Conclusion
References
13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic
13.1 Introduction
13.2 Types of AI Relevant to Healthcare
13.3 Diagnosis and Treatment Application
13.4 Limitation of Artificial Intelligence in Medical Science
13.5 The Future of AI in Healthcare
13.6 Conclusion
References
14 Revolutionizing Modern Automated Technology with WEB 3.0
14.1 Introduction
14.2 What is WEB 3.0: Definitions
14.3 Features & Characteristics
14.4 Implementation
14.5 Inventions around Modern Technology
14.6 Conclusion
Acknowledgement
References
15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication
15.1 Introduction
15.2 Blockchain
15.3 Internet of Things
15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence
15.5 Block Chain for Vehicular IoT
15.6 Convergence of IoT with Cyber-Physical Systems
15.7 Conclusion
References
16 Robots, Cyborgs, and Modern Society: Future of Society 5.0
16.1 Introduction
16.2 Comparing Humans, Cyborgs, and Robots
16.3 Some Philosophical Aspects
16.4 Reproduction or Replication
16.5 Future of our Society
16.6 Implications
16.7 Conclusion
References
17 Security and Privacy of Blockchain-Based Robotics System
17.1 Introduction
17.2 Security and Privacy Concerns
17.3 Security and Privacy Requirements
17.4 Consensus Algorithms
17.5 Privacy and Security Techniques
17.6 Conclusion
References
18 Digital Footprints: Opportunities and Challenges for Online Robotic Technologies
18.1 Introduction
18.2 Proposed Methodology
18.3 Conclusion
Acknowledgement
References
19 SOCIAL MEDIA: The 21st Century’s Latest Addiction Detracted Using Robotic Technology
19.1 Introduction
19.2 Proposed Methodology
19.3 Importance and Value of Internet
19.4 Effects of Online Addiction on Society
19.5 Challenges to Reduce Social Media Addiction
19.6 Challenges Future Impact of Social Media Addiction on Youth
19.7 Conclusion
Acknowledgement
References
20 Future of Digital Work Force in Robotic Process Automation
20.1 Introduction
20.2 Robotic Process Automation
20.3 Robotic Process Automation Operations
20.4 RPA-Operating Model Design
20.5 Who is Who in RPA Business?
20.6 Conclusion
References
21 Evolutionary Survey on Robotic Process Automation and Artificial Intelligence: Industry 4.0
21.1 Introduction
21.2 Robotic Process Automation
21.3 Artificial Intelligence and Industry 4.0
21.4 RPA Tools with IA Support
21.5 RPA Tools with IA Support
21.6 Conclusions
References
22 Advanced Method of Polygraphic Substitution Cipher Using an Automation System for Non-Invertible Matrices Key
22.1 Introduction
22.2 Significance of Advanced Methods of a Polygraphic Substitution Cipher
22.3 Related Work
22.4 Proposed Methodology
22.5 Exploration
22.6 Conclusions
References
23 Intelligence System and Internet of Things (IoT) Based Smart Manufacturing Industries
23.1 Introduction
23.2 Development of Artificial Intelligence
23.3 AI Evolution from Intelligent Manufacturing to Smart Manufacturing
23.4 IM and SM Comparison
23.5 Further Smart Manufacturing Development for Industry 4.0
23.6 Conclusion
References
24 E-Healthcare Systems Based on Blockchain Technology with Privacy
24.1 Introduction
24.2 Blockchains in Healthcare
24.3 Regulations and EHR Privacy
24.4 Issues with Migration
24.5 Blockchains: Unified or Multiple
24.6 Formation of a Unanimity
24.7 Access Control & Users
24.8 Conclusion
References
25 An Intelligent Machine Learning System Based on Blockchain for Smart Health Care
25.1 Introduction
25.2 Review of Literature
25.3 Use of Blockchain in the Healthcare System
25.4 Machine Learning Algorithms in the Medical Industry
25.5 Blockchain and Artificial Intelligence Solutions
25.6 Conclusions
References
26 Industry 4.0 Uses Robotic Methodology in Mechanization Based on Artificial Intelligence
26.1 Introduction
26.2 Mechanization of Robotic Processes
26.3 Industry 4.0 and Artificial Intelligence
26.4 RPM Outfits that Sustenance Artificial Intelligence
26.5 Discussion
26.6 Conclusions
References
27 RPA Using UiPATH in the Context of Next Generation Automation
27.1 Introduction
27.2 Traditional Approach vs RPA Approach
27.3 Related Work
27.4 Applications of RPA
27.5 Intelligent Process Automation
27.6 RPA and Blockchain
27.7 Implementation
27.8 Conclusion
References
About the Editors
Index
Also of Interest
End User License Agreement
Chapter 3
Table 3.1
Table 3.2 LIDAR guided LASER weapon system requirements.
Chapter 5
Table 5.1 Summary of reductionist analysis [31].
Table 5.2 Feature distribution over literature of papers.
Table 5.3 Criteria for form classification.
Table 5.4 Manual surface web dataset.
Table 5.5 Manual dark web dataset.
Table 5.6 Accuracy of form classification on manual surface web.
Table 5.7 Correlation matrix for manual surface web dataset.
Table 5.8 Accuracy of form classification on manual dark web dataset.
Table 5.9 Correlation matrix for manual dark web dataset.
Table 5.10 results of form filling for surface web dataset.
Table 5.11 Results of form filling for dark web dataset.
Table 5.12 Automated surface web dataset.
Table 5.13 Automated dark web dataset.
Table 5.14 Classification of forms on automated surface web dataset.
Table 5.15 Classification of forms on automated dark web dataset.
Table 5.16 Input tag field distribution for automated surface web dataset.
Table 5.17 Input tag field distribution for automated dark web dataset.
Chapter 6
Table 6.1 Performance comparison of microstrip terahertz antennas.
Chapter 7
Table 7.1 Proposed smart antenna for home automation design description.
Table 7.2 Comparison of published smart antennas for home automation systems.
Table 7.3 Robotics process automation ‘smart antenna for home automation syste...
Chapter 8
Table 8.1 Geometry parameters of special military application antenna.
Table 8.2 Comparison of published planar antennas.
Table 8.3 Robotics process automation smart antenna for military application a...
Chapter 10
Table 10.1 Algorithm to generate hash code for identification of individual/ c...
Table 10.2 Generating identity bits for next cycle.
Table 10.3 Generating the hash code for the activity.
Chapter 12
Table 12.1 Comparative analysis from tabular structure.
Chapter 17
Table 17.1 Comparison of the consensus algorithms.
Chapter 21
Table 21.1 Comparison of goals associated to AI and various technologies.
Chapter 22
Table 22.1 Different studies of encryption/decryption techniques using automat...
Chapter 23
Table 23.1 AI development.
Table 23.2 Comparison of IM and SM.
Chapter 26
Table 26.1 Comparison of AI Goals.
Chapter 27
Table 27.1 Comparison of traditional approach vs RPA approach.
Chapter 1
Figure 1.1 Cloud computing.
Figure 1.2 Cloud computing and security protocols.
Figure 1.3 Cloud computing structure.
Chapter 3
Figure 3.1 Communication links between different objects with reference to the...
Figure 3.2 Faster R-CNN model for army position locating.
Figure 3.3 YOLO model for helmet and safety vest classification.
Figure 3.4 DenseNet model for fastness of chin strap on helmet recognition.
Chapter 5
Figure 5.1 Flowchart for FLASH.
Figure 5.2 Identifying forms and extracting fields.
Figure 5.3 Interpretation of form fields.
Figure 5.4 Generating and sending report.
Figure 5.5 Surface web results.
Figure 5.6 Dark web results.
Chapter 6
Figure 6.1 Terahertz radiation spectrum [3].
Figure 6.2 Structure of microstrip antenna.
Figure 6.3 Shapes of microstrip patch elements.
Figure 6.4 Microstrip antenna feeds.
Figure 6.5 Terahertz antenna challenges.
Chapter 7
Figure 7.1 Block diagram of home automation system using smart antenna.
Figure 7.2 Front view of 5G antenna.
Figure 7.3 Back view of 5G antenna.
Figure 7.4 Side view of 5G antenna.
Figure 7.5 Return loss (S
11
) curve.
Figure 7.6 VSWR curve.
Figure 7.7 Gain of antenna.
Figure 7.8 Surface current distribution of antenna.
Chapter 8
Figure 8.1 Configuration of special military application antenna.
Figure 8.2 Prospective view of special military application antenna.
Figure 8.3 8 Stages of evolution of special military application antenna.
Figure 8.4 Gain of special military application antenna at 3 different frequen...
Figure 8.5 Radiation pattern of special military application antenna at 2 diff...
Figure 8.6 Simulated VSWR and S11 curve.
Figure 8.7 Surface current distribution.
Chapter 9
Figure 9.1 Human versus robot chess game and betting sequence diagram.
Figure 9.2 Example of autonomous vehicle smart contract ownership.
Figure 9.3 Smart contract partial interface definition.
Figure 9.4 Unilateral contract flow.
Chapter 10
Figure 10.1 Architecture of merkle tree in blockchain (Chen, Chou, & Chou, 201...
Figure 10.2 Comparison of security in the system.
Chapter 12
Figure 12.1 Facial expression recognition process.
Figure 12.2 Various FER methods’ accuracy levels.
Chapter 15
Figure 15.1 Sample Number – 1
st
Figure 15.2 Sample Number – 2
nd
.
Figure 15.3 Sample Number – 3
rd
.
Figure 15.4 Sample Number – 4
th
.
Chapter 17
Figure 17.1 Architecture of blockchain.
Figure 17.2 Blockchain-based cryptocurrency transaction.
Figure 17.3 Coin mixer.
Chapter 18
Figure 18.1 Carbon footprint comparison.
Chapter 19
Figure 19.1 Social network overview.
Figure 19.2 User activity design.
Chapter 20
Figure 20.1 RPA modelling.
Figure 20.2 System compliance.
Figure 20.3 RPA charting.
Chapter 22
Figure 22.1 Automation system perception.
Chapter 23
Figure 23.1 AI evolution from perspectives of content and control.
Figure 23.2 Intelligent manufacturing evolution along with AI.
Figure 23.3 Smart manufacturing exemplified as cyber-physical production syste...
Figure 23.4 Intelligent manufacturing versus smart manufacturing.
Figure 23.5 Wisdom manufacturing vs. other emerging manufacturing models with ...
Figure 23.6 Framework for SCPS-based manufacturing.
Chapter 24
Figure 24.1 Blockchain framework for business.
Figure 24.2 Blockchain based framework of e-healthcare model.
Figure 24.3 Solution for cooperative e-healthcare interoperability.
Figure 24.4 Increase in Ledger’s RAM use.
Chapter 25
Figure 25.1 Blockchain healthcare management system overview.
Figure 25.2 Architecture of blockchain and artificial intelligence in smart he...
Chapter 26
Figure 26.1 Structural design of industry 4.0.
Chapter 27
Figure 27.1 Process automation structure.
Figure 27.2 Destination folder.
Figure 27.3 Email automation.
Figure 27.4 Mail sequence.
Figure 27.5 Results after the bot is executed.
Figure 27.6 Source folder named “Resources”.
Figure 27.7 Moving file path.
Figure 27.8 Spreadsheet
Cover Page
Series Page
Title Page
Copyright Page
Preface
Table of Contents
Begin Reading
About the Editors
Index
Also of Interest
WILEY END USER LICENSE AGREEMENT
ii
iii
iv
xix
xx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
427
428
429
430
Scrivener Publishing100 Cummings Center, Suite 541JBeverly, MA 01915-6106
Publishers at ScrivenerMartin Scrivener ([email protected])Phillip Carmical ([email protected])
Edited by
Romil RawatRajesh Kumar ChakrawartiSanjaya Kumar SarangiRahul ChoudharyAnand Singh Gadwal
and
Vivek Bhardwaj
This edition first published 2023 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA© 2023 Scrivener Publishing LLCFor more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-394-16618-3
Front cover images supplied by Pixabay.comCover design by Russell Richardson
The book discusses advanced working with digital systems and software. The book’s RPA (Robotic Process Automation) software approach makes it straightforward to build, use, and manage software robots that replicate human motion. Software robots are like humans in that they can read what’s on a screen, input the right keys, navigate systems, find, and extract data, and do a wide range of specified tasks. Without the need to get up and stretch or take a coffee break, software robots can complete the task faster and more accurately than people. Robotics encompasses a variety of disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering.
The science of building robots that can stand in for people and replicate their behavior is known as robotics. Robots are applicable to a wide range of situations and for a wide range of purposes, although many are currently used in dangerous environments (such as particle inspection, bomb detection, and disposal), manufacturing processes, or in environments where humans cannot survive (e.g., in space, underwater, in high heat, and for the clean-up and containment of hazardous materials and radiation). Robots try every human behavior, including moving, lifting, talking, thinking, and cognition. Bio-inspired automation is a developing field since so many of today’s robots are affected by nature. Some of the tasks include disarming explosives, searching for people amid unstable ruins, and looking into mines and wrecks.
The book’s primary objective is:
To present current trends and implications for robotics, big data, cloud computing, virtual reality, and digital communication technologies using robotic process automation systems.
To go through the current state of advanced modelling and the RPA project structure.
To analyse and offer innovative models, strategies, and initiatives for hardware and digital platforms.
Srinivasa Rao Gundu1, Charanarur Panem2* and J. Vijaylaxmi3
1Department of Computer Science, Government Degree College-Sitaphalmandi, Hyderabad, Telangana, India
2School of Cyber Security and Digital Forensic, National Forensic Sciences University, Goa Campus, Goa, India
3PVKK Degree & PG College, Anantapur, Andhra Pradesh, India
Since cloud computing is becoming an increasingly vital component of both big and small businesses, ensuring its integrity and confidentiality has emerged as a top priority in this space. There are a few different approaches that may be used to secure the cloud. Techniques are implemented through protocols. The protocols that are used in cloud computing may also be used in other types of security systems, such as authentication systems, mailing systems, and cryptonet systems. Cloud computing has challenges in the areas of security on-demand application resource management, and self-monitoring without delay. These challenges arise because of the massive amount of data that is made accessible via cloud computing. When it comes to improving the capabilities of security and privacy in cloud storage, Artificial Intelligence (AI) and machine learning have the potential to play a pivotal role. Therefore, incorporating methods for machine learning into the cloud that already exists with the potential to give enhanced efficiency.
Keywords: Simple Storage Service (S3), Elastic Compute Cloud (EC2), artificial neural network, cryptography, information and communication technology
When it comes to cloud computing, several factors are working together to speed up its arrival and make it a reality sooner rather than later. Because of the development of more reasonably priced and powerful processors and the software as a service (SaaS) computing architecture, conventional data centres are being transformed into massive computing service pools (MCS). Because of the network’s increased capacity and robust and flexible connections, users may now subscribe to high-quality services that employ data and software solely hosted in faraway data centres.
When data is moved to the cloud, users save time and money by not having to worry about maintaining local hardware. Moving data to the cloud is beneficial to users. There are two well-known organizations that provide cloud computing services: Amazon S3 and Amazon Elastic Compute Cloud (EC2) [1].
Additionally, this shift in computing platforms frees local computers from the burden of storing their own data, making it feasible for modern internet-based online services to supply enormous amounts of storage space and computer capabilities that may be customized.
Consequently, the cloud service providers of the users control both the availability and the integrity of the users’ data as a direct consequence of this. There are several reasons why cloud computing presents substantial security issues. Data security is one of these issues, which has long been recognized as an important part of service quality. To begin, because users no longer have authority over their data, traditional cryptographic primitives cannot be directly employed in a cloud computing context [2].
It is because of this that cloud storage verification must be done without direct access to all of the data that is stored in the cloud. It becomes increasingly difficult to prove the authenticity of cloud-stored data when you consider the variety of data types that each user has access to, as well as their need for long-term confidence that their data is safe. Second, cloud computing is more than just a third-party data storage facility.
The objective of this project is to examine whether or not Artificial Intelligence (AI) and machine learning can play a major role in enhancing cloud storage facilities in terms of both security and privacy.
A cloud computing architecture is a collection of cloud components that are only loosely linked to one another. The two components that may be separated to construct the cloud architecture are the front-end and the back-end.
A network, typically the Internet, serves as the linking mechanism between the system’s two ends. Figure 1.1 depicts a graphical representation of cloud computing architecture.
The “front end” of a cloud computing system is the element that interacts with users, or clients. It is made up of the interfaces and programmes needed to access cloud computing platforms, such as a web browser, and its primary component is known as the software stack.
In the background, cloud computing is often referred to as a system’s “back end.” It has all of the resources necessary to deliver cloud computing services. It includes, among other things, massive amounts of data storage, virtual machines, security measures, services, deployment methods, and servers [3].
Figure 1.1 Cloud computing.
In the world of information technology and cloud computing has become indispensable. Despite its popularity, many firms are reluctant to implement and utilize cloud computing for commercial and operational reasons due to uncertainty about its cost and security consequences. The fundamental appeal of cloud computing for organizations is its cost-effective-ness, whereas the most serious concern is security risks. Cloud computing security is a major concern in the workplace. In addition, various critical implications that enterprises should consider while using cloud computing are explored, as well as security methods for avoiding the highlighted cost and security difficulties [4].
Cloud computing has become a widely accepted and ubiquitous paradigm for service-oriented computing in which computer infrastructure and solutions are provided as a service. Through its characteristics (e.g., self-service on-demand, wide network access, resource pooling, and so on), the cloud has revolutionized the abstraction and use of computer infrastructure, making cloud computing popular. Security, on the other hand, is the most pressing issue and worries about cloud computing are growing as we see more and more innovative cloud computing platforms [5].
Cloud services, software, and infrastructure are clearly becoming more popular in the post-COVID-19 environment, since they can be accessed at any time and from any location. Several research projects and advancements have been suggested to address security threats. Nonetheless, new approaches to make the cloud safer have yet to be discovered. The majority of current cloud security approaches do not address the new sorts of security concerns that cloud computing infrastructure may encounter. As a result, they are unable to identify attacks or vulnerabilities that may originate from either the cloud service provider or the customer [6].
Cloud computing is based on the notion of providing all feasible services, such as software, IT infrastructure, and services to clients over the internet. Cloud computing systems are heterogeneous, large-scale groupings of autonomous computers with a flexible computational architecture. This technology is on the rise since it is becoming the preferred option for firms who do not want to deal with system maintenance or a development team in-house. Many companies, including Amazon Web Services (AWS), Google, IBM, Sun Microsystems, Microsoft, and others, are creating effective cloud products and technologies. Customers and the enterprise exchange data through virtual data centres with cloud technologies [7].
Furthermore, just a few previous studies have looked at the many tiers of cloud architecture. This study did an exhaustive assessment on the challenges that the cloud computing infrastructure encounters at various levels due to the relevance of examining such concerns (application, host, network, and data level). It also discusses the current solutions that have been employed to address these concerns. In addition, this report identifies certain outstanding difficulties that need to be addressed as well as future research prospects [8].
The term “cloud computing” may apply to both a platform, as well as a specific kind of application. The data of both users and corporations is kept safe on servers located in the cloud. The term may also apply to applications that may be downloaded from many websites on the internet. Cloud applications are stored on robust servers that are located in large data centres. These servers also host websites and online services. Several businesses in the information technology sector, including Google, Amazon, Microsoft, and others, are developing and marketing products and services that are hosted on the cloud [9].
Cloud computing has various benefits for enterprises, but a few stick out:
Some of the cost advantages include decreased investment on technology infrastructure, lower capital costs, related savings, and convenience savings.
Some of the technological benefits include reducing maintenance, innovating in technology, devising diversity, and so on. Implementation is straightforward, modification is straightforward, and storage is expanded. Advantages for businesses, customization, adaptability, agility, creativity, selection, and service quality are all important considerations in maintaining vigilance and keeping ahead of the curve [11].
Generic security protocols as security system enablers offer network security services to various components of a cloud computing environment. These services are provided using generic security protocols. Initial local user authentication protocol, remote user authentication protocol, Single-Sign-On protocol, consuming protocol, cloud trust protocol, secure sessions protocol, and file transfer protocol are used.
Figure 1.2 Cloud computing and security protocols.
The protocols are based on the concepts of generic security objects and a modular security strategy. Each protocol is functionally complete, easy to integrate with other components, and transparent in terms of security credentials and characteristics. They also provide the same set of secure network services to all components of the cryptonet system. The Figure 1.2 shows about the cloud computing and security protocols architecture details.
Security protocols are designed in a modular fashion, with each module using a distinct implementation of the idea of generic security objects. This section provides an overview of general cloud computing protocols, as well as various security measures such as the cryptonet system.
The cloud may be used to store and access a broad range of file types inside an organization. Because a file may include any kind of digital information, such as a written document, image, artwork, video, sound, or piece of software, files can be transferred via the File Transfer Protocol (FTP) service. The File Transfer Protocol (FTP) is a standard protocol for sending data from one computer to another via the Internet. FTP is used to allow users to move files to the cloud. The user information comprises of the username and password, as well as the home directory. The File Transfer Protocol (FTP) is a file distribution protocol that may retrieve data both locally and remotely. FTP was formerly utilised to provide a locking scheme for both cloud and local data, but that practice has since been abandoned.
Users may authenticate themselves on a local level using the LUAP protocol. The local user authentication technique is used in cloud computing and other security systems. The local user authentication method is included within the system’s login module. It works with both the username/password authentication mechanism and the certificate-based authentication approach.
The workstation does an automatic examination of the installation environment and settings as soon as the operating system is initiated and then determines the suitable protocol. In order to activate, our system needs a user’s Personal Identification Number (PIN) and if set for username/ password authentication, it may additionally require the user’s fingerprint in addition to the PIN. It communicates with the Security Applet to get the username and password, then provides those credentials to the operating system’s native login mechanism. In order to accomplish authentication, the login module will query the user accounts database.
This protocol was developed with the supplier and the client in mind from the beginning. This protocol addresses concerns about privacy, reliability, and security. Computing in the cloud provides consumers and businesses with delivery platforms that are cost-effective, scalable, adaptable, and have a track record of success. The software-as-a-service model, more often known as SaaS, has the potential to save costs associated with the creation and maintenance of both hardware and software. Platform-as-a-service, also known as PaaS, has the potential to lower costs and simplify the process of acquiring, storing, and administering the software and hardware components of a platform. As a consequence of this, the consumption protocol is a key component to consider in designing the architecture of cloud computing. Cloud computing is presently being used by a very diverse assortment of companies, ranging in size from very small to very big.
The RUAP protocol allows users to authenticate themselves from a remote location. Cloud computing is a newer kind of computer system that allows users to keep their work on the cloud and then upload and retrieve it as required. Cloud computing is rapidly gaining popularity, but there are still substantial challenges to overcome, such as security and privacy concerns.
Cloud computing is a resource that is available to everybody, which means that a user must connect to the cloud server using open networks in order to utilize it. In the event that a secure system is not built, a number of potential vulnerabilities might be exposed. It is possible for an attacker to have access to the personal information of a user. Because of this, one of the most significant challenges in cloud computing is maintaining the anonymity of users. The remote user authentication protocol is used as a security technique in cloud computing environments in order to ensure that data transmissions are kept secure.
SCT is a protocol that provides secure data transfer over the internet. The usage of cloud computing has grown in popularity as a result of the many advantages it provides. Small and large businesses alike are increasingly turning to cloud computing services to save costs and streamline operations. Encrypted data transport is required. There are several security concerns to be worried about in the context of cloud computing.
It is vital to interact in a secure way in order to resolve these challenges. Both the user datagram protocol (UDP) and the transmission control protocol (TCP) employ the secure transmission cloud protocol (UDP). It is commonly regarded as a cutting-edge protocol due to its ability to handle a broad range of infrastructure requirements for optimal data transfer over high-speed networks. UDP, or the User Datagram Protocol, is being used to build secure cloud communication protocols (UDT).
The Cloud Trust Protocol (CTP) is a way that cloud clients may use to request digital data from cloud service providers and subsequently receive that data. This strategy is used to build a user’s faith in the owner of the cloud. Using this protocol, you may be able to create a secure method in a cloud computing environment. The usage of this protocol may improve the field of digital trust. Digital trust is the system that assures the security of digitally recorded information. Transparency in information is the foundation for digital trust, and as such, it is the key driver of value collection and return. CTP is used to establish digital trust between a cloud computing client and the provider, as well as to give transparency about the provider’s configuration vulnerabilities, authorization, accountability, and operational status conditions. This is performed by using cloud computing.
Cloud computing and cloud protocol are two of today’s most well-known and fastest evolving technologies. They offer a highly reliable service architecture that can deliver cloud-based integrated services such as on-demand resource computation, resource or data storage or cumulative storage, and exceptionally fast network connectivity. It is probable that it will create a system that is quick and unquestionably successful, needing little in terms of resource management activities and providing an interface for service providers, allowing one to get effective cloud-based services via the usage of internet services.
Each time the client accesses one of today’s modern applications, they must memorize and use a new set of credentials. It may be difficult for a company to keep track of the various authentication methods and databases, particularly when each one is utilised by a different kind of organization. As a consequence, we want a dependable protocol that permits speedy sign-on, which will eventually result in a protocol for single sign-on. Clients may utilize a single-on protocol to perform a single sign-on to an identity provider that is trusted by the application that they want to access. Customers no longer need to confirm their identities to a variety of different applications several times, nor do they need to utilize various authentication techniques for each of their apps thanks to the single sign-on protocol.
After the single-sign-on protocol has been successfully established, the secure session protocol is used to offer a session in cloud computing and other security systems. Other security systems may also utilize this protocol. The implementation of the single-sign-on protocol was fruitful, therefore this is the natural next step. The usage of a key exchange certificate may allow for the construction of the protocols necessary for a secure connection. After the key exchange certificate has been installed on both the client and the cloud server, it will be possible for the client and the cloud server to securely swap session-keys and session-ids with one another. A session key is used by the application server’s session protocol in order to facilitate the process of controlling the characteristics of encrypted sessions.
A session key is a randomly generated encryption and decryption key that is used to guarantee the security of a communications session between a user and another computer or between a client and a server. This might happen between a client and a server. Session keys are also known as symmetric keys. This is because the same key is used for both encryption and decryption.
This approach, known as session key derivation, is used to generate a session key from a hash value. To do this, the cryptderive key function is used. The key is encrypted using the recipient’s public key throughout the session and then included in each message transmitted. Because the amount of security given by session keys is related to how often they are used, those keys are renewed on a regular basis. A distinct session key may be used for each individual interaction.
In the context of cloud computing, the authorization protocol allows the customer, as well as the service provider to have more control over the level of permit security. The standard known as XACML is used as the foundation for our security system’s authorization rules. We used a system called Function-Based Access Control, which denotes that an authorized person, such as a Security Administrator, is the one who organizes a group and decides the access level, role, and permissible activities for each individual member of the group.
A Policy Token with a Target object, which is used to determine the role that each individual member of the group plays, is produced by the Security Administrator. The target consists of the name of a group member, the name of a resource, and the activities that a group member is permitted to do in accordance with the resource authorization policy that has been set.
Cooperative cryptonet and cloud applications employ key exchange protocols to share group keys. Generic Key Distribution (GKD) complies to the GSAKMP standard. GKD manufactures, distributes, and rekeys keys.
Key exchange protocols are used to exchange group keys between cryptonet and cloud computing applications that operate in a cooperative environment. Generic Key Distribution (GKD) was developed to fulfill this need and adheres to the GSAKMP standard. GKD is accountable for all facets of key production, distribution, and rekeying.
GKD supports both Push and Pull operations, enabling the deployment of shared keys. In addition, it distributes keys in combination with the Secure Application Server. This module uses the PEP component of an application server to create shared-key authorization constraints since it acts as a component. When a group member requests a group-key, he or she establishes a secure connection to the Secure Application Server using Single Sign-On.
The group member used a smart card to access the Secure Application Server’s PEP in order to acquire a SAML ticket. After a successful authorization, GKD will transmit the group-key across a secure communication channel to the authorized member of the group. The two kinds of cryptographic keys are secret keys and pairs of public/private keys. The safest method is using secret keys.
A number of other keys are used in cloud computing, including public/ private authentication and signature keys, public/private key establishment pairs, symmetric encryption and decryption keys, and symmetric message authentication codes. Public/private authentication, private/private signature, public/private key establishment, and symmetric key wrapping are all instances in which these pairs of keys are used in this way.
The group member uses a smart card to access the Secure Application Server’s PEP to acquire a SAML ticket. After successful authorization, GKD sends the group-key via a secure channel to the member. Cryptographic keys may be secret or public/private. Secret keys are the most secure.
Cloud computing uses public/private authentication and signature keys, public/private key establishment pairs, symmetric encryption/decryption keys, and symmetric message authentication codes. This includes public/ private authentication, private/private signature, public/private key establishment, and symmetric key wrapping. The Figure 1.3 shows about the cloud computing structure with sharing platforms.
Figure 1.3 Cloud computing structure.
Artificial intelligence (AI)[10] has shown to be an essential component in the disciplines of cyber security and cloud computing security as we go ahead into the era of automation[12]. In light of the fact that AI is capable of rapid learning, it is of the utmost importance to concentrate on finding ways that AI may both improve security and specify how standards can be set around the appropriate use of it. This will ensure that businesses are prepared for the further development of AI.
The term “artificial intelligence” (AI) refers to software developed for computers that has the ability to solve problems and reason in the same way that a human would. The great majority of productive research and development that has been accomplished up to this point may be attributed to the field of machine learning (ML), which is a subfield of artificial intelligence that focuses on training computers to learn by applying algorithms to data.
The phrases “machine learning” (ML) and “artificial intelligence” (AI) are sometimes used interchangeably. AI stands for “artificial intelligence.” An issue must be able to be solved using data and there must be a sufficient amount of relevant data that can be acquired for it to be evaluated for a solution utilising artificial intelligence or machine learning.
In addition, there must be access to a large enough amount of computer power in order to complete the essential processing in a time frame that is acceptable.
The volume of data [13, 14] generated by cyber security [15, 16] systems is so large that no human team could possibly hope to process and evaluate it all. In order to identify potentially hazardous scenarios, machine learning algorithms examine all of this information. The more data it examines, the more patterns it finds and learns, which it can then use to identify deviations from the typical pattern flow. The more data it analyses, the more patterns it [17] finds and learns. These alterations have the potential to be seen as cyber threats [18].
For instance, machine learning keeps a record of activities that are regarded as typical, such as the time and date at which workers check in to their respective systems, the information that they often view, and many other traffic patterns and user behaviors. There are several circumstances in which these limits do not apply, such as being able to log on in the middle of the night.
As a direct result of this, possible dangers may be identified and dealt within a far shorter amount of time. Artificial intelligence may be used, using a strategy that is more data-driven, to uncover flaws and vulnerabilities that are now being exploited or that may be exploited in the future and to provide proactive warnings on such weaknesses and vulnerabilities. In order for this to operate, data that is entering and leaving protected end-points is analyzed and known behaviors and predictive analytics are used to locate and identify potential threats.
When AI and machine learning technologies analyze data produced by systems and discover abnormalities, they may take a number of different actions in response, like alerting a person, blocking a specific user, or doing something else entirely. These tactics often result in events being noticed and halted within a matter of hours, therefore putting a stop to the transmission of potentially dangerous code and averting a data breach. Businesses may be able to gain days of notice and time to respond in advance of security issues by using this method, which involves reviewing and integrating data across geographies in real-time.
There are several security systems that can alert you to possible dangers or abnormalities. but automated solutions may eliminate a significant portion of this background noise, allowing you to concentrate on what really matters. When technologies like AI and machine learning are used to perform regular duties and first-level security assessments, security personnel are freed up to concentrate on more major or complicated risks.
This does not imply that these technologies can take the position of human analysts, however, since cyber assaults are often the result of a mix of human and machine activity, these attacks need reactions from both humans and machines. On the other hand, it enables analysts to prioritize their workload and complete their jobs in a more timely manner. To facilitate their business activities, corporations often make use of hundreds or even thousands of interconnected programs. Traditional computer systems store data in a variety of locations, which makes it difficult to ensure that all of those locations are in sync with one another.
With multitenancy Software as a Service (SaaS), which saves human resource, financial, and planning data in one application, all of this is much easier. This central design has many advantages, including the fact that all systems function under the same framework, which eliminates data inconsistencies. It also bridges the divide between the system and those who use it. Access control, on the other hand, must be prioritized.
Because today’s workforce is equipped with a range of devices, data is dispersed across several access points, increasing the risk of vulnerability. By prioritizing an access solution that incorporates inspection applications, establishing permissions, and defining rules, the appropriate individuals may have access to the tools they need to operate efficiently.
The ever-increasing volume of data that is being collected and processed at ever-increasing rates is a direct result of the ever-increasing number of internet-connected gadgets. This is especially critical in the case of an emergency requiring an instant reaction. When it comes to processing large amounts of data, the length of time it takes has become longer and longer.
The current cloud architecture is not the ideal solution for dealing with these circumstances since the data is routed to a variety of faraway cloud centres. An increase in productivity may be realized by adding machine learning algorithms to an already existent cloud. A huge amount of data is also available on the cloud that may be fed into machine learning algorithms.
In machine learning, clustering is a fundamental technique for organizing and categorizing data. “Clustering” is a term used to describe this basic process, which may subsequently be refined with additional cognitive and predictive algorithms. Machine learning and artificial intelligence techniques have just recently been used by data scientists for cloud computing.
Examples of Keras-based services include Amazon Web Services, IBM Watson, and Microsoft Cognitive AI. Machine learning and artificial intelligence also play a crucial role in addressing the requirements for computing that is both effective and efficient in this day and age of Internet of Things (IoT), Big Data Analytics, and Blockchain.
There are three distinct categories of network architectures, which are as follows:
Single-Layer Feed-Forward Networks: The input layer of a network with a single layer of feed-forwarding is composed of source nodes and the neurons that are produced are the output. This is a network that uses feed forwarding.
Multilayer Feed Forward Networks: This network simply adds an additional layer that is concealed from view. A higher degree of statistic may be accomplished thanks to the hidden layer that is being used.
Recurrent Network: This network has at least one feedback loop in its structure. This loop, which boosts a neuron’s ability for learning by feeding its output back into its own input, is shown in
Figure 1.1
. Additionally, it results in enhanced performance.
Security methods used for authentication, secure communication, and permissions were examined as part of this study. Along with established technical and legal security requirements, the protocols are built on generic security objects as well. In the context of cloud computing, they maintain security credentials and protocol-specific features in a completely transparent way. In addition, the same attributes might be extended to other well-established methods. Examples of generic security protocols include initial user authentication, remote user authentication, Single Sign-On (SSO), secure sessions and file transfer, cloud transmission and key management protocols.
We would like to express our gratitude to Sri Panem Nadipi Chennaih for his assistance and encouragement during the process of writing this book chapter, which we have decided to dedicate to him.
1. A. A. Md Shoeb, R. Hasan, M. Haque and M. Hu, “A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2,” 2014 IEEE 7th International Conference on Cloud Computing, 2014, pp. 970-971, doi: 10.1109/CLOUD.2014.146.
2. D. Yang, Y. -C. Chen, S. Ye and R. Tso, “Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud,” in IEEE Access, vol. 6, pp. 63624-63634, 2018, doi: 10.1109/ACCESS.2018.2877036.
3. Y. Gong, F. Gu, K. Chen and F. Wang, “The Architecture of Micro-services and the Separation of Frond-end and Back-end Applied in a Campus Information System,” 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), 2020, pp. 321-324, doi: 10.1109/AEECA49918.2020.9213662.
4. D. Berzano
et al
., “On-demand lung CT analysis with the M5L-CAD via the WIDEN front-end web interface and an OpenNebula-based cloud back-end,” 2012 IEEE Nuclear Science Symposium and Medical Imaging Conference Record (NSS/MIC), 2012, pp. 978-984, doi: 10.1109/NSSMIC.2012.6551253.
5. G. Kousiouris, G. Vafiadis and T. Varvarigou, “A Front-end, Hadoop-based Data Management Service for Efficient Federated Clouds,” 2011 IEEE Third International Conference on Cloud Computing Technology and Science, 2011, pp. 511-516, doi: 10.1109/CloudCom.2011.76.
6. He, Qinlu, Zhanhuai Li, and Xiao Zhang. “Study on cloud storage system based on distributed storage systems.” 2010 International Conference on Computational and Information Sciences. IEEE, 2010.
7. V. Debroy, A. Mansoori, J. Haleblian and M. Wilkens, “Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud,” 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2020, pp. 153-154, doi: 10.1109/ ISSREW51248.2020.00046.
8. V. Debroy, A. Mansoori, J. Haleblian and M. Wilkens, “Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud,” 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2020, pp. 153-154, doi: 10.1109/ ISSREW51248.2020.00046.
9. M. Bahrami, “Cloud Computing for Emerging Mobile Cloud Apps,” 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2015, pp. 4-5, doi: 10.1109/MobileCloud.2015.40.
10. C. Prakash and S. Dasgupta, “Cloud computing security analysis: Challenges and possible solutions,” 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 54-57, doi: 10.1109/ICEEOT.2016.7755626.
11. C. Prakash and S. Dasgupta, “Cloud computing security analysis: Challenges and possible solutions,” 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 54-57, doi: 10.1109/ICEEOT.2016.7755626.
12. V. Podolskiy, A. Jindal and M. Gerndt, “IaaS Reactive Autoscaling Performance Challenges,” 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2018, pp. 954-957, doi: 10.1109/CLOUD.2018.00144.
13. Rawat, R., Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation.
International Journal of Information Technology
, 15, 2, 893-903, 2023
14. Rawat, R., Mahor, V., Álvarez, J. D., and Ch, F., Cognitive systems for dark web cyber delinquent association malignant data crawling: A review.
Handbook of Research on War Policies, Strategies, and Cyber Wars
, 45-63, 2023.
15. Rawat, R., Chakrawarti, R. K., Vyas, P., Gonzáles, J. L. A., Sikarwar, R. and Bhardwaj, R., Intelligent fog computing surveillance system for crime and vulnerability identification and tracing.
International Journal of Information Security and Privacy (IJISP)
, 17, 1, 1-25, 2023.
16. Rawat, R., Sowjanya, A. M., Patel, S. I., Jaiswal, V., Khan, I. and Balaram, A. (Eds.).
Using Machine Intelligence: Autonomous Vehicles,
Volume 1, John Wiley & Sons, 2022.
17. Rawat, R., Bhardwaj, P., Kaur, U., Telang, S., Chouhan, M. and Sankaran, K. S.,
Smart Vehicles for Communication
, Volume 2. John Wiley & Sons, 2023.
18. Mahor, V., Bijrothiya, S., Rawat, R., Kumar, A., Garg, B. and Pachlasiya, K., IoT and artificial intelligence techniques for public safety and security.
Smart Urban Computing Applications
, 111, 2023.
*
Corresponding author
:
Charanarur Panem1, Srinivasa Rao Gundu2* and J. Vijaylaxmi3
1School of Cyber Security and Digital Forensic, National Forensic Sciences University, Goa Campus, Goa, India
2Department of Computer Science, Government Degree College-Sitaphalmandi, Hyderabad, Telangana, India
3PVKK Degree & PG College, Anantapur, Andhra Pradesh, India
Cyber security has become a major cause of concern in today’s digital world. Data breaches, identity theft, captcha decoding, and other situations that affect millions of individuals and businesses are all too common. When it comes to cyber attacks and crimes, it has always been tough to come up with effective rules and procedures and then put them into action with pinpoint precision. Because of recent developments in artificial intelligence, cyber attacks and criminal behaviour are becoming more common. Research and engineering, including medicine, have all benefited from its utilization.
Artificial intelligence has ushered in a new age in everything from healthcare to robots. When hackers couldn’t resist this hot commodity, they turned what were formerly “regular” computer attacks into more “intelligent” forms of crime.
The authors of this chapter examine a variety of AI techniques that they feel have significant promise. Among other things, they go through how to use these tactics in cyber security. They wrap off their discussion with a discussion on the future uses of artificial intelligence and cyber defense.
Keywords: Cyber security, digital world, identity theft, captcha, artificial intelligence, cyber attacks, robots, hackers
To a large extent, hacking has developed from simple theft or vandalism to well-organized and financially sponsored criminals that want to benefit on a global scale because of fast technological advancement. In this case, organized crime’s aims might range from personal gain to political development.
As the world becomes more reliant on technology, businesses of all kinds must act faster than ever to protect themselves against cyber assaults and criminal activity. Predicting and detecting an attack before it happens is one of the most critical and hardest parts of Cybersecurity. Cyber assaults may take a number of forms, with varying degrees of sophistication, scope, and objectives. Because of the vast range of threats, organizations and governments must prioritize cyber security as a top priority [1].