Digital Transformation using Artificial Intelligence and Machine Learning for Secure Enterprises for Secure Enterprise Applications: A Framework using AWS IAM Cloud Security
Keywords:
Artificial Intelligence, Machine Learning, AWS IAM, Cloud Security, Enterprise Applications, Digital Transformation, Anomaly Detection, Access Control, Cybersecurity Framework.Abstract
Complex security issues have been brought about by businesses' quick digital transition, particularly with the use of cloud-based technology. In order to secure enterprise applications, this study offers a thorough framework that combines Amazon Web Services Identity and Access Management (AWS IAM) with Artificial Intelligence (AI) and Machine Learning (ML). Using supervised and unsupervised learning techniques, the framework was created to automate threat response, impose dynamic access control, and identify abnormalities. The Random Forest method outperformed the other models in terms of real-time detection and reaction efficiency and accuracy. The solution demonstrated great scalability, quick response times, and continuous learning capabilities throughout testing using simulated enterprise attack scenarios. The outcomes demonstrate how well AI and ML can improve enterprise cloud security and offer a scalable, flexible, and clever way to counteract online threats. During digital transformation, this approach helps businesses preserve data integrity, compliance, and business continuity.
Downloads
References
A. A. Solanke, “Cloud Migration for Critical Enterprise Workloads: Quantifiable Risk Mitigation Frameworks,” 2021.
B. Srikanth, “The Role of Network Engineers in Securing Cloud-based Applications and Data Storage,” 2020.
C. Peiris, B. Pillai, and A. Kudrati, Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks. John Wiley & Sons, 2021.
E. Oye and A. Clark, “AI-Enhanced Network Security Monitoring in AWS: A Practical Approach,” 2021.
J. Ajeigbe and S. Chandler, “Integrating AI with AWS Security Services: A Case Study on Enhanced Data Protection,” 2021.
J. Anderson and A. Nguyen, “The Role of Identity and Access Management (IAM) in Securing Cloud Workloads,” ResearchGate, Dec. 2022.
J. Prosper, “AI-Powered Enterprise Architecture: A Framework for Intelligent and Adaptive Software Systems,” 2021.
J. Robertson, J. M. Fossaceca, and K. W. Bennett, “A cloud-based computing framework for artificial intelligence innovation in support of multidomain operations,” IEEE Trans. Eng. Manag., vol. 69, no. 6, pp. 3913–3922, 2021.
M.-J. Lee and J.-E. Park, “Cybersecurity in the Cloud Era: Addressing Ransomware Threats with AI and Advanced Security Protocols,” Int. J. Trend Sci. Res. Dev., vol. 4, no. 6, pp. 1927–1945, 2020.
P. Elger and E. Shanaghy, AI as a Service: Serverless Machine Learning with AWS. Manning Publications, 2020.
R. C. Thota, “Cloud Security in Financial Services: Protecting Sensitive Data with AWS Well-Architected Framework,” Int. J. Novel Res. Dev., vol. 6, no. 4, pp. 1–7, 2021.
R. Chakraborty, A. Ghosh, and J. K. Mandal, Eds., Machine Learning Techniques and Analytics for Cloud Security. Hoboken, NJ, USA: John Wiley & Sons, 2021.
S. Galiveeti, L. A. Tawalbeh, M. Tawalbeh, and A. A. A. El-Latif, “Cybersecurity analysis: Investigating the data integrity and privacy in AWS and Azure cloud platforms,” in Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Cham: Springer, 2021, pp. 329–360.
S. K. Sundaramurthy, N. Ravichandran, A. C. Inaganti, and R. Muppalaneni, “The Future of Enterprise Automation: Integrating AI in Cybersecurity, Cloud Operations, and Workforce Analytics,” Artif. Intell. Mach. Learn. Rev., vol. 3, no. 2, pp. 1–15, 2022.
Y. M. U. AWS and H. Singh, Practical Machine Learning with AWS. Springer, 2021. [Online]. Available: https://aws.amazon.com/ec2/pricing/reserved-instances
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.