Sei sulla pagina 1di 9

A STUDY OF THE IMPORTANCE

IN USE OF AI AS THE
SECURITY FOR CLOUD
COMPUTING
PROPOSAL

JANUARY 1, 2019
ISMT
TINKUNE, KOTESHOWER, KTM

Abishek Luitel (HND/Third Semester)


A study of the importance in use of AI as the security for cloud computing 2019

Abstract

In the establishment of cloud computing with AI make work easy for the users but the some
consequence surround with it as the security which cannot ignored by the organization or the
developers teams or us. So moto of this proposal is to organize the research about the importance in
use of AI as the security for cloud computing.

So this proposal included the importance of AI as the security in cloud computing also it define
about the project details, reason to organize the research and described about the Artificial
Intelligence importance as the security for cloud computing also included all the required data
collection methodology in during the research (Through the Quantitative and Qualitative Research
methodology as well as from some personal records). Also provided the literature review from the
different authors by relating the research topics. At last of this proposal derived the time frames in
the form of GANNT CHART where all the scopes and required times are defined as well as mention
some cost analysis before the time frames where covered all the required expenses while working in
this project. In addition in research methodology described about the significance of the research
topics “A study of the importance in use of AI as the security of cloud computing.”

ABISHEK LUITEL (HND/THIRD SEMESTER) i


A study of the importance in use of AI as the security for cloud computing 2019

Table of Contents

Introduction ............................................................................................................................................ 1

Project Aim ........................................................................................................................................ 1

Objectives of the project .................................................................................................................... 2

Literature Review................................................................................................................................... 2

Research Methodology .......................................................................................................................... 2

Significance of Research .................................................................................................................... 3

Hypothesis .......................................................................................................................................... 3

Research Hypothesis ...................................................................................................................... 3

Research Questions ............................................................................................................................ 3

Time-Frames .......................................................................................................................................... 4

Cost Analysis ......................................................................................................................................... 5

Conclusion ............................................................................................................................................. 5

References .............................................................................................................................................. 6

Table of content for figure

Figure 1-1 Pictorial Diagram ................................................................................................................. 1


Figure 1-1 GANNT CHART ................................................................................................................. 4

ABISHEK LUITEL (HND/THIRD SEMESTER) ii


Introduction
Security in terms of technology are being essential like about cloud computing where all the
confidential data are moving openly. Where any one can get access instead of using the security
features. But using an AI will make sure that all the saved data in cloud storage will managed by self
it has all the terms that human can implement as the security. Artificial Intelligence have the capacity
of the humanoid power in terms of mental capacity implementing it as the security options will be
secured each and every categories of cloud storages (Private, Public, Hybrid). Well study of the
security importance of the Artificial Intelligence in cloud computing will make sure to avoid the
obstacles facing these days due to advancement of technology and excessive use of those technology.
Also the time frame required for the project presented below in the form of pictorial diagram:-

Figure 1-1 Pictorial Diagram

Project Aim

“A study of the importance in use of AI as the Security for cloud computing.”

Abishek Luitel (HND/Third Semester) 1


A study of the importance in use of AI as the security for cloud computing 2019

Objectives of the project


The main target of the project will be the filling the knowledge gap of the research topics “A study of
the importance in use of AI as the Security for cloud computing.” So the main objectives are splitting
in small scopes to achieve the entire goals. All the sub-divided scopes are defined below:-

 Organizing the Research which includes interview/observation.


 Collecting all the data and tabulated in any business intelligence tools. Such as:- MS. Excel
 Analyzing all the collected data through the business intelligence tools for findings.
 Preparing the overall report.

Literature Review
As per the author. “A lot of different server which hold the data by being part of cloud computing
where those data will accessed by an AI and use those data to make the effective decision and observe
things like to hold a conversation but as the AI studies this, it can communicate this new data back to
the cloud, which can accordingly help other AIs learn as well.” (Mao Yahya Mohamed, 2018)

According to the author “Among the numerous uses of AI in cybersecurity, the arrival of intelligence
collaborators (Bots) to improve the speed and precision of security information examination is
especially welcomed. As cloud computing, and now server less structures, keep on disturbing IT, the
accessibility of powerful algorithms and machine learning capabilities appear to be a silver bullet for
the shortage of security expertise. Never the less, information and architecture security of such
solution bring one of a kind challenges” (Lourerio, 2018).

As per the author “Artificial intelligence arrangements can be incorporated into business procedures
to both increment creation limits and lessen work concentrated cost loads.” (Penlington Russ , 2018)

Research Methodology
Research methodology will help to collect the required information for the findings to the research
generated for. For this research I will chose the descriptive research methods which involves the
major aspects of the research survey and observational methods. In survey I will prefer to use
quantitative research (collection of those query to measures for findings) and observation are based
on the qualitative research which is also based for the research moto. So for this research I will use
both qualitative and quantitative questions which includes all the query related to this research topic.
But for the observation I will use qualitative research which will also be the part of my case study.

ABISHEK LUITEL (HND/THIRD SEMESTER) 2


A study of the importance in use of AI as the security for cloud computing 2019

These are some research methods will be part of this research for collecting data and measuring those
data for the fruitful output as required of the research topic “A study of the importance in use of AI
as the security for cloud computing in today's time”.

Significance of Research
Research is organized to filling the knowledge gap as well as to solve the operational and planning of
business and industry. So for filling the knowledge gap will indicate the educational purpose as well
as filling the personal enthusiasm too. The significance of this research topic “A study of the
importance in use of AI in the security of cloud computing in today's time” will included the
following points:-

1. It is more helpful for the others who wants to know about the Importance of AI as the
security in cloud computing.
2. It will also be helpful to enhance the knowledge as well as solve the problems related to this
field.
3. We will filled with the knowledge of problems and solution in related to the topics.

Hypothesis
In a single sentence, a research hypothesis describes the results that a researcher expects to find. It
is a prediction or an educated guess about the outcome one expects from an undertaken. There are
two types a) Research hypothesis and b) Null hypothesis. A research hypothesis is the hypothesis
that a researcher believes will be supported by his or her data. This type of hypothesis is often used
in journal articles or articles in books. The null hypothesis on the other hand is a statistical
hypothesis that states that any difference is attributable to random errors. In other words, the null
hypothesis states that there is no true difference only a random one. Significant tests are then used to
test the null hypothesis.

Research Hypothesis
“Enhancing the security using the AI will improve the security of cloud computing”

Research Questions
The probability of involving Questions in the Questioners during the research of “Importance of AI
security in cloud computing” are allocated below:-

1. How should cloud computing recognized?


2. How should AI recognized?
3. What is the importance of the AI in cloud computing?
ABISHEK LUITEL (HND/THIRD SEMESTER) 3
A study of the importance in use of AI as the security for cloud computing 2019

4. What kind of vulnerability arises in cloud computing instead of using available security?
5. Is there any tools need to implement as the security options to improve the security as AI in
cloud computing?
6. What are the experiences of using AI and without using AI in cloud computing?
7. Implementing AI will avoid those security flaws facing these days in cloud computing?
8. Will AI took forward the security in cloud computing with new technology?
9. What are the process of working AI security with cloud computing?
10. What are the importance of the security as AI in cloud computing?
11. Will the Ai as the security will reduce the effort of users use the applications?
12. Will the use of AI as the security will reduce the effort to protect the confidential data of
users of relating organization?

Time-Frames
The overall required time and the whole scopes are splitting and divided in to small section with
suitable time for the project and it will fully depend upon this planning. Which all are presented
below in the GANNT CHART:-

Figure 1-2 GANNT CHART

ABISHEK LUITEL (HND/THIRD SEMESTER) 4


A study of the importance in use of AI as the security for cloud computing 2019

Cost Analysis
As decided the total budget for this project distributed in different sectors while working in the
project so as the plan by observing the situation all the will be expanses are measured in the
following tables.

S.N Expanses Budget (NPR)

1 Traveling Expenses RS 4000

2 Printing and lamination RS 3000

3 Phone Expenses RS 2000

4 Stationery Items RS 500

5 Other Expenses RS 3000

Total RS 12500

Table 1 COST ANAYSIS TABLE

Conclusion
AI as the security in cloud computing has been implemented in various field such as in the Goggle,
Facebook and amazon. So in this proposal includes all the research methodology implemented
during the research. In addition also mention the reason behind to choose those research methods.
Moreover discussed about the significance of the research with the importance of organizing this
research with time frames.

ABISHEK LUITEL (HND/THIRD SEMESTER) 5


A study of the importance in use of AI as the security for cloud computing 2019

References
Lourerio, S., 2018. Artificial Intelligence (AI) and Cloud Security: New Challenges. [Online]
Available at: https://outpost24.com/blog/Artificial-intelligence-and-cloud-security-new-challenges
[Accessed 04 01 2019].

Mao Yahya Mohamed, 2018. Combining cloud computing and artificial intelligence (AI). [Online]
Available at: https://medium.com/nworld-publications/combining-cloud-computing-and-artificial-
intelligence-ai-9db02226c7e3
[Accessed 04 01 2019].

Penlington Russ , 2018. mediums. [Online]


Available at: https://towardsdatascience.com/utilizing-artificial-intelligence-cloud-solutions-for-
business-52780794a69c
[Accessed 01 04 2019].

ABISHEK LUITEL (HND/THIRD SEMESTER) 6

Potrebbero piacerti anche