Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
IN USE OF AI AS THE
SECURITY FOR CLOUD
COMPUTING
PROPOSAL
JANUARY 1, 2019
ISMT
TINKUNE, KOTESHOWER, KTM
Abstract
In the establishment of cloud computing with AI make work easy for the users but the some
consequence surround with it as the security which cannot ignored by the organization or the
developers teams or us. So moto of this proposal is to organize the research about the importance in
use of AI as the security for cloud computing.
So this proposal included the importance of AI as the security in cloud computing also it define
about the project details, reason to organize the research and described about the Artificial
Intelligence importance as the security for cloud computing also included all the required data
collection methodology in during the research (Through the Quantitative and Qualitative Research
methodology as well as from some personal records). Also provided the literature review from the
different authors by relating the research topics. At last of this proposal derived the time frames in
the form of GANNT CHART where all the scopes and required times are defined as well as mention
some cost analysis before the time frames where covered all the required expenses while working in
this project. In addition in research methodology described about the significance of the research
topics “A study of the importance in use of AI as the security of cloud computing.”
Table of Contents
Introduction ............................................................................................................................................ 1
Literature Review................................................................................................................................... 2
Hypothesis .......................................................................................................................................... 3
Time-Frames .......................................................................................................................................... 4
Conclusion ............................................................................................................................................. 5
References .............................................................................................................................................. 6
Project Aim
Literature Review
As per the author. “A lot of different server which hold the data by being part of cloud computing
where those data will accessed by an AI and use those data to make the effective decision and observe
things like to hold a conversation but as the AI studies this, it can communicate this new data back to
the cloud, which can accordingly help other AIs learn as well.” (Mao Yahya Mohamed, 2018)
According to the author “Among the numerous uses of AI in cybersecurity, the arrival of intelligence
collaborators (Bots) to improve the speed and precision of security information examination is
especially welcomed. As cloud computing, and now server less structures, keep on disturbing IT, the
accessibility of powerful algorithms and machine learning capabilities appear to be a silver bullet for
the shortage of security expertise. Never the less, information and architecture security of such
solution bring one of a kind challenges” (Lourerio, 2018).
As per the author “Artificial intelligence arrangements can be incorporated into business procedures
to both increment creation limits and lessen work concentrated cost loads.” (Penlington Russ , 2018)
Research Methodology
Research methodology will help to collect the required information for the findings to the research
generated for. For this research I will chose the descriptive research methods which involves the
major aspects of the research survey and observational methods. In survey I will prefer to use
quantitative research (collection of those query to measures for findings) and observation are based
on the qualitative research which is also based for the research moto. So for this research I will use
both qualitative and quantitative questions which includes all the query related to this research topic.
But for the observation I will use qualitative research which will also be the part of my case study.
These are some research methods will be part of this research for collecting data and measuring those
data for the fruitful output as required of the research topic “A study of the importance in use of AI
as the security for cloud computing in today's time”.
Significance of Research
Research is organized to filling the knowledge gap as well as to solve the operational and planning of
business and industry. So for filling the knowledge gap will indicate the educational purpose as well
as filling the personal enthusiasm too. The significance of this research topic “A study of the
importance in use of AI in the security of cloud computing in today's time” will included the
following points:-
1. It is more helpful for the others who wants to know about the Importance of AI as the
security in cloud computing.
2. It will also be helpful to enhance the knowledge as well as solve the problems related to this
field.
3. We will filled with the knowledge of problems and solution in related to the topics.
Hypothesis
In a single sentence, a research hypothesis describes the results that a researcher expects to find. It
is a prediction or an educated guess about the outcome one expects from an undertaken. There are
two types a) Research hypothesis and b) Null hypothesis. A research hypothesis is the hypothesis
that a researcher believes will be supported by his or her data. This type of hypothesis is often used
in journal articles or articles in books. The null hypothesis on the other hand is a statistical
hypothesis that states that any difference is attributable to random errors. In other words, the null
hypothesis states that there is no true difference only a random one. Significant tests are then used to
test the null hypothesis.
Research Hypothesis
“Enhancing the security using the AI will improve the security of cloud computing”
Research Questions
The probability of involving Questions in the Questioners during the research of “Importance of AI
security in cloud computing” are allocated below:-
4. What kind of vulnerability arises in cloud computing instead of using available security?
5. Is there any tools need to implement as the security options to improve the security as AI in
cloud computing?
6. What are the experiences of using AI and without using AI in cloud computing?
7. Implementing AI will avoid those security flaws facing these days in cloud computing?
8. Will AI took forward the security in cloud computing with new technology?
9. What are the process of working AI security with cloud computing?
10. What are the importance of the security as AI in cloud computing?
11. Will the Ai as the security will reduce the effort of users use the applications?
12. Will the use of AI as the security will reduce the effort to protect the confidential data of
users of relating organization?
Time-Frames
The overall required time and the whole scopes are splitting and divided in to small section with
suitable time for the project and it will fully depend upon this planning. Which all are presented
below in the GANNT CHART:-
Cost Analysis
As decided the total budget for this project distributed in different sectors while working in the
project so as the plan by observing the situation all the will be expanses are measured in the
following tables.
Total RS 12500
Conclusion
AI as the security in cloud computing has been implemented in various field such as in the Goggle,
Facebook and amazon. So in this proposal includes all the research methodology implemented
during the research. In addition also mention the reason behind to choose those research methods.
Moreover discussed about the significance of the research with the importance of organizing this
research with time frames.
References
Lourerio, S., 2018. Artificial Intelligence (AI) and Cloud Security: New Challenges. [Online]
Available at: https://outpost24.com/blog/Artificial-intelligence-and-cloud-security-new-challenges
[Accessed 04 01 2019].
Mao Yahya Mohamed, 2018. Combining cloud computing and artificial intelligence (AI). [Online]
Available at: https://medium.com/nworld-publications/combining-cloud-computing-and-artificial-
intelligence-ai-9db02226c7e3
[Accessed 04 01 2019].