Share

Export Citation

APA
MLA
Chicago
Harvard
Vancouver
BIBTEX
RIS
Universitas Hasanuddin
Research output:Contribution to journalArticlepeer-review

Privacy-Preserving Cybersecurity in Cloud Computing Environments Using Artificial Intelligence-Based-Classification Model

Ragab Elganzori G.M.

International Journal of Interactive Mobile Technologies

Q3
Published: 2025

Abstract

Cloud computing (CC) has revolutionized data management, but it continues to face critical cybersecurity challenges, particularly in preserving privacy and detecting threats. This study presents a novel AI-driven framework that integrates feature selection, neuro-fuzzy classification, adaptive encryption, and metaheuristic optimization to enhance privacy-preserving cybersecurity in cloud environments. The proposed methodology uses the term frequency-inverse document frequency (TF-IDF) for dimensionality reduction, an enhanced adaptive neuro-fuzzy inference system (ANFIS) for attack detection, an advanced cryptographic standard technique (ACST) for secure encryption, and the Archimedes Optimization Algorithm (AOA) for hyperparameter tuning. Experimental results demonstrate improved classification accuracy over conventional methods, efficient and robust encryption, and optimized performance suitable for real-time deployment. The framework strikes a balance between detection accuracy and computational efficiency while ensuring compliance with regulatory requirements, such as Indonesia’s data sovereignty laws. These findings suggest that integrating adaptive AI techniques with lightweight cryptography offers a scalable and effective approach to cloud security. Practical implications include enhanced protection of sensitive data in multi-tenant environments and alignment with evolving data protection regulations. Future research should explore quantum-resistant encryption and federated learning (FL) to strengthen cross-cloud collaboration and resilience.

Access to Document

10.3991/ijim.v19i18.57265

Other files and links

Fingerprint

Computer scienceSciences
Cloud computingSciences
ScalabilitySciences
EncryptionSciences
InferenceSciences
CryptographySciences
HyperparameterSciences
Information privacySciences
Distributed computingSciences
Key (lock)Sciences
Data miningSciences
Dimensionality reductionSciences
Curse of dimensionalitySciences
Data securitySciences
Feature (linguistics)Sciences
Federated learningSciences
Data anonymizationSciences
Machine learningSciences
Dimension (graph theory)Sciences
Particle swarm optimizationSciences
Artificial intelligenceSciences
Computer securitySciences
ServerSciences
ThroughputSciences
Security analysisSciences
Data Protection Act 1998Sciences
Cloud computing securitySciences