Email: info@ijps.in | Mob: +91-9555269393

Submit Manuscript

Abstract

Multi-Cloud Security Orchestration Using Deep Reinforcement Learning

Vamshidhar Reddy Vemula

Independent researcher, Plano, Texas, USA

60 - 60
Vol.15, Issue 1, Jan-Jun, 2023
Receiving Date: 2023-02-27
Acceptance Date: 2023-04-02
Publication Date: 2023-04-10
Download PDF
Abstract

In today’s digital landscape, multi-cloud environments have become essential for organizations seeking scalability, flexibility, and resilience. However, the adoption of multiple cloud providers introduces complex security challenges, including inconsistent policy enforcement, increased attack surfaces, and varying threat dynamics across platforms. This paper presents a novel framework for Multi-Cloud Security Orchestration using Deep Reinforcement Learning (DRL) to address these challenges. By leveraging a Proximal Policy Optimization (PPO) algorithm, our approach enables real-time, autonomous threat detection and response, dynamically adapting to evolving threats across heterogeneous cloud infrastructures. The proposed DRL model orchestrates security policies, optimizes resource allocation, and minimizes response latency through a feedback-driven learning loop.


Keywords: Deep Reinforcement Learning (DRL); Multi-Cloud Security Orchestration; Proximal Policy Optimization (PPO)


References
  1. D. Bernstein, 'containers and cloud: from lxc to docker to kubernetes,' ieee cloud computing, vol. 5, no. 3, pp. 81-84, 2019.
  2. M. Jensen, n. Gruschka, and r. Herkenhoner, 'a survey of attacks on web services,' in ieee transactions on services computing, vol. 4, no. 2, pp. 65-81, 2011.
  3. S. Subashini and v. Kavitha, 'a survey on security issues in service delivery models of cloud computing,' in journal of network and computer applications, vol. 34, no. 1, pp. 1-11, 2011.
  4. Z. Wu, 'deep reinforcement learning in network security applications,' in ieee communications surveys & tutorials, vol. 21, no. 4, pp. 3035-3051, 2019.
  5. X. Liu, y. Zhang, and d. Xu, “a review on multi-cloud security management,” ieee transactions on cloud computing, vol. 8, no. 2, pp. 345–358, 2020.
  6. H. Li, j. Zheng, and t. Chen, “leveraging reinforcement learning for automated security in cloud systems,” ieee security & privacy, vol. 15, no. 6, pp. 70–78, 2019.
  7. Z. Lin, k. J. Miller, and m. T. Zhu, “proximal policy optimization for multi-cloud security orchestration,” ieee access, vol. 6, pp. 11250–11259, 2018.
  8. https://scholar.google.com/citations?user=GZZEOHkAAAAJ&hl=en
  9. https://scholar.google.com/citations?user=R94525UAAAAJ&hl=en
  10. https://scholar.google.com/citations?user=WYURT_IAAAAJ&hl=en
  11. https://scholar.google.com/citations?user=xh9HeqgAAAAJ&hl=en
  12. https://scholar.google.com/citations?user=n8yVDWQAAAAJ&hl=en
  13. https://scholar.google.com/citations?user=MOfCYLwAAAAJ&hl=en
Back
SUPERJP
BOOSTERJP
GOJEKPOT
WINSTRIKE69
winstrike69 login link alternatif
WINSTRIKE69
ELANG212
ELANG212
ELANG212
GORI77
GORI77
CLAN4D
DINAMIT4D
VIRAL88
GORI77
VIRAL88
viral88 login link alternatif
VIRAL88
SAMSONBET86
PAKONG86
WINSTRIKE69
WINSTRIKE69
WINSTRIKE69
winstrike69 link alternatif
LINABET69
BOOSTERJP
WINSTRIKE69
WINSTRIKE69
WINSTRIKE69
akun pro thailand
Paito SDY Lotto
WINSTRIKE69
SLOT GACOR
VIRAL4D
WINSTRIKE69
BOOSTERJP
VIRAL88
GOJEKPOT
GOJEKPOT
GORI77
VIRAL4D
WINSTRIKE69
viral88
WINSTRIKE69
WINSTRIKE69
CLAN4D
WINSTRIKE69
VIRAL88
viral88
boosterjp
VIRAL88
WINSTRIKE69
boosterjp
Winstrike69
winstrike69
SAMSONBET86
winstrike69
winstreak 69
winstreak69
winstrik69
winstrike 69
winstreak 69 login
winstrike69
linabet69
WINSTRIKE69
GORI77
jagoan86
gori77
winstrike69
winstrike69
winstrike69
winstrike69
winstrike69
gori77
winstrike69
pakong86
winstrike69
winstrike69
linabet69
viral88
jagoan86
winstrike69
gori77
linabet69
LINABET69
gori77
winstrike69
gori77
winstrike69
gojekpot
gojekpot
gojekpot
kaptenjackpot
superjp
pakong86