Artificial Intelligence and Infrastructure-as-Code: Revolutionizing Cloud Computing Security for Retail Operations

Authors

  • Chandrashekar Pandugula, Sr Data Engineer, Lowes Inc NC, USA Author

Keywords:

Amazon, Cloud security, Cloud servers, Computational modeling, Feature extraction, Feature selection, Integrated analysis, Libraries, Security, Standby systems, Support vector machines, Understanding, Virtual machine monitoring

Abstract

Cloud computing security is a fundamental part of information technology planning and strategic management of digital retail operations. The infrastructure provisioning process for a cloud-based retail application is based on a series of infrastructure as code scripts, which are executed by a cloud provider on a designated cloud region, to instantiate the complete cloud setup necessary to run the application code. Emerging security trends include frameworks like coverage-driven fuzz testing and neural network-based program obfuscation for mitigating fuzzing benefits. Also, code search researchers can adopt code similarity to find the technical debt services of a large organization. Unsafe cloud computing setup procedures can result in resource exploitation, workload latencies, user data leakage, and incidents of service termination. Major cloud service providers offer an IaC toolset for building, deploying, managing, and scaling cloud applications. Configurations are based on templates, which define the cloud resources and properties to provision, and are used to invoke wrappers. In convergence with the aim of promoting the adoption of cloud technology infusing security setups for private information, a set of IaC configuration snippets is implemented for securing various components. DHCP randomly allocates four full 8-hour ports to carry out the security experiment. Only one port receives the traffic while the remaining three ports with the initial state of the primary image of the switch either remain passthrough filters or are changed to block fully the ingress traffic. Secure transport uses encryption and connections. The cache corruption attack is used to disallow non-official traffic by filtering the MAC or IPv6 address of an attacker. The cache is cleared by sending a gratuitous ARP/NA to the attacker’s linker and switching IP(s) and MAC(s).

 

Downloads

Published

2024-12-10

How to Cite

Artificial Intelligence and Infrastructure-as-Code: Revolutionizing Cloud Computing Security for Retail Operations. (2024). American Advanced Journal for Emerging Disciplinaries (AAJED) ISSN: 3067-4190, 2(1). https://aajed.com/index.php/aajed/article/view/9