Enhancing Cyber Security in Cloud-Based Infrastructures Through Intelligent Threat Modeling and Automated Risk Mitigation

Authors

  • Wendell Moussouris USA Author

Keywords:

Cybersecurity, Cloud Computing, Threat Modeling, Risk Mitigation, Artificial Intelligence, Automation, Infrastructure Security

Abstract

As cloud-based infrastructures continue to underpin global digital transformation, the sophistication and frequency of cyber threats targeting these environments have surged dramatically. This paper presents a comprehensive approach for enhancing cyber security in cloud infrastructures by integrating intelligent threat modeling with automated risk mitigation strategies. Drawing on recent advances in artificial intelligence, threat intelligence, and cloud-native security tooling, the study proposes a modular framework for adaptive defense that can preemptively identify vulnerabilities and autonomously respond to emerging threats. Through an extensive review of literature and analysis of current methodologies, the paper highlights the efficacy and limitations of contemporary solutions and introduces a forward-looking model that balances security with performance and scalability.

References

Alasmary, Waleed, Fahad Alhaidari, and Tarek Mezher. "Machine Learning-Based Threat Modeling in Cloud Environments." IEEE Access, vol. 9, 2021, pp. 10284–10295.

Kodi, D. (2024). Automating Software Engineering Workflows: Integrating Scripting and Coding in the Development Lifecycle . Journal of Computational Analysis and Applications (JoCAAA), 33(4), 635–652.

Shostack, Adam. Threat Modeling: Designing for Security. Wiley, 2014.

Xiong, Kaiqi, and Harry Perros. "Service Performance and Analysis in Cloud Computing." Computing, vol. 97, no. 4, 2015, pp. 305–321.

Singh, Amanpreet, Inderveer Chana, and Rajkumar Buyya. "Automated Resource Management in Cloud Computing: A Survey and Taxonomy." ACM Computing Surveys, vol. 52, no. 5, 2019, pp. 1–40.

Kodi, D. (2024). Data Transformation and Integration: Leveraging Talend for Enterprise Solutions. International Journal of Innovative Research in Science, Engineering and Technology, 13(9), 16876–16886. https://doi.org/10.15680/IJIRSET.2024.1309124

Zhang, Chen, Zhen Liu, and Huijun Wang. "Reinforcement Learning for Automated Cloud Security Configuration." Journal of Cloud Computing, vol. 9, no. 1, 2020, pp. 1–15.

Almorsy, Mohamed, John Grundy, and Amani Ibrahim. "Collaboration-Based Cloud Computing Security Management Framework." IEEE Transactions on Software Engineering, vol. 40, no. 4, 2014, pp. 307–319.

Kodi, D., & Chundru, S. (2025). Unlocking New Possibilities: How Advanced API Integration Enhances Green Innovation and Equity. In Advancing Social Equity Through Accessible Green Innovation (pp. 24). IGI Global. https://doi.org/10.4018/979-8-3693-9471-7.ch027

Takabi, Hassan, James B. D. Joshi, and Gail-Joon Ahn. "Security and Privacy Challenges in Cloud Computing Environments." IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 24–31.

Hashizume, Keiko, et al. "An Analysis of Security Issues for Cloud Computing." Journal of Internet Services and Applications, vol. 4, no. 1, 2013, pp. 1–13.

Marella, B.C.C., & Kodi, D. (2025). Generative AI for Fraud Prevention: A New Frontier in Productivity and Green Innovation. In Advancing Social Equity Through Accessible Green Innovation (pp. 1–16). IGI Global. https://doi.org/10.4018/979-8-3693-9471-7.ch012

Modi, Chirag, et al. "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing." The Journal of Supercomputing, vol. 63, no. 2, 2013, pp. 561–592.

Subashini, Subashini, and V. Kavitha. "A Survey on Security Issues in Service Delivery Models of Cloud Computing." Journal of Network and Computer Applications, vol. 34, no. 1, 2011, pp. 1–11.

Fernandes, Daniel A. R., et al. "Security Issues in Cloud Environments: A Survey." International Journal of Information Security, vol. 13, no. 2, 2014, pp. 113–170.

Khan, Khaled M., and Qutaibah Malluhi. "Establishing Trust in Cloud Computing." IT Professional, vol. 12, no. 5, 2010, pp. 20–27.

Rosado, David G., et al. "Security Analysis in the Migration to Cloud Environments." Future Internet, vol. 4, no. 2, 2012, pp. 469–487.

AlZain, Mohammed A., Ben Soh, and Eric Pardede. "A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds." Journal of Software, vol. 8, no. 5, 2013, pp. 1068–1078.

K. R. Kotte, L. Thammareddi, D. Kodi, V. R. Anumolu, A. K. K and S. Joshi, "Integration of Process Optimization and Automation: A Way to AI Powered Digital Transformation," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1133-1138, doi: 10.1109/CE2CT64011.2025.10939966.

Popa, Raluca A., et al. "Enabling Security in Cloud Storage SLAs with CloudProof." USENIX Annual Technical Conference, 2011, pp. 355–368.

Downloads

Published

2025-05-25

How to Cite

Enhancing Cyber Security in Cloud-Based Infrastructures Through Intelligent Threat Modeling and Automated Risk Mitigation. (2025). ISCSITR-INTERNATIONAL JOURNAL OF CLOUD COMPUTING (ISCSITR-IJCC) - ISSN (Online): 3067-7378, 6(3), 24-32. https://iscsitr.in/index.php/ISCSITR-IJCC/article/view/ISCSITR-IJCC_06_03_003