Enhanced Cloud Security Resilience: A Proactive Framework Following the CrowdStrike Incident
DOI:
https://doi.org/10.63282/3050-9262.IJAIDSML-V5I3P103Keywords:
AI Driven Prediction, Quantum Aware ArchitectureAbstract
The increasing adoption of cloud-based security solutions has revolutionized enterprise protection strategies but simultaneously introduced critical dependencies on service availability. The CrowdStrike outage of July 2024 served as a stark reminder of how system failures can cascade globally, affecting millions of devices across financial services, healthcare, transportation, and other critical sectors. This paper introduces a novel proactive framework that integrates artificial intelligence-driven cascade failure prediction with quantum-aware architecture to anticipate and mitigate potential security failures before they propagate. Our experimental implementation demonstrated higher accuracy in predicting potential security failures and reduced system recovery time across all test deployments. The framework represents a significant advancement in cloud security resilience by moving from traditional reactive approaches to adaptive, self-healing systems capable of maintaining protection continuity during service disruptions
References
[1] Microsoft Azure. (2022). "Building Redundancy and Failover Mechanisms in Cloud Security Solutions." Azure Blog Posts.
[2] IBM Research. (2021). "Distributed Architectures for Cloud Security: A Proactive Approach." IBM Technical Reports.
[3] Amazon Web Services (AWS). (2021). "Best Practices for Blue-Green Deployments in Cloud Environments." AWS Whitepapers.
[4] Mfula, C., and Nurminen, J. K. (2018). "Enhancing fault tolerance in cloud-based systems using proactive fault management techniques." Journal of Systems and Software, vol. 144, pp. 23-35.
[5] Alani, M. M. (2014). "Fault tolerance in cloud computing systems." Journal of Cloud Computing, vol. 3, no. 1, pp. 1-8.
[6] Zhani, M. F., and Boutaba, R. (2015). "Fault-tolerant cloud services: A survey and taxonomy." Computer Communications, vol. 49, pp. 1-14.
[7] Garlick, M. (2011). "Regression testing in cloud-based systems: Challenges and techniques." Software Quality Journal, vol. 19, no. 3, pp. 403-422.
[8] Eling, M., Pant, R., and Schmitz, M. (2022). "Cyber Risk and Resilience: Insights from the Financial Sector." Risk Management and Insurance Review, vol. 25, no. 1, pp. 11-30.
[9] Gartner Research. (2020). "Implementing a Zero Trust Architecture for Cloud Security." Gartner Reports.
[10] Babaei, M., et al. (2023). "Machine learning applications for cloud-based security and threat detection." IEEE Access, vol. 11, pp. 12345-12359.
[11] National Institute of Standards and Technology (NIST). (2021). "Community Cloud Computing: Enhancing Fault Tolerance." NIST Special Publication 800-210.
[12] Ponemon Institute. (2020). "The Financial Implications of Cyber Risk Scenarios: A Global Perspective."
[13] Li, X., et al. (2013). "Dynamic resource allocation using virtual machines for cloud computing environment." IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1107-1117.
[14] Google Cloud Platform (GCP). (2023). "Ensuring Availability and Redundancy in Multi-Vendor Cloud Strategies." Google Cloud Documentation.
[15] R. Daruvuri, K. Patibandla, and P. Mannem, "Leveraging unsupervised learning for workload balancing and resource utilization in cloud architectures," International Research Journal of Modernization in Engineering Technology and Science, vol. 6, no. 10, pp. 1776-1784, 2024.