Enhancing Cyber Security And Performance In Multi-Tenant Cloud Computing Environments Through Adaptive Resource Management And Ai-Driven Threat Mitigation

Authors

  • Amad Asif Graphica Pro Artistry (Australia, Broadmeadows, Victoria) Author
  • Muhammad Zamin Ali Khan Department of Computer Science, Iqra university, Karachi, Pakistan Author
  • Muhammad Usama Khan UHF Solutions Pvt Ltd, Karachi, Pakistan Author
  • Syed Talib Zaheer Zaidi HBL, Karachi, Pakistan Author
  • Faigha Karim Department of Computer Science, Iqra University, Karachi, Pakistan Author
  • Khalid Bin Muhammad COCSE, Ziauddin University, Karachi, Pakistan Author

DOI:

https://doi.org/10.71146/kjmr936

Keywords:

Multi-tenant Cloud Computing, Federated Learning, Anomaly Detection, Adaptive Resource Management, AI-Driven Threat Mitigation, CyberSecurity.

Abstract

The multi-tenant approach in cloud computing provides scalability, but it brings some security and performance challenges such as resource contention and attacks from one tenant to another. The traditional approach addresses threat detection and performance management independently, leading to slow and inefficient responses. In this model for the research, an integrated artificial intelligence is applied which integrates anomaly detection, CVSS-based threat risk assessment, and adaptive threat response mechanism in order to improve cloud security and performance. In applying the model to industry standard simulation data, there will be improvement in cloud security without compromising speed.

 

Downloads

Download data is not yet available.

References

[1] Kairouz, P. et al., "Advances and Open Problems in Federated Learning," Foundations and Trends® in Machine Learning, vol. 14, no. 1–2, pp. 1–210,

2021.

[2] Zhang, Q., Chen, M., Li, L., "Privacy-Preserving Federated Learning for Cloud Security," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 455–468, 2023.

[3] Shafiq, M. et al., "Machine Learning-Based Anomaly Detection in Cloud Computing," IEEE Access, vol. 8,

pp. 94162–94175, 2020.

[4] Khan, S., Parkinson, S., Qin, Y., "Fog Computing Security: A Review," IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2831–2873,

2019.

[5] Wang, S., Tuor, T., Salonidis, T., "Adaptive Federated Learning in Resource Constrained Edge Computing Systems," IEEE Journal on Selected Areas in Communications, vol. 37, no. 6,

pp. 1205–1221, 2019.

[6] Kumar, V., Singh, P., Patel, R., "AI-Based Threat Detection in Multi-Tenant Cloud Environments," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3341–3354,

2020.

[7] Li, T., Sahu, A., Talwalkar, A., Smith, V., "Federated Learning: Challenges, Methods, and Future Directions," IEEE Signal Processing

Magazine, vol. 37, no. 3, pp. 50–60,

2020.

[8] Zhang, Y., Chen, X., Li, J., "Deep Learning for Cybersecurity in Cloud Systems," IEEE Network, vol. 34, no. 2,

pp. 76–82, 2020.

[9] Nguyen, T., Reddi, S., Kumar, A., "Federated Learning Systems: Vision, Hype, and Reality," IEEE Internet Computing, vol. 25, no. 5, pp. 12–20,

2021.

[10] Hussain, F., Abbas, S., "Risk-Aware Cloud Security Using CVSS and AI," IEEE Access, vol. 9, pp. 102334–102347, 2021.

[11] Chen, M., Ouyang, T., "AI-Driven Threat Mitigation in Cloud Computing," IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 4, pp. 2674–2687, 2022.

[12] Zhang, H., Xiao, Y., Bu, S.,

"Dynamic Resource Allocation in Multi-Tenant Clouds," IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 7, pp. 1689–1702, 2022.

[13] Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H., "Big Data Security and Privacy in Cloud," IEEE Access, vol. 6,

pp. 18230–18247, 2019.

[14] Radanliev, P. et al., "Cyber Risk Analytics for Cloud Computing," IEEE Transactions on Industrial Informatics, vol. 16, no. 10, pp. 6298–6308, 2020.

[15] Tang, J., Yu, F. R., "Deep

Reinforcement Learning for Cloud Resource Management," IEEE Communications Magazine, vol. 57, no. 3, pp. 60–66, 2019.

[16]Islam, M. R., Hasan, M., "Federated Learning-Based Intrusion Detection," IEEE Access, vol. 10, pp. 12345–12359, 2022.

[17] Verma, A., Kaushik, A., "Adaptive Security Automation in Cloud Systems," IEEE Transactions on Services Computing, vol. 16, no. 1, pp. 112–125,

2023.

[18] Liu, Y., Chen, T., Yang, Q.,

"Secure and Efficient Federated Learning," IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 6, pp. 5402–5415, 2023.

[19] Ahmed, E., Rehmani, M. H., "Intelligent Cloud Security Using AI," IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 88–121, 2024.

[20] Zhang, L., Wang, H., "Cloud Isolation and Security Threats," IEEE Cloud Computing, vol. 11, no. 2, pp. 34–45, 2024.

[21] Singh, R., Chatterjee, M., "Performance-Aware Security in Cloud Systems," IEEE Transactions on Cloud Computing, vol. 12, no. 1, pp. 101–115,

2024.

[22] Hassan, M., Khan, M., "AI-Based Risk Scoring for Cyber Defense," IEEE Access, vol. 12, pp. 55678–55692, 2024.

[23] Zhao, Y., Li, X., "Next-Generation Federated Learning for Cloud Security," IEEE Transactions on Cloud Computing, early access, 2025.

[24] M Zamin Ali Khan, Hussain Saleem et al, “Application of VLSI In Artificial Intelligence” Vol 6 Issue 2, PP-23-25 IOSR JCE 2012.

[25]Yanjie Wang, M.Zamin Ali Khan et al, “ A 0.65 V, 1.9 mW CMOS low-noise amplifier at 5GHz “ IEEE IWSOC05 pp 247-251. [26]Hussain Saleem, M Zamin Ali Khan, et al “Towards Identification and Recognition of Trace Associations in Software Requirements Traceability” Vol 9, Issue 5, pp 257-263 Sep, 2012.

[27]Hussain Saleem, M Zamin Ali Khan, et al “Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones” Vol 6 Issue 2, pp 26-34, Oct 2012

[28]Saim Masood Shaikh, Muhammad Zamin Ali Khan et al “NAVIGATING CONTEMPORARY CHALLENGES OF SOFTWARE QUALITY ASSURANCE IN SOFTWARE TESTING” Vol 3 Issue 9, PP 45-71, April 2025.

[29]Humera Azam, M.Zamin Ali Khan et al, “Quality Assurance in the Digital Age: Exploring Contemporary Challenges in Software Testing” Vol 5 , Issue 2, PP 9-26, 2025

[30] Muhammad Zulqarnain Siddiqui , Muhammad Zamin Ali Khan et al, “ANALYSIS OF THE EFFECTIVENESS OF GENERATIVE AI MODELS FOR TEXT-TO-SQL TASKS IN BUSINESS INTELLIGENCE SYSTEMS” Vol3 Issue 12, PP 1777-1794 Dec 2025

Downloads

Published

2026-05-20

Issue

Section

Engineering and Technology

How to Cite

Enhancing Cyber Security And Performance In Multi-Tenant Cloud Computing Environments Through Adaptive Resource Management And Ai-Driven Threat Mitigation. (2026). Kashf Journal of Multidisciplinary Research, 3(05), 78-89. https://doi.org/10.71146/kjmr936