Navigating the Nexus of Cloud Security, Artificial Intelligence, And Regulatory Governance: A Multidisciplinary Framework for Scalable and Secure Data Ecosystems
Keywords:
Cloud Computing Security, Artificial Intelligence, Regulatory Compliance, E-HealthAbstract
The rapid migration of sensitive industrial and personal data to cloud-based infrastructures has necessitated a paradigm shift in how security, privacy, and compliance are managed. This research article provides an extensive investigation into the multifaceted challenges of cloud computing security, specifically within the e-health and financial sectors. By synthesizing contemporary literature on isolation infrastructures, attribute-based signcryption, and AI-driven regulatory compliance, this study establishes a comprehensive framework for "Sustainable Cloud Computing." The research explores the technical intricacies of securing Big Data and Internet of Things (IoT) environments, emphasizing the role of Resilient Distributed Datasets (RDDs) and automated metadata management. A significant portion of the analysis is dedicated to the emergence of "Compliance-as-Code," exemplified by HIPAA-automated audit trails in machine learning pipelines, and the integration of cognitive computing into next-generation intelligent information systems. Furthermore, the article addresses the geographic nuances of cloud security, the risks of cloud sourcing in public health, and the application of textual analysis in regulatory impact assessment. The findings suggest that a hybrid approach, combining advanced cryptographic protocols with AI-mediated operational optimization, is essential for mitigating the risks of model bias and data leakage. This study concludes by proposing a roadmap for future research in ontology-based provenance and fault-tolerant in-memory cluster computing.
References
1. Abrar, H., Hussain, S. J., Chaudhry, J., Saleem, K., Orgun, M. A., Al-Muhtadi, J., et al. Risk analysis of cloud sourcing in healthcare and public health industry. IEEE Access. 2018;6:19140–50.
2. Al-Issa, Y., Ottom, M. A., Tamrawi, A. eHealth cloud security challenges: A survey. Journal of Healthcare Engineering. 2019:2019. doi: 10.1155/2019/7516035.
3. Al-Issa, Y., Ottom, M. A., Tamrawi, A. eHealth cloud security challenges: A survey. Journal of Healthcare Engineering. 2019:2019. doi: 10.1155/2019/7516035.
4. Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., et al., editors. Cloud computing security challenges & solutions-A survey.. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC); IEEE; 2018.
5. Bazm, M-M., Lacoste, M., Südholt, M., Menaud, J-M. Isolation in cloud computing infrastructures: new security challenges. Annals of Telecommunications. 2019;74(3):197–209.
6. Clapham, B., Bender, M., Lausen, J., and P. Gomber. Policy making in the financial industry: A framework for regulatory impact analysis using textual analysis. Journal of Business Economics, vol. 93, pp. 1463-1464, 2023.
7. Gatla, T. R. AI-driven regulatory compliance for financial institutions: Examining how AI can assist in monitoring and complying with ever-changing financial regulations. International Journal of Computer Trends and Technology, vol. 12, no. 3, pp. 5-8, 2024.
8. George Amalarethinam, D., Rajakumari, S. A Survey on Security Challenges in Cloud Computing. 2019.
9. Giri, S., Shakya, S. Cloud Computing and Data Security Challenges: A Nepal Case. International Journal of Engineering Trends and Technology. 2019;67(3):146-150.
10. Kumar, P. R., Raj, P. H., Jelciana, P. Exploring data security issues and solutions in cloud computing. Procedia Computer Science. 2018;125:691–7.
11. Kumar, V., Sinha, S., & Harish, B. S. (2019). AI-based metadata management in big data ecosystem. In Proceedings of the 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 47–52.
12. Lemke, C., & Brenner, W. (2015). Cognitive computing: A brief guide to the next generation of intelligent information systems. Business & Information Systems Engineering, 57(5), 391–394.
13. Magalhães, D. S., Monteiro, S. B. S., and V. Vasconcellos. Mitigation of Model Risk in a Financial Institution. Proceedings of the 17th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6, 2022.
14. Marz, N., & Warren, J. (2015). Big Data: Principles and best practices of scalable real-time data systems. Manning Publications.
15. Modi, K. J., Kapadia, N. Progress in advanced computing and intelligent engineering. Springer; 2019. Securing healthcare information over cloud using hybrid approach. pp. 63–74.
16. Mork, P., & Smith, B. (2004). Ontology and information systems. In Proceedings of the Formal Ontology in Information Systems Conference (FOIS).
17. Pattanayak, S. K. The Impact of Artificial Intelligence on Operational Efficiency in Banking: A Comprehensive Analysis of Automation and Process Optimization. International Research Journal of Engineering and Technology (IRJET), vol. 8, no. 10, pp. 10315, 2023.
18. Pinheiro, A., Dias Canedo, E., de Sousa Junior, R. T., de Oliveira Albuquerque, R., García Villalba, L. J., Kim, T. H. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services. Sensors (Basel, Switzerland). 2018;18(3). doi: 10.3390/s18030753.
19. Rosenthal, A., & Seligman, L. (2002). Data lineage in metadata systems. Communications of the ACM, 45(5), 97– 101.
20. Stergiou, C., Psannis, K., Gupta, B., Ishibashi, Y. Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT. Sustain Comput Informatics Syst. 2018;19:174–84.
21. Subramanian, N., Jeyaraj, A. Recent security challenges in cloud computing. Computers & Electrical Engineering. 2018;71:28–42.
22. Varanasi, S. R. (2025b). HIPAA-AS-Code: Automated Audit Trails in AWS Sage Maker Pipelines. European Journal of Engineering and Technology Research, 10(5), 23–26. https://doi.org/10.24018/ejeng.2025.10.5.3287
23. W3C. (2019). Provenance Ontology (PROV-O). World Wide Web Consortium.
24. Xu, Q., Tan, C., Fan, Z., Zhu, W., Xiao, Y., and F. Cheng. Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption. IEEE Access, vol. 6, pp. 34051-34074, 2018.
25. Zaharia, M., Chowdhury, M., Das, T., Dave, A., Ma, J., McCauley, M., ... & Stoica, I. (2012). Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Emily Carter Bennit

This work is licensed under a Creative Commons Attribution 4.0 International License.