A Multi-Layered Zero-Trust–Driven Cybersecurity Framework Integrating Deep Learning and Automated Compliance for Heterogeneous Enterprise Clouds

Authors

  • Parameswara Reddy Nangi Independent Researcher, USA. Author
  • Chaithanya Kumar Reddy Nala Obannagari Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3117-5481/AIJCST-V6I4P102

Keywords:

Zero Trust Architecture, Deep Learning, Cloud Security, Automated Compliance, Enterprise Clouds, Kubernetes Security, Policy Enforcement

Abstract

Modern enterprises increasingly operate across heterogeneous computing environments encompassing public cloud platforms (e.g., AWS, Azure, and GCP), private clouds, on-premises data centers, Kubernetes clusters, and edge infrastructures. While this architectural diversity enables scalability and agility, it also significantly expands the attack surface and complicates the enforcement of consistent security and regulatory controls. Traditional perimeter-based security models and static compliance mechanisms are insufficient to address the dynamic, distributed, and identity-centric nature of these environments. This paper proposes a multi-layered Zero Trust–driven cybersecurity framework that unifies identity-centric access control, continuous verification, and adaptive policy enforcement across heterogeneous enterprise clouds. The framework integrates deep learning–based behavioral analytics to enable real-time threat detection, risk scoring, and anomaly identification across users, workloads, and services. In parallel, an automated compliance engine implements compliance-as-code principles, continuously validating security posture against regulatory requirements and dynamically enforcing policies across multi-cloud and containerized environments. The proposed architecture is evaluated using a representative enterprise multi-cloud deployment, incorporating public cloud services, Kubernetes workloads, and on-premises resources. Experimental results demonstrate improved threat detection accuracy, reduced mean time to detection and response, and higher compliance adherence compared with conventional rule-based and perimeter-centric approaches, while maintaining acceptable system overhead. The key contribution of this work lies in delivering a unified, scalable, and intelligent Zero Trust framework that tightly couples deep learning–driven security analytics with automated compliance enforcement, providing a practical and extensible foundation for securing modern heterogeneous enterprise cloud ecosystems

References

[1] Kindervag, J. (2010). Build security into your network’s dna: The zero trust network architecture. Forrester Research Inc, 27, 1-16.

[2] Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

[3] Shamir, A. (1984, August). Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques (pp. 47-53). Berlin, Heidelberg: Springer Berlin Heidelberg.

[4] Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy (pp. 305-316). IEEE.

[5] Madupati, B. (2023). Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges. Scaling, and Security Challenges (June 30, 2023).

[6] Stallings, W. (2003). Network security essentials: applications and standards. Pearson Education India.

[7] Mikolov, T., Chen, K., Corrado, G., & Dean, J. (2013). Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781.

[8] Chen, Z., Wen, J., & Geng, Y. (2016, November). Predicting future traffic using hidden Markov models. In 2016 IEEE 24th international conference on network protocols (ICNP) (pp. 1-6). IEEE.

[9] Gundu, S. R., Panem, C. A., & Thimmapuram, A. (2020). Hybrid IT and multi cloud an emerging trend and improved performance in cloud computing. SN Computer Science, 1(5), 256.

[10] Breiman, L. (2001). Random forests. Machine learning, 45(1), 5-32.

[11] Salman, T., Bhamare, D., Erbad, A., Jain, R., & Samaka, M. (2017, June). Machine learning for anomaly detection and categorization in multi-cloud environments. In 2017 IEEE 4th international conference on cyber security and cloud computing (CSCloud) (pp. 97-103). IEEE.

[12] Schweizerische, S. N. V. (2013). Information technology-Security techniques-Information security management systems-Requirements. ISO/IEC International Standards Organization.

[13] Zhang, J., Chen, X., Xiang, Y., Zhou, W., & Wu, J. (2014). Robust network traffic classification. IEEE/ACM transactions on networking, 23(4), 1257-1270.

[14] Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011, July). Collaboration-based cloud computing security management framework. In 2011 IEEE 4th International Conference on Cloud Computing (pp. 364-371). IEEE.

[15] Theodoropoulos, T., Rosa, L., Benzaid, C., Gray, P., Marin, E., Makris, A., ... & Tserpes, K. (2023). Security in cloud-native services: A survey. Journal of Cybersecurity and Privacy, 3(4), 758-793.

[16] Kozik, R., Choraś, M., Ficco, M., & Palmieri, F. (2018). A scalable distributed machine learning approach for attack detection in edge computing environments. Journal of Parallel and Distributed Computing, 119, 18-26.

[17] Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero trust architecture (zta): A comprehensive survey. IEEE access, 10, 57143-57179.

[18] Dommari, S., & Khan, S. (2023). Implementing Zero Trust Architecture in Cloud-Native Environments: Challenges and Best Practices. Available at SSRN 5259339.

[19] Sarkar, S., Choudhary, G., Shandilya, S. K., Hussain, A., & Kim, H. (2022). Security of zero trust networks in cloud computing: A comparative review. Sustainability, 14(18), 11213.

[20] Maddireddy, B. R., & Maddireddy, B. R. (2020). Proactive cyber defense: utilizing Ai for early threat detection and risk assessment. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 64-83.

[21] Srokosz, M., Bobyk, A., Ksiezopolski, B., & Wydra, M. (2023). Machine-learning-based scoring system for antifraud CISIRTs in banking environment. Electronics, 12(1), 251.

[22] Bhat, J. (2023). Automating Higher Education Administrative Processes with AI-Powered Workflows. International Journal of Emerging Trends in Computer Science and Information Technology, 4(4), 147–157. https://doi.org/10.63282/3050-9246.IJETCSIT-V4I4P116

[23] Sundar, D. (2022). Architectural Advancements for AI/ML-Driven TV Audience Analytics and Intelligent Viewership Characterization. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(1), 124–132. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I1P113

[24] Jayaram, Y., & Sundar, D. (2022). Enhanced Predictive Decision Models for Academia and Operations through Advanced Analytical Methodologies. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(4), 113–122. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I4P113

[25] Bhat, J., & Sundar, D. (2022). Building a Secure API-Driven Enterprise: A Blueprint for Modern Integrations in Higher Education. International Journal of Emerging Research in Engineering and Technology, 3(2), 123–134. https://doi.org/10.63282/3050-922X.IJERET-V3I2P113

[26] Sundar, D., Jayaram, Y., & Bhat, J. (2022). A Comprehensive Cloud Data Lakehouse Adoption Strategy for Scalable Enterprise Analytics. International Journal of Emerging Research in Engineering and Technology, 3(4), 92–103. https://doi.org/10.63282/3050-922X.IJERET-V3I4P111

[27] Jayaram, Y. (2023). Cloud-First Content Modernization: Migrating Legacy ECM to Secure, Scalable Cloud Platforms. International Journal of Emerging Research in Engineering and Technology, 4(3), 130–139. https://doi.org/10.63282/3050-922X.IJERET-V4I3P114

[28] Bhat, J. (2022). The Role of Intelligent Data Engineering in Enterprise Digital Transformation. International Journal of AI, BigData, Computational and Management Studies, 3(4), 106–114. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V3I4P111

[29] Sundar, D., & Jayaram, Y. (2022). Composable Digital Experience: Unifying ECM, WCM, and DXP through Headless Architecture. International Journal of Emerging Research in Engineering and Technology, 3(1), 127–135. https://doi.org/10.63282/3050-922X.IJERET-V3I1P113

[30] Jayaram, Y., Sundar, D., & Bhat, J. (2022). AI-Driven Content Intelligence in Higher Education: Transforming Institutional Knowledge Management. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(2), 132–142. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I2P115

[31] Bhat, J., Sundar, D., & Jayaram, Y. (2022). Modernizing Legacy ERP Systems with AI and Machine Learning in the Public Sector. International Journal of Emerging Research in Engineering and Technology, 3(4), 104–114. https://doi.org/10.63282/3050-922X.IJERET-V3I4P112

[32] Sundar, D. (2023). Serverless Cloud Engineering Methodologies for Scalable and Efficient Data Pipeline Architectures. International Journal of Emerging Trends in Computer Science and Information Technology, 4(2), 182–192. https://doi.org/10.63282/3050-9246.IJETCSIT-V4I2P118

[33] Jayaram, Y., & Bhat, J. (2022). Intelligent Forms Automation for Higher Ed: Streamlining Student Onboarding and Administrative Workflows. International Journal of Emerging Trends in Computer Science and Information Technology, 3(4), 100–111. https://doi.org/10.63282/3050-9246.IJETCSIT-V3I4P110

[34] Bhat, J. (2023). Strengthening ERP Security with AI-Driven Threat Detection and Zero-Trust Principles. International Journal of Emerging Trends in Computer Science and Information Technology, 4(3), 154–163. https://doi.org/10.63282/3050-9246.IJETCSIT-V4I3P116

[35] Sundar, D., & Bhat, J. (2023). AI-Based Fraud Detection Employing Graph Structures and Advanced Anomaly Modeling Techniques. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(3), 103–111. https://doi.org/10.63282/3050-9262.IJAIDSML-V4I3P112

[36] Jayaram, Y. (2023). Data Governance and Content Lifecycle Automation in the Cloud for Secure, Compliance-Oriented Data Operations. International Journal of AI, BigData, Computational and Management Studies, 4(3), 124–133. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V4I3P113

[37] Bhat, J., & Jayaram, Y. (2023). Predictive Analytics for Student Retention and Success Using AI/ML. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(4), 121–131. https://doi.org/10.63282/3050-9262.IJAIDSML-V4I4P114

[38] Sundar, D. (2023). Machine Learning Frameworks for Media Consumption Intelligence across OTT and Television Ecosystems. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(2), 124–134. https://doi.org/10.63282/3050-9262.IJAIDSML-V4I2P114

[39] Jayaram, Y., & Sundar, D. (2023). AI-Powered Student Success Ecosystems: Integrating ECM, DXP, and Predictive Analytics. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(1), 109–119. https://doi.org/10.63282/3050-9262.IJAIDSML-V4I1P113

Downloads

Published

2024-07-06

Issue

Section

Articles

How to Cite

[1]
P. R. Nangi and C. K. Reddy Nala Obannagari, “A Multi-Layered Zero-Trust–Driven Cybersecurity Framework Integrating Deep Learning and Automated Compliance for Heterogeneous Enterprise Clouds”, AIJCST, vol. 6, no. 4, pp. 14–27, Jul. 2024, doi: 10.63282/3117-5481/AIJCST-V6I4P102.

Similar Articles

21-30 of 127

You may also start an advanced similarity search for this article.