ZERO-TRUST ARCHITECTURE FOR AI WORKLOADS: SECURING MACHINE LEARNING OPERATIONS IN CLOUD ENVIRONMENTS

Authors

  • Srinivas Reddy Cheruku University of Central Missouri, USA Author

Keywords:

Zero-Trust Architecture, AI Security, Cloud Computing Security, Multi-Tenant Security, Machine Learning Operations

Abstract

This article presents a comprehensive framework for implementing zero-trust security architectures for AI/ML workloads in cloud environments. Drawing from extensive research and enterprise deployments, it addresses the challenges of securing distributed AI operations while maintaining performance and scalability. The article explores core principles including identity-based security controls, secure data pipeline architectures, and multi-tenant considerations. The article demonstrates that organizations adopting zero-trust frameworks experience significant improvements in security posture, operational efficiency, and compliance management. The implementation patterns discussed encompass container security, identity-based access control, and data encryption strategies, providing a holistic approach to securing AI workflows. Special attention is given to monitoring, compliance controls, and best practices for architecture design and operational security.

References

Sobia Anwer et al., "Revolutionizing The Global Market: An Inclusion Of AI The Game Changer In International Dynamics," ResearchGate, August 2024. [Online]. Available: https://www.researchgate.net/publication/383547510_Revolutionizing_The_Global_Market_An_Inclusion_Of_AI_The_Game_Changer_In_International_Dynamics

Mehrdad Jangjou and Mohammad Karim Sohrabi, "A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing," ResearchGate, January 2022. [Online]. Available: https://www.researchgate.net/publication/358086912_A_Comprehensive_Survey_on_Security_Challenges_in_Different_Network_Layers_in_Cloud_Computing

Deepa Ajish, "The significance of artificial intelligence in zero trust technologies: a comprehensive review," Journal of Engineering Science, Innovation and Technology, vol. 4, no. 2, pp. 1-28, 5 August 2024. [Online]. Available: https://jesit.springeropen.com/articles/10.1186/s43067-024-00155-z

Ramanpreet Kaur et al., "Artificial intelligence for cybersecurity: Literature review and future research directions," Information Fusion, vol. 94, pp. 312-334, September 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1566253523001136

Monika Steidl et al., "The pipeline for the continuous development of artificial intelligence models—Current state of research and practice," Journal of Systems and Software, vol. 199, pp. 111632, May 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0164121223000109

Joseph Mart et al., "Container Security in Cloud Environments: A Comprehensive Analysis of Implementation Patterns," Science Open, pp. 1-28, 28 February 2024. [Online]. Available: https://www.scienceopen.com/document_file/25ec5a25-ad6c-4acf-b35f-ec11841b2460/ScienceOpenPreprint/Container%20Security%20in%20Cloud%20Environments.pdf

Shaikha Alqaydi et al, "The Role of AI in Cyber Security: Safeguarding Digital Identity," Journal of Information Security, vol. 15, no. 2, pp. 87-104, April 2024. [Online]. Available: https://www.scirp.org/journal/paperinformation?paperid=132859

Ashish Kumar et al, "Innovative Approaches To Scalable Multi-Tenant ML Frameworks," International Research Journal of Modernization in Engineering Technology and Science, vol. 2, no. 12, pp. 944-956, December 2020. [Online]. Available: https://www.irjmets.com/uploadedfiles/paper/volume_2/issue_12._december_2020/5394/final/fin_irjmets1729190813.pdf

Anshul Sharma, "Secure Efficiency: Navigating Performance Challenges in Multi-Tenant Cloud Security Implementations," International Journal for Research in Applied Science and Engineering Technology, vol. 12, no. 4, pp. 2321-9653, 23 September 2024. [Online]. Available: https://www.ijraset.com/research-paper/navigating-performance-challenges-in-multi-tenant-cloud-security-implementations

Irshaad Jada, et al. "The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review," Digital Security and Compliance, vol. 18, no. 4, pp. 237-256, June 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2543925123000372

Anand Ramachandran, "Transforming Regulatory Compliance: Architecting AI-Driven Solutions for Security, Adaptability, and Ethical Governance," ResearchGate Technical Report, pp. 1-42, November 2024. [Online]. Available: https://www.researchgate.net/publication/385660357_Transforming_Regulatory_Compliance_Architecting_AI-Driven_Solutions_for_Security_Adaptability_and_Ethical_Governance

Andrei Brazhuk et al., "Zero-Trust Architecture Patterns in Enterprise AI: Implementation Analysis and Best Practices," Journal of Network and Computer Applications, vol. 246, pp. 174-192, April 2024. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S0920548924000011

Debashish Paul et al., "Securing AI/ML Operations in Multi-Cloud Environments: Best Practices for Data Privacy, Model Integrity, and Regulatory Compliance," Journal of Science and Technology, vol. 8, no. 2, pp. 87-104, 2022. [Online]. Available: https://thesciencebrigade.com/jst/article/view/384

Published

2025-02-06

How to Cite

Srinivas Reddy Cheruku. (2025). ZERO-TRUST ARCHITECTURE FOR AI WORKLOADS: SECURING MACHINE LEARNING OPERATIONS IN CLOUD ENVIRONMENTS. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 8(1), 1655-1671. http://ijrcait.com/index.php/home/article/view/IJRCAIT_08_01_121