DETECTION, ANALYSIS AND PROTECTION OF CONFIDENTIAL DATA USING AMAZON MACIE MACHINE LEARNING TECHNOLOGY
DOI:
https://doi.org/10.28925/2663-4023.2024.23.132144Keywords:
machine learning, Amazon Macie, cyber security, automated analysis, confidential data, AWSAbstract
Over the past decades, the field of data storage and processing has undergone significant changes and expansion, especially with the advent of cloud technologies and computing. Cloud services enable organizations to store and access large amounts of data through distributed systems. However, along with these new opportunities come new challenges, particularly in the area of protecting confidential data. Protecting sensitive data is an extremely important task for today's organizations, especially in the face of a growing number of digital threats and security breaches. In order to ensure reliable protection of valuable and sensitive information, developers and researchers are actively working on the development of new technologies and tools. One of the powerful tools used to identify, analyze and protect confidential data is the machine learning technology of the Amazon Macie service. Amazon Macie is an AWS cloud computing service that uses artificial intelligence and machine learning algorithms to automate data analysis and identify potential data security threats.
The main purpose of this work is the detection, analysis and protection of confidential data using Amazon Macie machine learning technology. Amazon Macie is an innovative service developed by Amazon Web Services (AWS) that uses advanced machine learning algorithms for automated discovery and analysis of sensitive data. As part of the work, an analysis of the main machine learning algorithms, principles of data storage systems and methods of protecting confidential information was carried out. The working principles and capabilities of Amazon Macie, which uses advanced machine learning algorithms for automated data analysis and detection of potential threats to data security, were investigated.
Downloads
References
Galvez, R., & Gurses, S. (2018). The Odyssey: Modeling Privacy Threats in a Brave New World, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 87–94. https://doi.org/10.1109/EuroSPW.2018.00018
Mishra, A., et al. (2023). Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm, 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 1685–1690, https://doi.org/10.1109/ICSCDS56580.2023.10104702
Devi, S., & Bharti, T. (2021). Study of Architecture and Issues in Services of Cloud Computing. 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1578–1581. https://doi.org/10.1109/ICAC3N53548.2021.9725679
Alaqra, A., Kane, B., & Fischer-Hübner, S. (2021). Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives. JMIR Hum Factors, 8(3):e21810. https://doi.org/10.2196/21810
Xu, G., et al. (2019). Sensitive Information Topics-Based Sentiment Analysis Method for Big Data, IEEE Access, 7, 96177–96190. https://doi.org/10.1109/ACCESS.2019.2927360
Xu, G., et al. (2019). Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities, IEEE Communications Magazine, 57(11), 116–122. https://doi.org/10.1109/MCOM.001.1900091
Butt, U., et al. (2020). Review of Machine Learning Algorithms for Cloud Computing Security. Electronics, 9(9):1379. https://doi.org/10.3390/electronics9091379
Amazon Macie Documentation. (n.d.). https://docs.aws.amazon.com/macie/
Kudrati, A., Peiris, C., Pillai, B. (2022). Hunting in AWS, in Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks. Wiley.
Monitoring data security and privacy with Amazon Macie. (n.d.). https://docs.aws.amazon.com/macie/latest/user/monitoring-s3.html
Iman, S., Sarah, B., &, Hassan, H. (2019). Security and Privacy of AWS S3 and Azure Blob Storage Services. 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 388–394. https://doi.org/10.1109/CCOMS.2019.8821735
Blohm, M., et al. (2019). Towards a Privacy Compliant Cloud Architecture for Natural Language Processing Platforms. ICEIS, 454–461. https://doi.org/10.5220/0007746204540461
Bermudez, I., et al. (2013). Exploring the Cloud from Passive Measurements: the Amazon AWS Case. Proceedings - IEEE INFOCOM, 230–234. https://doi.org/10.1109/INFCOM.2013.6566769
Shevchuk, D., et al. (2023). Designing Secured Services for Authentication, Authorization, and Accounting of Users. Cybersecurity Providing in Information and Telecommunication Systems II 2023, 3550, 217–225.
Investigating sensitive data with Amazon Macie findings. (n.d.). https://docs.aws.amazon.com/macie/latest/user/findings-investigate-sd.html
Locating sensitive data with Amazon Macie findings. (n.d.). https://docs.aws.amazon.com/macie/latest/user/findings-locate-sd.html
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Андрій Партика, Ольга Михайлова , Станіслав Шпак
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.