DETECTION, ANALYSIS AND PROTECTION OF CONFIDENTIAL DATA USING AMAZON MACIE MACHINE LEARNING TECHNOLOGY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.23.132144

Keywords:

machine learning, Amazon Macie, cyber security, automated analysis, confidential data, AWS

Abstract

Over the past decades, the field of data storage and processing has undergone significant changes and expansion, especially with the advent of cloud technologies and computing. Cloud services enable organizations to store and access large amounts of data through distributed systems. However, along with these new opportunities come new challenges, particularly in the area of protecting confidential data. Protecting sensitive data is an extremely important task for today's organizations, especially in the face of a growing number of digital threats and security breaches. In order to ensure reliable protection of valuable and sensitive information, developers and researchers are actively working on the development of new technologies and tools. One of the powerful tools used to identify, analyze and protect confidential data is the machine learning technology of the Amazon Macie service. Amazon Macie is an AWS cloud computing service that uses artificial intelligence and machine learning algorithms to automate data analysis and identify potential data security threats.

The main purpose of this work is the detection, analysis and protection of confidential data using Amazon Macie machine learning technology. Amazon Macie is an innovative service developed by Amazon Web Services (AWS) that uses advanced machine learning algorithms for automated discovery and analysis of sensitive data. As part of the work, an analysis of the main machine learning algorithms, principles of data storage systems and methods of protecting confidential information was carried out. The working principles and capabilities of Amazon Macie, which uses advanced machine learning algorithms for automated data analysis and detection of potential threats to data security, were investigated.

Downloads

Download data is not yet available.

References

Galvez, R., & Gurses, S. (2018). The Odyssey: Modeling Privacy Threats in a Brave New World, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 87–94. https://doi.org/10.1109/EuroSPW.2018.00018

Mishra, A., et al. (2023). Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm, 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 1685–1690, https://doi.org/10.1109/ICSCDS56580.2023.10104702

Devi, S., & Bharti, T. (2021). Study of Architecture and Issues in Services of Cloud Computing. 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1578–1581. https://doi.org/10.1109/ICAC3N53548.2021.9725679

Alaqra, A., Kane, B., & Fischer-Hübner, S. (2021). Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives. JMIR Hum Factors, 8(3):e21810. https://doi.org/10.2196/21810

Xu, G., et al. (2019). Sensitive Information Topics-Based Sentiment Analysis Method for Big Data, IEEE Access, 7, 96177–96190. https://doi.org/10.1109/ACCESS.2019.2927360

Xu, G., et al. (2019). Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities, IEEE Communications Magazine, 57(11), 116–122. https://doi.org/10.1109/MCOM.001.1900091

Butt, U., et al. (2020). Review of Machine Learning Algorithms for Cloud Computing Security. Electronics, 9(9):1379. https://doi.org/10.3390/electronics9091379

Amazon Macie Documentation. (n.d.). https://docs.aws.amazon.com/macie/

Kudrati, A., Peiris, C., Pillai, B. (2022). Hunting in AWS, in Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks. Wiley.

Monitoring data security and privacy with Amazon Macie. (n.d.). https://docs.aws.amazon.com/macie/latest/user/monitoring-s3.html

Iman, S., Sarah, B., &, Hassan, H. (2019). Security and Privacy of AWS S3 and Azure Blob Storage Services. 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 388–394. https://doi.org/10.1109/CCOMS.2019.8821735

Blohm, M., et al. (2019). Towards a Privacy Compliant Cloud Architecture for Natural Language Processing Platforms. ICEIS, 454–461. https://doi.org/10.5220/0007746204540461

Bermudez, I., et al. (2013). Exploring the Cloud from Passive Measurements: the Amazon AWS Case. Proceedings - IEEE INFOCOM, 230–234. https://doi.org/10.1109/INFCOM.2013.6566769

Shevchuk, D., et al. (2023). Designing Secured Services for Authentication, Authorization, and Accounting of Users. Cybersecurity Providing in Information and Telecommunication Systems II 2023, 3550, 217–225.

Investigating sensitive data with Amazon Macie findings. (n.d.). https://docs.aws.amazon.com/macie/latest/user/findings-investigate-sd.html

Locating sensitive data with Amazon Macie findings. (n.d.). https://docs.aws.amazon.com/macie/latest/user/findings-locate-sd.html

Downloads


Abstract views: 54

Published

2024-03-28

How to Cite

Partyka, A., Mykhaylova, O., & Shpak, S. (2024). DETECTION, ANALYSIS AND PROTECTION OF CONFIDENTIAL DATA USING AMAZON MACIE MACHINE LEARNING TECHNOLOGY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(23), 132–144. https://doi.org/10.28925/2663-4023.2024.23.132144