Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

Conversational Artificial Intelligence 1st

Edition Romil Rawat


Visit to download the full and correct content document:
https://textbookfull.com/product/conversational-artificial-intelligence-1st-edition-romil-r
awat/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Understanding Artificial Intelligence 1st Edition


Nicolas Sabouret

https://textbookfull.com/product/understanding-artificial-
intelligence-1st-edition-nicolas-sabouret/

Artificial Intelligence By Example Develop machine


intelligence from scratch using real artificial
intelligence use cases Denis Rothman

https://textbookfull.com/product/artificial-intelligence-by-
example-develop-machine-intelligence-from-scratch-using-real-
artificial-intelligence-use-cases-denis-rothman/

Playing Smart: On Games, Intelligence, and Artificial


Intelligence 1st Edition Julian Togelius

https://textbookfull.com/product/playing-smart-on-games-
intelligence-and-artificial-intelligence-1st-edition-julian-
togelius/

AI Meets BI: Artificial Intelligence and Business


Intelligence 1st Edition Lakshman Bulusu

https://textbookfull.com/product/ai-meets-bi-artificial-
intelligence-and-business-intelligence-1st-edition-lakshman-
bulusu/
Artificial Intelligence and Robotics 1st Edition Huimin
Lu

https://textbookfull.com/product/artificial-intelligence-and-
robotics-1st-edition-huimin-lu/

Artificial Intelligence and Games 1st Edition Georgios


N. Yannakakis

https://textbookfull.com/product/artificial-intelligence-and-
games-1st-edition-georgios-n-yannakakis/

Artificial Intelligence in Healthcare 1st Edition Adam


Bohr (Editor)

https://textbookfull.com/product/artificial-intelligence-in-
healthcare-1st-edition-adam-bohr-editor/

The Psychoanalysis of Artificial Intelligence 1st


Edition Isabel Millar

https://textbookfull.com/product/the-psychoanalysis-of-
artificial-intelligence-1st-edition-isabel-millar/

Artificial Intelligence Design Law and Fashion 1st


Edition Yilmaztekin

https://textbookfull.com/product/artificial-intelligence-design-
law-and-fashion-1st-edition-yilmaztekin/
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Conversational Artificial Intelligence
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Phillip Carmical (pcarmical@scrivenerpublishing.com)
Martin Scrivener (martin@scrivenerpublishing.com)
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106

Publishers at Scrivener
Scrivener Publishing
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Conversational Artificial Intelligence

Krishnan Sakthidasan Sankaran


Rajesh Kumar Chakrawarti

Mary Sowjanya Alamanda


Sanjaya Kumar Sarangi

Kotagiri Srividya
Romil Rawat

Piyush Vyas
Edited by

and
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener
Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2024 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to
obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

Wiley Global Headquarters


111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.
wiley.com.

Limit of Liability/Disclaimer of Warranty


While the publisher and authors have used their best efforts in preparing this work, they make no rep­resentations or warran-
ties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including
without limitation any implied warranties of merchant-­ability or fitness for a particular purpose. No warranty may be created
or extended by sales representa­tives, written sales materials, or promotional statements for this work. The fact that an orga-
nization, website, or product is referred to in this work as a citation and/or potential source of further informa­tion does not
mean that the publisher and authors endorse the information or services the organiza­tion, website, or product may provide or
recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering pro-
fessional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with
a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial
damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware
that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

Library of Congress Cataloging-in-Publication Data

ISBN 9781394200566

Cover images: Machine Learning AI: Semisatch | Dreamstime.com, AI Chess: Maxuser2 | Dreamstime.com, AI Monitoring
MachineL Ekkasit919 | Dreamstime.com
Cover design by Kris Hackerott

Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines

Printed in the USA

10 9 8 7 6 5 4 3 2 1
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents

Preface xxiii
1 A Glance View on Cloud Infrastructures Security and Solutions 1
Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
1.1 Introduction 2
1.2 Methodology 4
1.3 Literature Review 5
1.4 Open Challenges 10
1.5 Recommendations 11
1.6 Conclusion 12
Acknowledgments 13
References 13
2 Artificial Intelligence Effectiveness for Conversational Agents
in Healthcare Security 17
Ahmad Mateen Buttar and Abdul Hyee
2.1 Introduction 17
2.2 Types of AI Relevance to Healthcare 18
2.2.1 Machine Learning (ML)—Neural Networks and Deep Learning 18
2.2.2 Rule-Based Expert System 18
2.2.3 Robotic Process Automation 18
2.3 The Future of AI in Healthcare 19
2.4 Ways of Artificial Intelligence that Will Impact Healthcare 19
2.4.1 Unifying Mind and Machine Using BCIs 19
2.4.2 Radiology’s Next Generation 19
2.4.3 Developing the Immunotherapy Treatment 19
2.4.4 Tracking Health with Personal and Portable Devices 20
2.5 AI Models 20
2.5.1 Artificial Neural Network 20
2.5.2 Zero Trust Technology Application for AI Medical Research 21
2.6 Compare E-Cohort Findings on Wearables and AI in Healthcare 23
2.6.1 Results 23
2.6.1.1 Participant Characteristics 23
2.7 Ethical Concerns of AI in Healthcare 25
2.8 Future in Healthcare 25
2.9 Conclusion 26
References 27

v
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
vi Contents

3 Conversational AI: Security Features, Applications, and Future Scope


at Cloud Platform 31
Ahmad Mateen Buttar, Faisal Shahzad and Uzma Jamil
3.1 Introduction 32
3.2 How Does Conversational Artificial Intelligence (AI) Work? 33
3.3 The Conversational AI Components 33
3.4 Uses of Conversational AI 35
3.5 Advantages of Conversational AI 38
3.5.1 Cost-Effectiveness 38
3.5.2 Enhanced Sale and Customer Engagement 38
3.5.3 Scalability 39
3.5.4 Detect and Prevent Cyberattacks Through AI 39
3.5.5 Businesses Benefit from Automated Response Work 39
3.6 Challenges with Conversational Artificial Intelligence 39
3.7 Risks Associated with Conversational AI 40
3.7.1 5D-Model for Discretion 48
3.7.2 User Consciousness 48
3.7.3 RFID Protects Privacy and Security 48
3.7.4 Data Aggregation 48
3.7.5 Stakeholder Model 48
3.7.6 2 × 2 Framework 49
3.7.7 Framework for Mobile Cloud 49
3.7.8 Changes to Pseudonyms in Intelligent Transportation Systems 49
3.7.9 Homomorphic Encryption 49
3.7.10 Three-Layer Model 49
3.7.11 Linear Algebra 49
3.7.12 Continuous Streaming Data 50
3.7.13 DBMS Defense Against Insider Threats 50
3.7.14 Transaction Data Anonymization 50
3.7.15 D-Mash Model 50
3.7.16 A Safe Cryptosystem Based on Lattice 50
3.8 Proposed Model for Conversational AI in Cloud Platform 50
3.9 Conclusion 52
3.10 Future Work 52
References 53
4 Unsupervised BERT-Based Granular Sentiment Analysis of Literary Work 59
N. Shyamala Devi and K. Sharmila
4.1 Introduction 59
4.2 Related Works 60
4.3 Text Extraction 60
4.4 Data Preprocessing 61
4.5 Sentiment Analysis on Literary Works 63
4.6 TF-IDF Vectorizer 63
4.7 Fine-Grained Sentiment Analysis on Literary Data 64
4.8 BERT Classifier for Unsupervised Learning 66
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents vii

4.9 Conclusion 67
References 67
5 Extracting and Analyzing Factors to Identify the Malicious Conversational
AI Bots on Twitter 71
Gitika Vyas, Piyush Vyas, Prathamesh Muzumdar, Anitha Chennamaneni,
Anand Rajavat and Romil Rawat
5.1 Introduction 71
5.2 Literature Review 73
5.3 Methods 74
5.4 Results and Discussion 77
5.5 Conclusion and Future Direction 81
References 81
6 Evolution and Adoption of Conversational Artificial Intelligence
in the Banking Industry 85
Neha Aggarwal and Kriti Bhaswar Singh
6.1 Introduction 85
6.2 Significance of Artificial Intelligence 87
6.3 Conversational AI in the Indian Banking Industry 88
6.4 Conversational AI in Use in Various Companies 88
6.5 Conclusion 91
References 92
7 Chatbots: Meaning, History, Vulnerabilities, and Possible Defense 95
Divya Nair
7.1 Understanding Chatbots 95
7.2 History of Chatbots 97
7.3 Vulnerabilities and Security Concerns of Chatbots 100
7.4 Possible Defense Strategies 103
7.5 Conclusion 104
References 104
8 Conversational Chatbot-Based Security Threats for Business and Educational
Platforms and Their Counter Measures 107
Hriakumar Pallathadka, Domenic T. Sanchez, Larry B. Peconcillo, Jr.,
Malik Jawarneh, Julie Anne T. Godinez and John V. De Vera
8.1 Introduction 108
8.2 Chatbot Applications in Education, Business Management,
and Health Sector 110
8.2.1 Chatbots for Education 110
8.2.2 Healthcare Domain Chatbots 111
8.2.3 E-Commerce Applications 111
8.2.4 Customer Support 112
8.3 Security and Privacy in Chatbot 113
8.4 Related Work 114
8.5 Methodology 118
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
viii Contents

8.6 Results and Discussion 120


8.7 Conclusion 122
References 123
9 Identification of User Preference Using Human–Computer Interaction
Technologies and Design of Customized Reporting for Business Analytics
Using Ranking Consistency Index 127
Martin Aruldoss, Miranda Lakshmi Travis
and Prasanna Venkatesan Venkatasamy
9.1 Introduction 127
9.2 Literature Review 128
9.3 Design of Metric for Ranking Consistency Index 130
9.4 Experimentation 131
9.5 Results and Discussion 132
9.6 Conclusion 142
References 142
10 Machine Learning for Automatic Speech Recognition 147
Hrishitva Patel, Ramakrishnan Raman, Malik Jawarneh, Arshiya S. Ansari,
Hriakumar Pallathadka and Domenic T. Sanchez
10.1 Introduction 148
10.2 Related Work 150
10.3 Methodology 159
10.4 Results 162
10.5 Conclusion 165
References 165
11 Conversational Artificial Intelligence at Industrial Internet of Things 169
Dhirendra Siddharth, DilipKumar Jang Bahadur Saini,
Mummadi Ramchandra and Summathi Loganathan
11.1 Introduction 169
11.1.1 What is Conversational AI? 170
11.1.2 What Does Conversational AI Do? 170
11.1.3 How Does Conversational AI Work? 170
11.2 Technology Components Used in Conversational AI 171
11.2.1 Natural Language Processing (NLP) 171
11.2.2 Advanced Dialog Management (ADM) 171
11.2.3 Machine Learning (ML) 171
11.2.4 Automatic Speech Recognition (ASR) 171
11.3 Benefits of Conversational AI 172
11.3.1 Improved Scalability 172
11.3.2 Cost-Efficient Technology 172
11.3.3 Improved User Engagement 172
11.3.4 Better Accessibility 172
11.4 How to Create Conversational AI? 172
11.5 Conversational Platforms and Internet of Things:
Relevance and Benefits 173
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents ix

11.5.1 Benefits of Implementing Chatbots with the IoT Interface 174


11.6 Internet of Things Status for Industry 174
11.6.1 The Impact of IIoT on Operational Effectiveness 174
11.6.2 Evolution of Legacy Systems 175
11.6.3 Increased Efficiency in Energy 175
11.6.4 Intelligent Data Analytics 175
11.6.5 Support Human Workers, Cobots are Connected 176
11.6.6 Smart Technologies (Digital Twins) are Becoming More Popular 176
11.6.7 The IIoT Landscape is Changing Due to Edge Computing 176
11.6.8 Adoption Hurdles and Common Pitfalls 177
11.7 Scope of IIoT in Future 177
11.7.1 The Effect of IIoT on Research and Development 178
11.8 Work of IIoT with Additional New Innovations 178
11.8.1 Manufacturing as a Service with IIoT 178
11.8.2 Cloud and Edge Computing Together 179
11.8.3 Prevention-Based Service 179
11.8.4 Equipment, Tool, and Inventory Use in Global Positioning
System (GPS) 180
11.9 Conclusion 180
References 181
12 Performance Analysis of Cloud Hypervisor Using Network Package
Workloads in Virtualization 185
J. Mary Ramya Poovizhi and R. Devi
12.1 Introduction 185
12.2 A Related Study on Energy Efficiency 190
12.3 Motivation 191
12.4 Experiment Methodology and Setup 191
12.4.1 Work Setup 192
12.5 Results and Discussion 192
12.5.1 Observation of Windows 193
12.5.2 Observation on Ubuntu 193
12.6 Conclusion 195
References 196
13 Evaluation of Chabot Text Classification Using Machine Learning 199
P. Kumaraguru Diderot, K. Sakthidasan Sankaran, Malik Jawarneh,
Hriakumar Pallathadka, José Luis Arias-Gonzáles and Domenic T. Sanchez
13.1 Introduction 199
13.2 Literature Survey 201
13.2.1 Optimization Techniques for Chatbot Text Feature Selection 201
13.2.2 Chatbot Text Classification Using Machine Learning 203
13.2.3 Text Clustering Techniques 206
13.3 Methodology 208
13.4 Results 210
13.5 Conclusion 214
References 214
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
x Contents

14 Enhanced Security in Chatbot 219


Ambika N.
14.1 Introduction 219
14.2 Architecture of Chatbots 221
14.3 Working of Chatbots 223
14.4 Background 225
14.5 Literature Survey 226
14.6 Proposed System 229
14.7 Analysis of the Work 230
14.8 Future Work 232
14.9 Conclusion 233
References 233
15 Heart Disease Prediction Using Ensemble Feature Selection Method
and Machine Learning Classification Algorithms 237
A. Lakshmi and R. Devi
15.1 Introduction 237
15.2 Review of Literature 239
15.3 Proposed Methodology 240
15.3.1 Data Description 240
15.3.2 Data Preprocessing 241
15.3.3 Feature Selection 241
15.3.4 Classification Algorithms 242
15.4 Experimental Results 243
15.5 Conclusion 245
References 245
16 Conversational AI: Dialoguing Most Humanly With Non-Humans 249
Rehan Khan, Shadab Pasha Khan and Syed Adnan Ali
16.1 Introduction 249
16.2 History 250
16.3 Chatbot vs. Conversational AI 253
16.4 Dialogue Systems 253
16.5 Human Computer Interaction 256
16.6 Artificial Intelligence 258
16.7 Components of Conversational AI 260
16.8 Frameworks, Models, and Architectures 262
16.9 Conclusion 265
References 265
17 Counterfeit Pharmaceutical Drug Identification 269
Sajidha S. A., Aakif Mairaj, Amit Kumar Tyagi, A. Vijayalakshmi, Nisha V. M.,
Siddharth Nair, C.K.M. Ganesan, Ram Gunasekaran and Hitarth Menon
17.1 Introduction 269
17.1.1 Related Works 270
17.2 Materials and Methods 276
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents xi

17.2.1 Data Description 276


17.2.2 Proposed Method 276
17.2.2.1 Preprocessing 277
17.2.2.2 Optical Character Recognition 278
17.2.2.3 Named Entity Recognition 279
17.2.2.4 Hash Functions 280
17.3 Results and Discussion 281
17.4 Conclusion 283
References 284
18 Advanced Security Solutions for Conversational AI 287
Ranjana Sikarwar, Harish Kumar Shakya, Ajay Kumar and Anjali Rawat
18.1 Introduction 287
18.1.1 Conversational AI Vulnerability 288
18.2 Background 290
18.3 Components of Conversational AI 290
18.4 Challenges with Conversational AI 291
18.5 Conclusion 298
References 298
19 Security Threats and Security Testing for Chatbots 303
Domenic T. Sanchez and Rodel S. Sartagoda
19.1 Introduction 303
19.2 Related Work 304
19.3 Vulnerability Assessment Tools 307
19.3.1 OpenVAS 307
19.3.2 Acunetix Vulnerability Scanner 307
19.3.3 Zaproxy by OWASP 308
19.3.4 Burpsuite by Portswigger 309
19.4 Penetration Testing 309
19.4.1 Types of Penetration Test 310
19.4.1.1 Black Box Testing 310
19.4.1.2 White Box Testing 311
19.4.1.3 Gray Box Testing 311
19.4.2 Penetration Testing Phases 312
19.4.2.1 Planning Process 312
19.4.2.2 Discovery Phase 312
19.4.2.3 Attack Phase 313
19.4.2.4 Reporting Phase 313
19.5 Vulnerabilities in Chatbot 314
19.6 Conclusion 315
References 316
20 ChatBot-Based Next-Generation Intrusion Detection System 319
Tzu-Chia Chen
20.1 Introduction 319
20.2 Literature Survey 321
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
xii Contents

20.2.1 Review of Optimization Algorithms for IDS 321


20.2.2 Review of Classification Methods for IDS 323
20.3 Methodology 325
20.4 Result Analysis 328
20.5 Conclusion 331
References 332
21 Conversational Chatbot With Object Recognition Using Deep Learning
and Machine Learning 335
A. Mahesh Babu, Malik Jawarneh, José Luis Arias-Gonzáles, Meenakshi,
Kishori Kasat and K.P. Yuvaraj
21.1 Introduction 335
21.2 Literature Survey 338
21.2.1 Object Recognition Using Deep Learning 338
21.2.2 Object Recognition in Real-Time Images 341
21.3 Methodology 344
21.4 Results and Discussion 346
21.5 Conclusion 348
References 348
22 Automatic Speech Recognition Design Modeling 353
Babu Rao.K, Bhargavi Mopuru, Malik Jawarneh, José Luis Arias-Gonzáles,
Samuel-Soma M. Ajibade and P. Prabhu
22.1 Introduction 353
22.2 Literature Survey 355
22.2.1 Noise Reduction Algorithms for Speech Enhancement 355
22.2.2 Speech Segmentation, Feature Extraction 358
22.3 Methodology 361
22.4 Experimental Result Analysis 363
22.5 Conclusion 364
References 364
23 The Future of Modern Transportation for Smart Cities Using Trackless
Tram Networks 369
Samson Arun Raj A. and Yogesh P.
23.1 Introduction 369
23.2 Proposed System Architecture 371
23.3 Working Process of the TRAM-RSU Framework 373
23.4 Experimental Analysis 378
23.5 Summary 381
References 382
24 Evaluating the Performance of Conversational AI Tools:
A Comparative Analysis 385
Deepika Chauhan, Chaitanya Singh, Romil Rawat and Manoj Dhawan
24.1 Introduction 385
24.2 Literature Review 386
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents xiii

24.3 Methodology 387


24.3.1 Methodology Phases 387
24.3.1.1 Define the Evaluation Metrics 387
24.3.1.2 Prepare the Test Data and Scenarios 387
24.3.1.3 Select the Evaluation Methodology 387
24.3.1.4 Conduct the Evaluation 388
24.3.1.5 Analyze and Interpret the Results 388
24.3.1.6 Draw Conclusions and Make Recommendations 388
24.3.2 Types of Evaluation Metrics Used for the Evaluation 388
24.3.2.1 Evaluation Metrics 389
24.3.2.2 Dialog Generation 389
24.3.2.3 User Experience 389
24.4 Result 389
24.4.1 Platforms Used for the Implementation of Conversational AI Tools 389
24.4.1.1 Amazon Lex 389
24.4.1.2 Google Dialog Flow 390
24.4.1.3 Microsoft’s Bot Framework 390
24.4.1.4 Wit.ai 390
24.4.1.5 Dialog Flow 390
24.4.1.6 LUIS 393
24.4.1.7 Watson Conversation 393
24.4.1.8 Rasa 393
24.4.1.9 Century Tech 393
24.4.2 Conversational AI Tools Used in Research 393
24.4.2.1 Data Collection 393
24.4.2.2 Data Analysis 394
24.4.2.3 Data Interpretation 395
24.4.2.4 Human–AI Interaction 396
24.4.2.5 Ethical Considerations 397
24.4.3 Smart Tutoring Systems 399
24.4.3.1 Carnegie Learning 399
24.4.3.2 DreamBox Learning 399
24.4.3.3 Squirrel AI 399
24.4.3.4 Knewton 399
24.4.3.5 Duolingo 399
24.4.3.6 Coursera 400
24.4.4 Smart Invigilation 400
24.4.4.1 Proctorio 400
24.4.4.2 ExamSof 401
24.4.4.3 Respondus Monitor 401
24.4.4.4 Honorlock 401
24.4.4.5 ProctorU 401
24.4.4.6 Kryterion Webassessor 401
24.4.4.7 Secure Exam Remote Proctor 401
24.4.4.8 Bvirtual 402
24.4.4.9 PSI Bridge 402
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
xiv Contents

24.4.4.10 Talview 402


24.4.5 Conversational AI Tools Used for Autonomous Grading Systems 403
24.4.5.1 Gradescope 403
24.4.5.2 Turnitin 403
24.4.5.3 Coursera Auto-Grader 403
24.4.5.4 Code Runner 403
24.4.5.5 EdX 403
24.4.5.6 AI-Assisted Grading 403
24.4.5.7 Light SIDE 403
24.4.5.8 Xceptiona lED 404
24.4.5.9 Vantage Learning’s MY Access 404
24.4.5.10 Gradescope for Programming 404
24.4.5.11 Grammarly 404
24.4.5.12 Pearson 404
24.4.6 Conversational AI-Based Monitoring System Tools 404
24.4.6.1 IBM Watson 404
24.4.6.2 Verint 405
24.4.6.3 Darktrace 405
24.4.6.4 Cybereason 405
24.4.6.5 Splunk 405
24.4.6.6 Microsoft Azure Monitor 405
24.4.6.7 OpsGenie 405
24.4.6.8 Botmetric 405
24.4.6.9 DataDog 406
24.4.6.10 IBM Watson Assistant 406
24.4.6.11 Hugging Face 406
24.4.6.12 Zabbix 406
24.5 Discussion 406
24.6 Conclusion 407
References 407
25 Conversational AI Applications in Ed-Tech Industry: An Analysis
of Its Impact and Potential in Education 411
Deepika Chauhan, Chaitanya Singh, Romil Rawat and Mukesh Chouhan
25.1 Introduction 411
25.2 Conversational AI in Ed-Tech Overview 412
25.3 Methodology 414
25.3.1 Planning 415
25.3.1.1 Inclusion and Exclusion Criteria 415
25.3.1.2 Source of Information 415
25.3.1.3 Search Procedure 415
25.3.2 Conducting the Review 416
25.3.2.1 Search String 416
25.3.2.2 Data Extraction 416
25.3.2.3 Quality Evaluation 419
25.3.3 Research Question Formulation 419
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents xv

25.3.4 Review Reporting 421


25.3.4.1 RQ1. What are the Different Streams in the Ed-Tech
Industry Where Conversational AI Applications
are Used? 421
25.3.4.2 RQ2. What are the Different Platforms Used in the
Ed-Tech Industry to Operate Conversational AI
Applications? 422
25.3.4.3 RQ3. What are the Different Roles Played by
Conversational AI Applications in the Ed-Tech Industry? 424
25.3.4.4 RQ2. What are the Primary Benefits of the
Conversational AI Applications in Ed-Tech Industry? 425
25.3.4.5 What are the Challenges Faced in the Implementation
of Conversational AI Applications in the Ed-Tech
Industry that Literature Reviewed? 426
25.3.4.6 RQ3. What are the Potential Future Areas of the Ed-Tech
Industry that Could be Benefited via the Applications of
Conversational AI Applications? 429
25.4 Conclusion, Limitation, and Future Work 430
References 431
26 Conversational AI: Introduction to Chatbot’s Security Risks, Their
Probable Solutions, and the Best Practices to Follow 435
Vivek Bhardwaj, Balwinder Kaur Dhaliwal, Sanjaya Kumar Sarangi,
T.M. Thiyagu, Aruna Patidar and Divyam Pithawa
26.1 Introduction 436
26.2 Related Work 437
26.3 History and Evolution of Chatbots 439
26.4 Components & Concepts that Make Conversational AI Possible 440
26.5 Working of Conversational AI 441
26.6 Reasons Behind why Companies are Using Chatbot 442
26.7 Plans for the Future Development of Conversational AI 444
26.8 Security Risks of Conversational AI’s Chatbot 446
26.9 Probable Solutions to the Security Vulnerabilities 448
26.10 Privacy Laws for the Security of Conversational AI and Chatbot 448
26.11 Chatbot and GDPR 449
26.12 Best Practices to Follow to Ensure Chatbot Security 451
26.13 Conclusion 454
Acknowledgment 454
References 454
27 Recent Trends in Pattern Recognition, Challenges and Opportunities 459
S. Kannadhasan and R. Nagarajan
27.1 Introduction 460
27.2 Optical Character Recognition 461
27.3 Various Sectors of Pattern Recognition 464
27.4 Applications of Natural Language Processing 468
27.5 Conclusion 474
References 474
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
xvi Contents

28 A Review of Renewable Energy Efficiency Technologies Toward


Conversational AI 477
S. Kannadhasan and R. Nagarajan
28.1 Introduction 478
28.2 Renewable Energy 482
28.3 Energy Technologies 485
28.4 Conversational AI 489
28.5 Conclusion 492
References 492
29 Messaging Apps Vulnerability Assessment Using Conversational AI 495
Tzu-Chia Chen
29.1 Introduction 495
29.1.1 Nature of Information Security 498
29.1.2 Information Security Assessment 498
29.1.2.1 Testing 498
29.1.2.2 Checking 498
29.1.2.3 Interview 498
29.1.3 Information Security Assessment Methodology 499
29.1.4 Information Security and Penetration Testing 500
29.2 Penetration Test 500
29.2.1 Difference between a Penetration Tester and an Attacker 500
29.2.2 Objectives of Penetration Test 501
29.2.3 Penetration Testing Phases 501
29.2.3.1 Planning Process 501
29.2.3.2 Discovery Phase 501
29.2.3.3 Attack Phase 502
29.2.3.4 Reporting Phase 503
29.3 Mobile App Security 503
29.3.1 Types of Attacks 504
29.4 Discovered Vulnerabilities in Mobile Applications 505
29.5 Mitigation Strategies Against Cross-Site Scripting and SQL Attacks 505
29.5.1 Cross-Site Scripting Mitigation Strategies 506
29.5.2 SQL Injection Attack Mitigation Strategies 507
29.6 Mobile Application Security Framework 507
29.7 Conclusion 509
References 510
30 Conversational AI Threat Identification at Industrial Internet of Things 513
Boussaadi Smail, Meenakshi, José Luis Arias-Gonzáles,
Malik Jawarneh, P. Venkata Hari Prasad
and Harikumar Pallathadka
30.1 Introduction 514
30.2 IoT Layered Architecture 516
30.3 Security Issues in IoT 518
30.4 Literature Survey of Various Attacks on Industrial Internet of Things 520
30.5 Various Attacks in Industrial Internet of Things 523
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents xvii

30.5.1 Perception Layer Attacks 523


30.5.2 Network Layer Attacks 525
30.5.3 Application Layer Attacks 526
30.6 Recent Attacks on Industrial IoT 527
30.7 Conclusion 528
References 528
31 Conversational AI—A State-of-the-Art Review 533
Vivek Bhardwaj, Mukesh Kumar, Divyani Joshi, Ankita Chourasia,
Bhushan Bawaskar and Shashank Sharma
31.1 Introduction 533
31.1.1 History of Conversational AI 536
31.1.2 Evolution of Conversational AI 536
31.2 Related Work 545
31.3 Problem Statement 545
31.4 Proposed Methodology 546
31.5 Regulatory Landscape of Conversational AI 549
31.6 Future Works 550
31.7 Conclusion 552
References 552
32 Risks for Conversational AI Security 557
Vivek Bhardwaj, Safdar Sardar Khan, Gurpreet Singh, Sunil Patil,
Devendra Kuril and Sarthak Nahar
32.1 Introduction 558
32.2 Related Work 560
32.3 History and Evolution of Conversational AI Security 560
32.4 Components and Concepts that Make Coversational AI Security 561
32.4.1 Authentication and Authorization 562
32.4.1.1 Authentication and Authorization Working Together 562
32.4.1.2 Benefits of Authentication and Authorization 562
32.4.2 Encryption 563
32.4.3 Privacy 564
32.4.4 Trust 566
32.4.5 Threat Detection and Response 567
32.4.6 Compliance 568
32.4.7 Testing and Auditing 569
32.4.8 Continuous Improvement 571
32.5 Working of Conversational AI Security 572
32.5.1 Threat Modeling 573
32.5.2 Data Encryption 574
32.5.3 Secure Communication 575
32.5.4 Bot Detection 576
32.5.5 Continuous Monitoring 577
32.5.6 Regular Updates and Patching 578
32.6 Risk for Conversational AI Security 578
32.6.1 Data Privacy 578
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
xviii Contents

32.6.2 Malicious Attacks 579


32.6.3 Misuse of User Data 580
32.6.4 Social Engineering 580
32.7 Solutions for Conversational AI Security 581
32.7.1 Encryption and Access Control 581
32.7.2 Regular Security Audits 581
32.7.3 Transparent Data Collection Practices 582
32.7.4 Suspicious Behavior Detection 583
32.8 Conclusion 585
Acknowledgement 585
References 586
33 Artificial Intelligence for Financial Inclusion in India 589
Samir Xavier Bhawnra and K.B. Singh
33.1 Introduction 589
33.1.1 Financial Inclusion in India 590
33.1.2 Growth of Financial Inclusion in India 591
33.1.3 Direct Benefit Transfer 592
33.2 Digitalization of Banking Sector Paving Way for AI in Financial Inclusion 593
33.2.1 Digital Financial Inclusion Journey 593
33.2.2 Importance of Aadhaar for Digital Banking 594
33.2.3 Unified Payments Interface (UPI) 594
33.2.4 RuPay 594
33.3 Technology Acceptance Model 595
33.4 AI and Use of AI in Financial Inclusion 596
33.4.1 Advent of AI Banking in India 596
33.4.2 Artificial Intelligence (AI) 596
33.4.3 Function of AI in Banking Sector 597
33.4.4 The Main Purpose of Using AI in Banking 597
33.4.5 Adoption of AI for Financial Inclusion 598
33.4.6 Use of AI for Financial Inclusion 600
33.4.7 Financial Inclusion With the Help of e-KYC 600
33.5 Conclusion 601
References 604
34 Revolutionizing Government Operations: The Impact of Artificial
Intelligence in Public Administration 607
Aman Kumar Mishra, Amit Kumar Tyagi, Sathian Dananjayan,
Anand Rajavat, Hitesh Rawat and Anjali Rawat
34.1 Introduction 608
34.2 Methodology 611
34.3 The Origin and Development of AI Technology and Current
Methodologies in the Field 611
34.4 Artificial Intelligence in Indian Governance 612
34.4.1 Law Enforcement 612
34.4.1.1 Facial and Speech Recognition 613
34.4.1.2 Predictive Analytics 614
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents xix

34.4.1.3 Robo-Cops 615


34.4.2 Education 616
34.4.2.1 Decision Making 616
34.4.2.2 Personalized Learning 617
34.4.2.3 Student Services 618
34.4.2.4 Student Progress Monitoring 619
34.4.3 Defense 620
34.4.3.1 Intelligence, Surveillance, and Reconnaissance 620
34.4.3.2 Robot Soldiers 621
34.4.3.3 Cyber Defense 622
34.4.3.4 Intelligent Weapon Systems 623
34.5 Discharge of Government Functions 624
34.5.1 Citizen/Government Interface/E-Governance 624
34.5.1.1 Agriculture 625
34.5.1.2 Categorization and Arrangement of Documents 625
34.6 Challenges 626
34.6.1 Improved Capacity And Enhanced Understanding
of Emerging Technologies 626
34.6.2 Infrastructure 627
34.6.3 Trust 628
34.6.4 Funding 628
34.6.5 Privacy and Security 629
34.6.6 Transparency 630
34.7 Conclusion 631
References 632
Bibliography 633
35 Conversational AI and Cloud Platform: An Investigation of Security
and Privacy 635
V. Durga Prasad Jasti, Devabalan Pounraj, Malik Jawarneh,
Meenakshi, P. Venkata Hari Prasad and Samrat Ray
35.1 Introduction 635
35.2 Cloud Architecture 637
35.2.1 Cloud Components 638
35.2.1.1 Clients 638
35.2.1.2 Datacenter 639
35.2.1.3 Distributed Servers 639
35.2.2 Cloud Deployment Models 639
35.2.2.1 Public Cloud 639
35.2.2.2 Private Cloud 640
35.2.2.3 Community Cloud 640
35.2.2.4 Hybrid Cloud 641
35.2.3 The Cloud Computing Stack as Cloud Services 641
33.2.3.1 Software as a Service (SaaS) 642
35.2.3.2 Platform as a Service (PaaS) 642
33.2.3.3 Infrastructure as a Service (IaaS) 643
35.3 Literature Survey 644
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
xx Contents

35.4 Security in Conversational AI and Cloud Computing 647


35.4.1 Importance of Security in Cloud Computing 648
35.4.2 Security Principles 649
35.4.3 Cloud Computing and Conversational AI Security Issues 649
35.4.4 Security Attacks in Chatbot and Cloud Platform 650
35.5 Conclusion 651
References 651
36 Chatbot vs Intelligent Virtual Assistance (IVA) 655
Ajit Noonia, Rijvan Beg, Aruna Patidar, Bhushan Bawaskar, Shashank Sharma
and Hitesh Rawat
36.1 Introduction 655
36.2 Related Work 662
36.3 Problem Statement 664
36.4 Proposed Methodology 665
36.5 Regulatory Landscape 666
36.6 Future Works 667
36.7 Conclusion 670
References 671
37 Digital Forensics with Emerging Technologies: Vision and Research
Potential for Future 675
Anand Kumar Mishra, V. Hemamalini and Amit Kumar Tyagi
37.1 Introduction 675
37.2 Background Work 680
37.3 Digital Twin Technology—An Era of Emerging Technology 682
37.4 Security 683
37.4.1 Types of Security 684
37.5 Digital Forensics Characteristics 684
37.6 Computer Forensics 685
37.7 Tool Required for Digital Forensics 685
37.8 Importance of Computer and Digital Forensics in Smart Era 686
37.9 Methods/Algorithms for Digital Forensics in Smart Era 686
37.10 Popular Tools Available for Digital Forensics 687
37.11 Popular Issues Towards Using AI–Blockchain–IoT in Digital Forensics 688
37.12 Future Research Opportunities Using AI-Blockchain-IoT
in Digital Forensics 689
37.12.1 Other Future Works 690
37.12.2 Future of Blockchain 691
37.12.3 Future of Artificial Intelligence 691
37.12.4 Future of Internet of Things 692
37.12.5 Future of AI/ML–Blockchain–IoT Based Smart Devices in Digital
Forensics 692
37.13 Limitations AI/ML–Blockchain–IoT-Based Smart Devices
in Digital Forensics 693
37.14 Conclusion 694
References 695
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents xxi

38 Leveraging Natural Language Processing in Conversational AI Agents


to Improve Healthcare Security 699
Jami Venkata Suman, Farooq Sunar Mahammad, M. Sunil Kumar,
B. Sai Chandana and Sankararao Majji
38.1 Introduction 700
38.2 Natural Language Process in Healthcare 702
38.3 Role of Conversational AI in Healthcare 703
38.4 NLP-Driven Security Measures 705
38.5 Integrating NLP With Security Framework 708
38.6 Conclusion 709
References 710
39 NLP-Driven Chatbots: Applications and Implications in Conversational AI 713
A. Mary Sowjanya and Kotagiri Srividya
39.1 Introduction 713
39.2 Related Work 716
39.3 NLP-Driven Chatbot Technologies 719
39.4 Chatbot Software for Automated Systems 721
39.5 Conclusion 723
References 724
About the Editors 727
Index 729
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Preface

The book talks about how conversational artificial intelligence (AI) models, like chatbots,
may help IT departments work more efficiently by offering solutions like self-service chat-
bots that let users change their passwords and do other user identification procedures. The
use of chatbots, or artificial conversation systems, is growing, although not all of their secu-
rity issues have been resolved. The term “conversational AI” refers to a group of technol-
ogies that allow computers and other devices to create speech- and automated messaging
applications. This enables human-like interaction between humans and robots. One of the
many chatbots available today with speech recognition and the ability to respond to chal-
lenging inquiries is Alexa. As demand for AI assistants rises, voice recognition technologies
are becoming increasingly crucial. Hackers and other harmful software are naturally drawn
to chatbot technology since it is responsible for obtaining and safeguarding sensitive infor-
mation. Businesses have included conversational chatbots and automatic response software
on their websites and social media platforms despite the increased threat of cyberattacks.
Platforms like Facebook, WhatsApp, and WeChat frequently deploy chatbots in their cus-
tomer service operations. While conversational AI will probably improve company pro-
cesses, hackers may also use it to reroute their cyberattacks. AI systems already possess a
plethora of knowledge about people, which helps them better grasp the kinds of arguments
that each individual respond to, When coupled with extraordinary human-like conversa-
tional abilities, it is a recipe for disaster. Possible results include phishing attacks, spam
calls, and fraudulent endeavours. In order to serve clients via a spoken or written interface,
conversational AI integrates natural language processing with conventional software such
as chatbots, voice assistants, or an interactive speech recognition system. Customers are
helped by conversational chatbots, which are an intriguing development since they make
the customer service sector relatively self-sufficient and react to their inquiries quickly and
accurately. A well-automated chatbot may drastically reduce personnel demands, but build-
ing one takes time. The importance of voice recognition systems is increasing as AI assis-
tants like Alexa gain popularity. Thanks to advancements in artificial intelligence, chatbots
in the business sphere may now communicate with clients in a sophisticated and technical
way. Contrary to popular belief, the proliferation of sensitive data in these chatbots has led
to grave security problems. Threats are one-off occurrences like malware or DDOS attacks.

xxiii
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
1
A Glance View on Cloud Infrastructures
Security and Solutions
Srinivasa Rao Gundu1 , Charanarur Panem2* and J. Vijaylaxmi3

Department of Computer Science, Government Degree College-Sitaphalmandi,


1

Hyderabad, Telangana, India


2
School of Cyber Security and Digital Forensic, National Forensic Sciences University,
Goa Campus, Goa, India
3
PVKK Degree & PG College, Anantapur, Andhra Pradesh, India

Abstract
Clients may benefit from cutting-edge cloud computing solutions created and offered in a cost-­
effective way by firms. In terms of cloud computing, the most serious problem is security, which
serves as a significant disincentive to individuals from embracing the technology in the first place.
Making cloud computing secure, particularly when it comes to the underlying infrastructure, is
essential. The domain of cloud infrastructure security has been subjected to a number of different
research programs; nonetheless, certain gaps remain unresolved, and new challenges continue to
emerge. This article provides an in-depth analysis of security issues that might arise at various levels
of the cloud architecture hierarchy. Specifically, it focuses on the most significant infrastructure-­
related challenges that might have an impact on the cloud computing business model in the near
future.
This chapter also discusses the several literature-based approaches to dealing with the different
security challenges at each level that are now accessible. To assist in the resolution of the challenges,
a list of the obstacles that have still to be conquered is presented. It has been discovered that numer-
ous cloud characteristics such as flexibility, elasticity, and multi-tenancy create new problems at
each infrastructure level after conducting an examination of the existing challenges. According to
research, a variety of security threats, including lack of availability, unauthorized usage, data loss, and
privacy violations, have the greatest effect across all levels of infrastructure. Multi-tenancy, in partic-
ular, has been proven to have the largest effect on infrastructure at all levels, even the most basic. The
study comes to a close with a number of suggestions for further research.

Keywords: Cloud computing, secure cloud infrastructure, application security, network security,
host security, data security

*Corresponding author: panem.charanarur_goa@nfsu.ac.in

Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Piyush Vyas, Mary Sowjanya Alamanda, Kotagiri Srividya
and Krishnan Sakthidasan Sankaran (eds.) Conversational Artificial Intelligence, (1–16) © 2024 Scrivener Publishing LLC

1
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
2 Conversational Artificial Intelligence

1.1 Introduction
Models for offering cloud computing services include the ones listed below as examples:
When it comes to providing cloud services, there are three fundamental models to con-
sider, each of which is becoming more established and common with each passing gen-
eration. For this, there are many various approaches to consider, including software as a
service, platform as a service, and infrastructure as a service (to name a few). A few of these
strategies include software development, platform and infrastructure as a service, and cloud
computing, among others (IaaS). In contrast to these three major models [1], an SPI model
is a combination of them and may be characterized as follows:
In order to get access to programs that are hosted on service provider infrastructure,
users must connect to them over the Internet. This is referred to as software as a service
(also known as SaaS for short) or cloud computing, depending on who you ask. These strat-
egies assist the customers of software offered under the SaaS business model, who are typi-
cally end users who subscribe to readily available programs. The SaaS model has also been
associated with a pay and use feature that would allow the end users to access software
through a web browser without having to deal with the headaches of installation, mainte-
nance, or making a significant upfront payment [2]. Some of the popular SaaS apps include
Sales force, Google Apps, and Google Docs.
User awareness is an important component of SaaS security from a security viewpoint.
However, the SaaS provider must hold on to a set of security conditions in order to ensure
that users adhere to the essential security protocols while using the service. Things like
multi-factor authentication, complicated passwords, and password retention are examples
of these requirements. An additional component that SaaS providers should have in place
is the adoption of security measures to secure customers’ data and to guarantee that it is
available for permitted usage at all times [3].
In computing, the phrase Platform as a Service refers to a collection of software and
development tools that are stored on the servers of a service provider and are available from
any location on the Internet. It provides developers with a platform on which they may
construct their apps without having to worry about the underlying mechanics of the service
they are relying on for support. It also makes it easier to manage the software development
life cycle, from planning to maintenance, in an efficient and effective way, thanks to the
PaaS architecture.
The platform also makes use of programming languages such as VC++, Python, Java,
etc. to allow users to construct their own apps on top of it. Many developers and program-
mers now depend on Platform as a Service (PaaS) firms such as WordPress, Go Daddy, and
Amazon Web Services to build their websites and host their online applications. Security,
according to the PaaS paradigm, is a shared responsibility that must be handled by both
developers and service providers in equal measure. Example: When developing applica-
tions, developers must follow security standards and best practices to guarantee that the
applications are safe and secure. A programmer, for example, must certify that the software
is free of flaws and vulnerabilities [4] before exposing it to the general public.
Aspects of this process that are equally important include the detection and correction of
any security flaws that attackers may exploit in order to get access to and compromise users’
data. For developers, the dependability of PaaS technology, on the other hand, is critical in
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
A Glance View on Cloud Infrastructures Security and Solutions 3

order to provide a safe and secure environment for application development. For example,
several programming environments, such as C++, are well-known for having poor memory
management, which enables attackers to conduct a variety of assaults against their victims,
including stack overflows.
A lack of sufficient authentication in some relational database management systems
(RDBMSs), such as Oracle, may also be exploited by attackers. Oracle, for example, allows
users who have been granted admin permissions at the operating system level to access the
database without the need for a username and password [5].
A kind of cloud computing paradigm in which a cloud computing service provider
keeps the resources that are only shared with contractual customers that pay a per-use
charge to the cloud computing service provider is known as Infrastructure as a Service
(IaaS). In particular, one of the key benefits of the Equipment as a Service model is that
it removes the need for a significant initial investment in computer infrastructure such
as networking devices, computer processors and storage capacity, and servers. The tech-
nology may also be used to quickly and cost-effectively increase or reduce the amount of
computer resources available to a user. In this day and age, with the proliferation of cloud
delivery systems, it may be challenging to determine the boundaries of one’s security
responsibilities. Security is the responsibility of both cloud service providers (CSPs) and
the clients that use their services. As seen in Illustration 5, the duties of cloud computing
service delivery models are outlined. Cloud computing services include infrastructure
as a service (IaaS) offerings such as Amazon Web Services, Cisco Meta-cloud, Microsoft
Azure, and Google Compute Engine (GCE). It is important to note that customer-facing
infrastructure is critical in terms of security since it acts as the first line of defense for the
system’s perimeter.
In this environment, attackers may use a variety of strategies to target the infrastructure,
including denial of service (DoS) attacks and malware distribution campaigns. The major-
ity of the time, the security of a PaaS solution is the responsibility of the service provider.
Cloud Models and Architectures: An introduction determining the kind of cloud
an institution should use is the first and most important stage in cloud deployment, as
this will allow for a more smooth installation process to take place. During the cloud
deployment process, the second and final step is known as deployment. According to
the authors, institutions who have failed to execute a deployment plan have done so as a
result of selecting the incorrect kind of cloud infrastructure. In order to prevent failure,
organizations must first assess their data before deciding on the kind of cloud infrastruc-
ture to use. While many consumers consider security when signing up for cloud services,
many do not because they have a misconception of the efficiency of the protection given
by cloud services in and of itself. When it comes to keeping their data secure, many
businesses that use cloud computing depend only on the security measures employed by
cloud service providers. This may provide hostile actors the ability to exploit client-side
vulnerabilities in order to attack the systems of one or more tenants as a result of the
situation [6].
To mention a few examples, public cloud, private cloud, community cloud, and hybrid
cloud are all concepts that are being explored.
Public cloud is often referred to as an external cloud in some areas, as is the case with
the Amazon Web Services (AWS) public cloud. This kind of cloud is accessible to all users
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
4 Conversational Artificial Intelligence

or large groups of users through the Internet, with cloud service providers retaining con-
trol over the environment. Customers may access any data that are made accessible on the
network using this service, which is managed by the service provider. A cost-effective and
scalable means of implementing information technology solutions is made feasible via the
usage of public cloud computing. Because of the Internet connection, a variety of security
dangers are introduced into the system, including denial-of-service (DoS) attacks, malware,
ransomware, and advanced persistent threat (APT) assaults [7, 8].
Cloud inside an organization: The private cloud, also known as the internal cloud, is
a kind of cloud that is used within an organization. This category’s emphasis is focused
on a single user, group, or institution at the time of writing. Although the cost of private
clouds is more than the cost of public clouds, they are more secure than public clouds.
The fact that a private cloud is housed behind an enterprise’s firewall allows users within
the organization to access it via the company’s intranet. Privatized clouds, in contrast to
public cloud computing, are less secure since less money and experience is directed on
the development of services and systems, much alone the protection of data in the private
cloud. Consequently, some components may become vulnerable, allowing hostile actors to
conduct attacks against these vulnerable components by exploiting the weaknesses of these
vulnerable components [8].
The community cloud provides assistance for a variety of communities with common
interests, such as missions, rules, security needs, and regulatory compliance difficulties,
among other things. Depending on the circumstances, institutions or a third party may
be in charge of managing it on-site or off-site. When compared to the standard cloud, the
community cloud offers stronger privacy, security, and policy compliance protections. The
degree of security in a community cloud environment is determined by the quantity of
security awareness present in the community, as well as the importance of security to the
activities of the community as a whole. The cloud storage of sensitive data from a govern-
ment agency may endanger national security if the material is made available to the public,
as has happened in the past. It follows as a result that security measures should be included
in cloud computing environments [9].
Hybrid Cloud: Due to the diverse variety of needs that an institution has, this kind of
cloud deployment is required. It combines two or more models in order to deliver cloud-
based computing services (public, private, or community). Enterprises may use private
clouds to store sensitive data or apps in a secure environment while hosting non-sensitive
data or applications in a public cloud environment. Because of the federation of clouds with
a diverse set of incompatible security measures, cloud hybridization, on the other hand, gen-
erates a host of security challenges. A consequence of this is that attackers uncover vulner-
abilities in one or more clouds with the intent of getting access to the whole infrastructure.

1.2 Methodology
In this research, the results were gathered through a review of the available literature. How
to Plan and Organize the Review Process: The following are the three sub-phases of this
phase: acquiring the research goals, establishing the research questions, and choosing the
search technique to be employed in the study are all included in this phase.
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
A Glance View on Cloud Infrastructures Security and Solutions 5

The Investigation’s Goals and Objectives


The following are the key aims of the research:

1. The goal of this project is to provide a new taxonomy for safe cloud architec-
ture based on the current state-of-the-art literature.
2. To provide an in-depth review of a wide range of issues and solutions that are
used in cloud infrastructure at various degrees of complexity.
3. To draw attention to the disadvantages and dangers of the presently available
solutions with respect to the research challenges and upcoming possibilities.

Take a look at the following questions:


Accordingly, the research explores if it is possible to answer two critical issues, which are
listed below, in order to fulfill the goals.
Answer Question 1: What are some of the most well-known challenges in cloud comput-
ing architecture, as well as the proposed remedies at different levels of abstraction?
In your opinion, what is the security dangers associated with cloud that might prevent it
from being more extensively used?

Various Methods of Obtaining Information


Academia’s digital resources, such as the ACM Digital Library, Arxiv, and a few more
relevant international conferences, were employed to pull related works for this research
from a variety of academic digital resources. It was also possible to find relevant worldwide
conferences via Springer, IEEE Explore, Science Direct, ACM Digital Library, Arxiv, and a
few more relevant international conferences through other sources.
It is believed that they are adequate for covering the most recent and credible litera-
ture on cloud infrastructure challenges as well current security solutions, according to
the study’s authors who conducted the research. In the period between 2011 and 2020, an
extensive study of the literature was conducted. For the purpose of obtaining reliable search
results, this research searched large libraries using a combination of various search phrases
that were generated using a reduplicate technique in order to increase the number of rel-
evant studies found in the results (optimal results). The terms “Application Security” and
“Network Security” were also among the most frequently used. These keywords were used
to split the study into various categories, which allowed researchers to connect the relevant
studies with the proper cloud infrastructure tiers, which comprised application, network,
and host tiers as well as data and data infrastructure tiers, among others. In order to accom-
plish this approach, it is required to collect keywords and topics from the abstracts of the
studies that emphasize the contributions of the study [10] that are relevant to the research.

1.3 Literature Review


Over the course of the previous decade, a number of survey studies have been published
in which the security risks connected with the cloud computing environment have been
explored. When it comes to cloud security, the great majority of the information that has
been evaluated has made a substantial contribution to the management of these problems.
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
6 Conversational Artificial Intelligence

One such study looked at the most often found cloud security flaws and discovered a num-
ber of them. They also offered a number of additional solutions to security challenges that
arise in cloud architecture, each of which was meant to be sensitive to the personal data of
individual users. Data transfer through the cloud is subject to considerable security risks,
according to a research done. Participants in this survey were provided practical advice
on how to deal with potential dangers over the course of the survey. The results of a study
included a taxonomy and survey of cloud services, which were organized by cloud infra-
structure providers and revenue.
A service taxonomy was created, which encompasses themes such as computers, net-
working, databases, storage, analytics, and machine learning, among other things, as well as
additional topics. Regarding functionality, the computing, networking, and storage services
provided by all cloud suppliers are of a high quality, and they are commonly recognized as
the backbone of the cloud computing architecture.
According to a survey, cloud computing firms face a number of security issues. The cloud
client, the cloud service provider, and the owner of the data stored in the cloud were all
involved in this process. An investigation of various communication and storage options in
the crypto cloud was also conducted as part of the project. Researchers conducting studies
into the causes and consequences of different cyberattacks have access to the most up-to-
date information.
Many data protection issues that may develop in a multi-tenant cloud computing system
were examined and solutions were provided in a study published by the researchers. While
this poll focused more on data privacy than security, the prior survey was concerned with
both concerns at once.
A research gave a full definition of cloud computing, as well as the many different levels
of cloud architecture that can be found in the cloud computing environment. Part of the
research included a comparison of three service models (including SaaS, PaaS, and IaaS),
as well as three deployment methodologies, as part of the overall research design (private,
public, and community). It was determined that both private and public clouds have infor-
mation security needs; thus, the writers looked into it. A few of the most urgent difficulties
and restrictions related with cloud computing in terms of security were also covered during
this session.
According to a study published in the journal, one of the many different types of vul-
nerabilities that often occur in cloud computing systems is the inability to recognize the
flaws. To this research, the author’s contribution consisted in the categorization of different
sorts of threats in accordance with the accessibility of cloud-based service resources. It was
necessary to create this category in response to the extensive description and extent of the
multiple dangers that were faced.
There are several concerns about the security of cloud computing infrastructure. Four
critical levels of consideration should be taken into account while designing and executing
cloud infrastructure security: the data level, the application level, the network level, and the
host level (or the host itself) (or the physical location of the cloud infrastructure).
First and foremost, security refers to the protection of programs when they are using
hardware and software resources in order to prevent others from gaining control of them.
Among the most serious dangers at this level are distributed denial of service (DDoS)
assaults on software programs, which are becoming more common.
Another random document with
no related content on Scribd:
back
back
back
back
back
back
back
back
back
back
back
back

You might also like