He Best Practices for Securing the Implementation of Artificial Intelligence in Cloud-Based Environments

Authors

  • Yasbeck Jemima Mora Chavez Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la Información, Machala, El Oro, Ecuador. https://orcid.org/0000-0003-2492-1413
  • Reinaldo Benedicto Fernández Gonzalez Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la Información, Machala, El Oro, Ecuador. https://orcid.org/0009-0008-2397-6993
  • Joofre Antonio Honores Tapia Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la Información, Machala, El Oro, Ecuador. https://orcid.org/0000-0001-8612-3025
  • Milton Rafael Valarezo Pardo Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la Información, Machala, El Oro, Ecuador. https://orcid.org/0000-0003-1819-2074

DOI:

https://doi.org/10.33936/isrtic.v9i2.7687

Keywords:

artificial intelligence, cloud computing, information security, best practices, systematic review

Abstract

The incorporation of Artificial Intelligence (AI) into Cloud Computing environments has enabled greater levels of scalability, efficiency, and automation in the creation of intelligent systems. However, this convergence has also highlighted new threats and critical challenges in terms of security and privacy. The present article develops a systematic review of scientific literature published between 2021 and 2025, following the PRISMA 2020 methodology, to identify good security practices applied to the deployment of AI projects in cloud computing environments. Twenty-five relevant studies were analyzed, which allowed for the synthesis of a set of recommendations focused on access management, API protection, data encryption, and event auditing. An artificial intelligence prototype incorporating security and data privacy controls was established and finally deployed in a cloud computing environment to validate the applicability of the best practices identified in the systematic review. The results obtained demonstrate the effectiveness of the controls applied, as well as the need to adopt proactive security strategies from the initial phases of AI deployment projects in the cloud.

Downloads

Download data is not yet available.

References

Abioye, S. O., Oyedele, L. O., Akanbi, L., Ajayi, A., Davila Delgado, J. M., Bilal, M., Akinade, O. O., & Ahmed, A. (2021). Inteligencia artificial en el sector de la construcción: Una revisión de la situación actual, oportunidades y retos futuros. Journal of Building Engineering, 44, Article 103299. https://doi.org/10.1016/j.jobe.2021.103299

Acosta Cortez, N. N. (2024). Impacto de la inteligencia artificial en la ciberseguridad empresarial: Un análisis crítico de la evolución de amenazas y medidas preventivas [Unpublished undergraduate thesis]. Universidad Técnica de Babahoyo, Facultad de Ciencias Informáticas. https://dspace.utb.edu.ec/handle/49000/15738

Ahmed, W., Iqbal, W., Hassan, A., Ahmad, A., Ullah, F., & Srivastava, G. (2025). Elevating e-health excellence with IOTA distributed ledger technology: Sustaining data integrity in next-gen fog-driven systems. Future Generation Computer Systems, 168, Article 107755. https://doi.org/10.1016/j.future.2024.107755

Alnami, H., Mahgoub, I., Al-Najada, H., & Alalwany, E. (2025). A distributed machine learning-based scheme for real-time highway traffic flow prediction in Internet of Vehicles. Future Internet, 17(3), Article 131. https://doi.org/10.3390/fi17030131

Bai, Y., Zhao, H., Shi, X., & Chen, L. (2025). Towards practical and privacy-preserving CNN inference service for cloud-based medical imaging analysis: A homomorphic encryption-based approach. Computer Methods and Programs in Biomedicine, 261, Article 108599. https://doi.org/10.1016/j.cmpb.2024.108599

Bello, S. A., Oyedele, L. O., Akinade, O. O., Bilal, M., Davila Delgado, J. M., Akanbi, L. A., Ajayi, A. O., & Owolabi, H. A. (2021). Cloud computing in construction industry: Use cases, benefits and challenges. Automation in Construction, 122, Article 103441. https://doi.org/10.1016/j.autcon.2020.103441

Cajamarca Sacoto, J. C., Chuquin Machangara, O. M., & Recalde Araujo, J. C. (2025). El papel de la inteligencia artificial en la ciberseguridad de redes empresariales. Revista Retos Para La Investigación, 4(1), 65–82. https://doi.org/10.62465/rri.v4n1.2025.126

Calle-Méndez, J. L., & Barriga-Andrade, J. J. (2025). Amenazas de seguridad asociadas con la integración de inteligencia artificial en sistemas de información: Revisión sistemática. MQRInvestigar, 9(1), Article e128. https://doi.org/10.56048/MQR20225.9.1.2025.e128

Chen, H.-P., & Ying, K.-C. (2022). Inteligencia artificial en el sector de la construcción: Principales trayectorias de desarrollo y perspectivas de futuro. Applied Sciences, 12(12), Article 5832. https://doi.org/10.3390/app12125832

Cui, W., Lin, Q., Shi, J., Zhou, X., Li, Z., Zhan, H., & Zhang, L. (2025). A secure and efficient framework for multimodal biometric authentication in cloud computing. Applied Sciences, 15(7), Article 3827. https://doi.org/10.3390/app15073827

Dewangan, N. K., & Chandrakar, P. (2025). TreatChain: A patient-centric treatment cycle security system using blockchain and AI in the cloud. Peer-to-Peer Networking and Applications, 18(3), Article 154. https://doi.org/10.1007/s12083-025-01984-z

Flores-Cedeño, P. R., Zambrano-Pilay, E. C., & Chiriboga-Mendoza, F. R. (2024). Seguridad informática e inteligencia artificial en la investigación científica. Revista Científica INGENIAR: Ingeniería, Tecnología e Investigación, 7(13), 2–10. https://www.journalingeniar.org/index.php/ingeniar/article/view/177

Grechi, V. L., de Oliveira, A. L., & Braga, R. T. V. (2025). Model-driven safety and security co-analysis: A systematic literature review. Journal of Systems and Software, 220, Article 112251. https://doi.org/10.1016/j.jss.2024.112251

Gujar, S. S. (2024, December). AI-enhanced intrusion detection systems for strengthening critical infrastructure security [Conference session]. 2024 Global Conference on Communications and Information Technologies (GCCIT), Bangalore, India. https://doi.org/10.1109/GCCIT63234.2024.10861950

Gutiérrez Rodríguez, J. D., & Castellanos-Sánchez, M. (2023). Transparencia algorítmica y estado abierto en Colombia. Reflexión Política, 25(52), 6–21. https://doi.org/10.29375/01240781.4789

Jiang, Y., Ye, Y., Zhao, H., Zhang, S., Cao, Y., & Gu, J. (2021). Analysis of smart water conservancy. Shuili Xuebao/Journal of Hydraulic Engineering, 52(11), 1355–1368. https://doi.org/10.13243/j.cnki.slxb.20210633

Kyivska, K. I., & Tsiutsiura, S. (2021). Implementation of artificial intelligence in the construction industry and analysis of existing technologies. Technology Audit and Production Reserves, 2(2), Article 58. https://doi.org/10.15587/2706-5448.2021.229532

Lamar Peña, F. S., Vega Mite, G. A., Honores Tapia, J. A., & Cárdenas Villavicencio, O. E. (2024). Validación y emisión de certificados en educación superior utilizando tecnología blockchain. Informática y Sistemas: Revista de Tecnologías de la Informática y las Comunicaciones, 8(1), 36–51. https://doi.org/10.33936/isrtic.v8i1.6535

Lin, L., Chen, C., Pan, L., Zhang, L. Y., Wang, Z., Zhang, J., & Xiang, Y. (2023). A survey of PPG’s application in authentication. Computers & Security, 135, Article 103488. https://doi.org/10.1016/j.cose.2023.103488

Pan, Y., & Zhang, L. (2021). Roles of artificial intelligence in construction engineering and management: A critical review and future trends. Automation in Construction, 122, Article 103517. https://doi.org/10.1016/j.autcon.2020.103517

Rueda-Castañeda, J. E., Gallego-Gómez, N., Estanling-Cárdenas, E., Tello, J. S., & García-Pineda, V. (2024). Identificación de variables relacionadas a la seguridad informática desde la aplicación de la tecnología blockchain. Revista Politécnica, 20(40), 9–29. https://doi.org/10.33571/rpolitec.v20n40a1

Sharma, N., & Dhiman, P. (2025). A survey on IoT security: Challenges and their mitigation strategies in cloud-centric architectures. Cluster Computing. Advance online publication. https://doi.org/10.1007/s10586-025-05208-0

Vaca, P. A., & Dulce-Villarreal, E. R. (2024). Blockchain para asegurar la integridad y trazabilidad en la cadena de custodia de evidencia digital en informática forense: Un estudio de mapeo sistemático. TecnoLógicas, 27(60), Article e3049. https://doi.org/10.22430/22565337.3049

Wazid, M., Mittal, S., Das, A. K., Islam, S. H., & Alenezi, M. (2025). Designing secure blockchain-based authentication and authorization mechanisms for smart city e-health systems. Journal of Systems Architecture, 156, Article 103365. https://doi.org/10.1016/j.sysarc.2025.103365

Zhang, Q., Cheng, L., & Boutaba, R. (2010). Computación en la nube: Estado del arte y desafíos de la investigación. Journal of Internet Services and Applications, 1(1), 7–18. https://doi.org/10.1007/s13174-010-0007-6

Zhang, X., Antwi-Afari, M. F., Zhang, Y., & Xing, X. (2024). The impact of artificial intelligence on organizational justice and project performance: A systematic literature and science mapping review. Buildings, 14(1), Article 259. https://doi.org/10.3390/buildings14010259

Published

2025-08-26

How to Cite

[1]
Mora Chavez, Y.J., Fernández Gonzalez, R.B., Honores Tapia, .J.A. and Valarezo Pardo, M.R. 2025. He Best Practices for Securing the Implementation of Artificial Intelligence in Cloud-Based Environments. Informática y Sistemas. 9, 2 (Aug. 2025), 152–163. DOI:https://doi.org/10.33936/isrtic.v9i2.7687.

Issue

Section

Regular Papers

Most read articles by the same author(s)