Best Practices for Secure Model Deployment on AWS

International Journal of Computer Science and Engineering
© 2024 by SSRG - IJCSE Journal
Volume 11 Issue 5
Year of Publication : 2024
Authors : Rahul Bagai

pdf
How to Cite?

Rahul Bagai, "Best Practices for Secure Model Deployment on AWS," SSRG International Journal of Computer Science and Engineering , vol. 11,  no. 5, pp. 8-18, 2024. Crossref, https://doi.org/10.14445/23488387/IJCSE-V11I5P102

Abstract:

Security in deploying Machine Learning on Amazon Web Services requires critical security enrichments to guarantee a seamless transition. AWS offers a plethora of features and services that ensure secure model deployment. It includes organizations utilizing encryption, access management, and compliance to lay down a practical operational framework. This article highlights how using the services and features of AWS structures the deployment process in securely handling and modeling for safe data management. In light of GDPR or HIPAA, regulatory compliance should be considered for their impact on ML model functionality. AWS provides structured approaches to manage deployment through systematic advancements for correctly handling ML deployment and security protocols.

Keywords:

Machine Learning (ML), Amazon Identity Management (AIM), Access Control, Encryption, Amazon Web Services (AWS).

References:

[1] Mohd Javaid et al., “Significance of Machine Learning in Healthcare: Features, Pillars and Applications,” International Journal of Intelligent Networks, vol. 3, pp. 58-73, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Hafsa Habehh, and Suril Gohel, “Machine Learning in Healthcare,” Current Genomics, vol. 22, no. 4, pp. 291-300, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Rakhi Akhare et al., “Employing Machine Learning Approaches for Predictive Data Analytics in Retail Industry,” Machine Learning Approach for Cloud Data Analytics in IoT, pp. 53-70, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Rahul Rai et al., “Machine Learning in Manufacturing and Industry 4.0 Applications,” International Journal of Production Research, vol. 59, no. 16, pp. 4773-4778, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Limon Barua, Bo Zou, and Yan Zhou, “Machine Learning for International Freight Transportation Management: A Comprehensive Review,” Research in Transportation Business & Management, vol. 34, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Prashansa Sinha, “Cloud computing Using AWS: An Analysis,” Indian Journal of Computer Science, pp. 27-35, 2020.
[Google Scholar] [Publisher Link]
[7] Manish Saraswat, and R.C. Tripathi, “Cloud Computing: Comparison and Analysis of Cloud Service Providers-AWS, Microsoft and Google,” 9 th International Conference System Modeling and Advancement in Research Trends, Moradabad, India, pp. 281-285, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] A. Alalawi, A. Mohsin, and A. Jassim, “A Survey for AWS Cloud Development Tools and Services,” 3 rd Smart Cities Symposium, pp. 17-23, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Aman Yevge et al., “Review Paper on Cloud Service Provider–AWS, Azure, GCP,” EasyChair Preprints, 2022.
[Google Scholar] [Publisher Link]
[10] Neha Kewate et al., “A Review on AWS-Cloud Computing Technology,” International Journal for Research in Applied Science and Engineering Technology, vol. 10, no. 1, pp. 258-263, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Leon Radeck, “Automated Deployment of Machine Learning Applications to the Cloud,” Master's Thesis, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Manya K. Ravindranathan, D. Sendil Vadivu, and Narendran Rajagopalan, “Cloud-Driven Machine Learning with AWS: A Comprehensive Review of Services,” International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, Bangalore, India, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Stefan Boneder, “Evaluation and Comparison of the Security Offerings of the Big Three Cloud Service Providers Amazon Web Services, Microsoft Azure and Google Cloud Platform,” Doctoral Dissertation, Technische Hochschule Ingolstadt, 2023.
[Google Scholar] [Publisher Link]
[14] Ilkka Routavaara, Security Monitoring in AWS Public Cloud, 2020. [Online] Available: https://core.ac.uk/download/pdf/323463037.pdf
[15] Sivaranjith Galiveeti et al., “Cybersecurity Analysis: Investigating the Data Integrity and Privacy in AWS and Azure Cloud Platforms,” Artificial Intelligence and Blockchain for Future Cybersecurity Applications, vol. 90, pp. 329-360, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Piyush Sharma, and Rahul Saxena, “Security Best Practices in AWS,” International Journal of Gender, Science and Technology, vol. 9, no. 2, 2020.
[Google Scholar] [Publisher Link] 
[17] Adrin Mukherjee, AWS All-in-one Security Guide: Design, Build, Monitor, and Manage a Fortified Application Ecosystem on AWS, BPB Publications, 2021.
[Google Scholar] [Publisher Link]
[18] Andrei Paleyes, Raoul-Gabriel Urma, and Neil D. Lawrence, “Challenges in Deploying Machine Learning: A Survey of Case Studies,” ACM Computing Surveys, vol. 55, no. 6, pp. 1-29, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Runyu Xu, “A Design Pattern for Deploying Machine Learning Models to Production,” 2020.
[Google Scholar] [Publisher Link]
[20] Muhammad Talha, Mishal Sohail, and Hajar Hajji, “Analysis of Research on Amazon AWS Cloud Computing Seller Data Security,” International Journal of Research in Engineering Innovation, vol. 4, no. 3, pp. 131-136, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Sivaranjith Galiveeti et al., “Cybersecurity Analysis: Investigating the Data Integrity and Privacy in AWS and Azure Cloud Platforms,” Artificial Intelligence and Blockchain for Future Cybersecurity Applications, pp. 329-360, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Richa Gautam, and Manish Jain, “Cloud Computing Security: AWS Data Security Credentials,” Studies in Indian Place Names, vol. 40, no. 3, pp. 6385-6389, 2020.
[Google Scholar] [Publisher Link]
[23] Iqra Naseer, “AWS Cloud Computing Solutions: Optimizing Implementation for Businesses,” Statistics, Computing and Interdisciplinary Research, vol. 5, no. 2, pp. 121-132, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Nisha Soms, S. Oswalt Manoj, and P. Santhosh Kumar, “A Case Study on Cloud Security Controls,” International Journal of Health Sciences, vol. 6, no. s1, pp. 11374-11380, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Smriti Bhatt et al., “Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future,” IEEE Access, vol. 9, pp. 107200-107223, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Sampath Talluri, and Sai Teja Makani, “Managing Identity and Access Management (IAM) in Amazon Web Services (AWS),” Journal of Artificial Intelligence & Cloud Computing, vol. 2, no. 1, pp. 1-5, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Rafael Belchior et al., “SSIBAC: Self-Sovereign Identity Based Access Control,” IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, pp. 1935-1943, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Carl Vander Maelen, “GDPR Codes of Conduct and the Impact on Global Business: A Case Study of Amazon Web Services,” SSRN, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Griffin Arthur Reid, “Improving HIPAA Compliance Efforts with Modern Cloud Technologies,” Doctoral Dissertation, Capitol Technology University, 2021.
[Google Scholar] [Publisher Link]
[30] Ashvin Kamaraju, Asad Ali, and Rohini Deepak, “Best Practices for Cloud Data Protection and Key Management,” Proceedings of the Future Technologies Conference (FTC) 2021, vol. 3, pp. 117-131, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Isak Jansson, “Continuous Compliance Automation in AWS Cloud Environment,” 2021.
[Google Scholar] [Publisher Link]
[32] Massimo Morello, “Privacy-by-Design Regulatory Compliance Automation in Cloud Environment,” Master of Science in Technology Thesis, 2023.
[Google Scholar] [Publisher Link]