Zero-Trust Security Models for AI-Powered Healthcare Systems in Multi-Cloud Architectures

Authors

  • Sander Matthijs Klinkenberg Senior Project Lead, Amsterdam, Netherlands Author

DOI:

https://doi.org/10.15662/IJARCST.2022.0506014

Keywords:

Zero Trust Architecture, AI Healthcare Systems, Multi-Cloud Security, Cloud Computing, Identity Management, Micro-Segmentation, Healthcare Cybersecurity, Adaptive Access Control

Abstract

The rapid integration of artificial intelligence (AI) into healthcare systems has transformed diagnostics, predictive analytics, personalized medicine, and operational management. These AI-powered healthcare applications increasingly operate in multi-cloud environments, leveraging distributed infrastructures offered by providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. While multi-cloud architectures enhance scalability, redundancy, and flexibility, they introduce complex security challenges, including identity sprawl, inconsistent policy enforcement, lateral movement risks, and expanded attack surfaces. Traditional perimeter-based security models are insufficient in such decentralized ecosystems.

 

Zero-Trust Security Models (ZTSMs) offer a robust alternative by enforcing continuous verification, least-privilege access, and micro-segmentation across distributed systems. This research proposes a comprehensive zero-trust framework tailored for AI-powered healthcare systems deployed in multi-cloud environments. The framework integrates AI-driven identity analytics, adaptive risk scoring, secure API gateways, encrypted data pipelines, policy orchestration, and continuous compliance monitoring. The study outlines architectural components, implementation methodology, performance evaluation metrics, and regulatory considerations. Findings indicate that zero-trust models significantly enhance data confidentiality, integrity, and availability while supporting AI scalability and interoperability. The proposed approach strengthens healthcare resilience against evolving cyber threats in complex cloud ecosystems.

References

1. Keezhadath, A. A., Amarapalli, L., & Sethuraman, S. (2022). Scalable data lake architectures for multi-industry enterprise analytics. Essex Journal of AI Ethics and Responsible Innovation, 2, 136–175.

2. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant use of cloud by a novel framework of encrypted biometric authentication and multi level data protection. Indian Journal of Science and Technology, 9, 44.

3. Singh, A. (2020). Impact of network topology changes on performance. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 3(4), 3687–3692.

4. Pujari, S. D., & Anusha, K. (2020). A review on prediction of autism using machine learning algorithm. International Journal of Advanced Science and Technology, 29(6), 4669–4678.

5. Navandar, P. (2022). Enhancing cybersecurity in the digital age: Challenges and strategies. Journal of Artificial Intelligence & Cloud Computing.

6. Rajakumari, S. B., Nalini, C., & Nalini, C. (2014). An efficient cost model for data storage with horizontal layout in the cloud. Indian Journal of Science and Technology, 7(3), 45–46.

7. Adari, V. K. (2020). Intelligent care at scale: AI-powered operations transforming hospital efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240–1249.

8. Ramidi, M. (2022). Developing resilient offline-first architectures for mobile health and clinical research applications. International Journal of Computer Technology and Electronics Communication (IJCTEC), 5(1), 4518–4529.

9. Jaikrishna, G., & Rajendran, S. (2020). Cost-effective privacy preserving of intermediate data using group search optimisation algorithm. International Journal of Business Information Systems, 35(2), 132–151.

10. Vimal Raja, G. (2022). Leveraging machine learning for real-time short-term snowfall forecasting using multisource atmospheric and terrain data integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336–1339.

11. Surisetty, L. S. (2021). Zero-trust data fabrics: A policy-driven model for secure cross-cloud healthcare and financial data exchanges. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 4(2), 4548–4556.

12. Mohana, P., Muthuvinayagam, M., Umasankar, P., & Muthumanickam, T. (2022). Automation using artificial intelligence based natural language processing. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 1735–1739). IEEE.

13. Gangina, P. (2022). Resilience engineering principles for distributed cloud-native applications under chaos. International Journal of Computer Technology and Electronics Communication, 5(5), 5760–5770.

14. Panda, M. R., & Kondisetty, K. (2022). Predictive fraud detection in digital payments using ensemble learning. American Journal of Data Science and Artificial Intelligence Innovations, 2, 673–707.

15. Genne, S. (2022). Designing accessibility-first enterprise web platforms at scale. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7679–7690.

16. Ananth, S., Radha, D. K., Prema, D. S., & Nirajan, K. (2019). Fake news detection using convolution neural network in deep learning. International Journal of Innovative Research in Computer and Communication Engineering, 7(1), 49–63.

17. Chennamsetty, C. S. (2022). Hardware-software co-design for sparse and long-context AI models: Architectural strategies and platforms. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 5(5), 7121–7133.

18. Sriramoju, S. (2022). Automated migration frameworks for legacy systems: A security-driven approach. International Journal of Computer Technology and Electronics Communication (IJCTEC), 5(3), 5146–5157.

19. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian Journal of Science and Technology, 8(35), 1–5.

20. Rahman, M., Arif, M. H., Alim, M. A., Rahman, M. R., & Hossen, M. S. (2021). Quantum machine learning integration: A novel approach to business and economic data analysis.

21. Nalini, T., Rama, A., Shanmuganathan, M., Sam, D., & Sheeba, D. A. (2022). Effective prediction of crop price using neuro evolutionary algorithm based on machine learning approach. Journal of Physics: Conference Series, 2251(1).

22. Mudunuri, P. R. (2022). Automating compliance in biomedical DevOps: A policy-as-code approach. International Journal of Research and Applied Innovations (IJRAI), 5(2), 6770–6783.

23. Kesavan, E. (2022). Driven learning and collaborative automation innovation via Trailhead and Tosca user groups. International Scientific Journal of Engineering and Management, 1(1).

24. Vimal Raja, G. (2021). Mining customer sentiments from financial feedback and reviews using data mining algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 9(12), 14705–14710.

25. Ananth, S., & Saranya, A. (2016). Reliability enhancement for cloud services: A survey. In 2016 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1–7). IEEE.

26. Chivukula, V. (2021). Impact of bias in incrementality measurement created on account of competing ads in auction-based digital ad delivery platforms. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 4(1), 4345–4350.

27. Anand, L., & Neelanarayanan, V. (2019). Feature selection for liver disease using particle swarm optimization algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434–6439.

28. Pujari, S. D., & Anusha, K. (2022). Effective prediction of autism using ensemble method. In Artificial Intelligence for Innovative Healthcare Informatics (pp. 103–115). Springer.

29. Kamadi, S. (2022). Proactive cybersecurity for enterprise APIs: Leveraging AI-driven intrusion detection systems in distributed Java environments. International Journal of Research in Computer Applications and Information Technology (IJRCAIT), 5(1), 34–52.

30. Sreesaila, B., Abinaya, K., Swarnalatha, M., & Sugumar, R. (2018). Aadhaar card based health records monitoring system. International Journal of Innovative Research in Science, Engineering and Technology, 7(2).

31. Rajurkar, P. (2021). Deep learning models for predicting effluent quality under variable industrial load conditions. International Journal of Research and Applied Innovations, 4(5), 5826–5832.

32. Anumula, S. R. (2022). Governance frameworks for automated enterprise decision systems. International Journal of Humanities and Information Technology (IJHIT), 4(1–3), 137–157.

33. Ponugoti, M. (2022). Integrating API-first architecture with experience-centric design for seamless insurance platform modernization. International Journal of Humanities and Information Technology (IJHIT), 4(1–3), 117–136.

34. Gaddapuri, N. S. (2022). Application of quantum computing in digital education systems. Power System Protection and Control, 50(2), 12–24.

Downloads

Published

2022-12-14

How to Cite

Zero-Trust Security Models for AI-Powered Healthcare Systems in Multi-Cloud Architectures. (2022). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 5(6), 7307-7314. https://doi.org/10.15662/IJARCST.2022.0506014