CFP last date
20 October 2025
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025

Submit your paper
Know more
Random Articles
Reseach Article

Privacy-Preserving AI Models for Cyber Threat Detection in Snowflake-based Cloud Environments

by Guru Prasad Selvarajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 45
Year of Publication: 2025
Authors: Guru Prasad Selvarajan
10.5120/ijca2025925663

Guru Prasad Selvarajan . Privacy-Preserving AI Models for Cyber Threat Detection in Snowflake-based Cloud Environments. International Journal of Computer Applications. 187, 45 ( Sep 2025), 46-52. DOI=10.5120/ijca2025925663

@article{ 10.5120/ijca2025925663,
author = { Guru Prasad Selvarajan },
title = { Privacy-Preserving AI Models for Cyber Threat Detection in Snowflake-based Cloud Environments },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2025 },
volume = { 187 },
number = { 45 },
month = { Sep },
year = { 2025 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number45/privacy-preserving-ai-models-for-cyber-threat-detection-in-snowflake-based-cloud-environments/ },
doi = { 10.5120/ijca2025925663 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-09-30T15:40:33.546270+05:30
%A Guru Prasad Selvarajan
%T Privacy-Preserving AI Models for Cyber Threat Detection in Snowflake-based Cloud Environments
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 45
%P 46-52
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rising cloud-native architecture and adoption of a cloud service provider like Snowflake is significantly increasing the enterprise attack surface in the context of cybersecurity. Snowflake’s cloud data platform provides great scalability and efficiency, but also vulnerabilities to be exploited by malicious actors. While traditional threat detection models have compromised user privacy, in that on-device logs have to be shared with a centralized server, privacy-preserving AI-driven solutions are indeed a necessity. In this paper, we proposed a novel framework that integrates federated learning (FL) and differential privacy (DP) to improve the cyber threat detection in Snowflake environments while keeping the data confidential. This model utilizes secure multiparty computation (SMPC) and homomorphic encryption (HE) for secure data access to minimize the risks of unauthorized access. To this end, we design an AI-based detection framework that ingests cloud telemetry data generated in real time and utilizes privacy-preserving deep learning algorithms to expose advanced cybersecurity attacks. This approach pros is founded on regulatory frameworks (GDPR or CCPA) by balancing accuracy and privacy. We perform exhaustive experiments to assess model effectiveness in terms of detection accuracy, computational efficiency, and privacy preservation trade-offs. Our results show that our approach can better identify zero-day vulnerabilities compared to common ones, all while still preserving strong privacy guarantees. This work has implications for the further development of privacy-aware AI solutions in cybersecurity, leading towards the establishment of secure and resilient cloud computing ecosystems.

References
  1. S. Jabbar, M. T. Pourzolfaghar, and M. H. Eslami, "An intrusion detection system using hybrid machine learning algorithms," Computers & Security, vol. 91, pp. 101-115, 2020.
  2. R. Sharma, A. R. S. P. Raj, and G. K. Chinthak, "Deep learning-based anomaly detection for zero-day attacks," Journal of Computer Science and Technology, vol. 36, no. 5, pp. 1245-1261, 2021.
  3. H. B. McMahan, E. Moore, D. Ramage, and B. A. W. J. Yang, "Communication-efficient learning of deep networks from decentralized data," Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 2017.
  4. X. Zhang, W. Lin, and C. Huang, "Federated learning for cybersecurity: A cloud-based approach," IEEE Transactions on Cloud Computing, vol. 9, no. 6, pp. 1751-1762, 2020.
  5. C. Dwork, "Differential privacy," Proceedings of the 33rd International Conference on Automata, Languages and Programming, 2006.
  6. M. Abadi, A. Chu, I. Goodfellow, and H. Breuel, "Deep learning with differential privacy," Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.
  7. Y. Xia, J. Zhang, and K. A. Kwiat, "Integrating differential privacy into cyber threat detection systems," Journal of Cybersecurity, vol. 8, no. 3, pp. 229-246, 2020.
  8. F. Sattler, M. M. Mueller, and S. E. Kiener, "Secure federated learning using SMPC for private model training," Proceedings of the 2020 International Conference on Privacy and Security, 2020.
  9. C. Gentry, "Fully homomorphic encryption using ideal lattices," Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2009.
  10. L. Xie, T. Wang, and S. Zhang, "Optimizing homomorphic encryption for privacy-preserving anomaly detection," IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1045-1061, 2020.
  11. L. Xie, L. Li, and T. Zhang, "Homomorphic encryption for privacy-preserving machine learning in cloud security," International Journal of Cloud Computing and Services Science, vol. 7, no. 1, pp. 52-65, 2020.
  12. Y. Wang, Z. Liu, and C. R. Lee, "Federated learning for cloud security in AWS and Azure," Proceedings of the IEEE Cloud Computing Conference, 2020.
  13. F. Li, J. Zheng, and M. Luo, "Differential privacy and federated learning for cloud-based cyber threat detection," Journal of Cloud Computing, vol. 5, no. 2, pp. 87-100, 2021.
  14. F. Tung, M. Chen, and R. Shankar, "Security mechanisms in Snowflake cloud data platform," Proceedings of the IEEE Cloud Security Workshop, 2021.
  15. T. Elakkiya, S. S. Karunanithi, and R. Singh, "A study on federated learning for cloud security," International Journal of Information Security, vol. 10, pp. 31-47, 2021.
  16. A.Agarwal and S. Kalra, "Hybrid deep learning models for detection of cloud-based cyber threats," Journal of Cloud Security, vol. 7, no. 3, pp. 45-61, 2021.
  17. K. Shankar and S. R. S. Swaminathan, "AI-based anomaly detection in cloud networks," IEEE Transactions on Networking, vol. 28, no. 4, pp. 147-158, 2021.
  18. R. K. Singh, "Cloud security through federated learning and AI-based detection systems," Proceedings of the 2021 Cloud Computing Symposium, pp. 22-35, 2021.
  19. M. Patel and J. R. Sundararajan, "Homomorphic encryption for secured model training in federated learning," Proceedings of the 10th International Conference on Cloud Computing, 2020.
  20. D. S. Adhikari, "Evaluation of security features in Snowflake and federated learning in cloud environments," Journal of Cloud Computing Technologies, vol. 9, no. 1, pp. 1-15, 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy-preserving AI Cyber threat detection Snowflake security Federated learning Differential privacy