Context-Aware Threat Detection in Cloud-Native Healthcare Applications Using Federated Transfer Learning and Runtime Telemetry
Keywords:
Cloud-native healthcare, threat detection, federated learning, transfer learning, runtime telemetry, data privacy, anomaly detectionAbstract
The rapid digitization of healthcare services, supported by cloud-native architectures, has introduced significant challenges concerning security and patient data privacy. Traditional threat detection techniques often fall short in dynamic and distributed cloud environments due to their centralized data processing models. This research proposes a context-aware threat detection framework leveraging Federated Transfer Learning (FTL) and runtime telemetry to identify security anomalies in real-time without compromising patient data locality or compliance.
The proposed system is evaluated using real-world telemetry logs and synthetic attack vectors in a simulated healthcare cloud environment. The results demonstrate a 23% improvement in detection precision over baseline models while maintaining data privacy. Additionally, runtime telemetry adds contextual relevance to model predictions, improving overall system resilience. This approach offers a scalable and privacy-preserving threat detection method suitable for regulatory-compliant healthcare systems.
References
[1] McMahan, Brendan, et al. "Communication-Efficient Learning of Deep Networks from Decentralized Data." Journal of Machine Learning Research, vol. 18, no. 1, 2017.
[2] Li, Tian, et al. "Federated Learning for Healthcare: Opportunities and Challenges." IEEE Intelligent Systems, vol. 34, no. 5, 2019.
[3] Gundaboina, A. (2024). Application Protection Platforms (CNAPP) for Healthcare: Safeguarding Patient Data in Cloud Infrastructure. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 12(5), 1–12. https://doi.org/10.37082/IJIRMPS.v12.i5.232622
[4] Sharma, Rakesh, and Anita Gupta. "Transfer Learning-Based Anomaly Detection in Cloud Environments." International Journal of Cloud Computing, vol. 9, no. 2, 2020.
[5] Gundaboina, A. (2024). Automated Patch Management for Endpoints: Ensuring Compliance in Healthcare and Education Sectors. International Journal of Computer Science and Information Technology Research (IJCSITR), 5(2), 114–134. https://doi.org/10.63530/IJCSITR_2024_05_02_010
[6] Zhou, Xinyi, and Xiaoming Jin. "Runtime-Aware Intrusion Detection in Container Environments." ACM Transactions on Cyber-Physical Systems, vol. 5, no. 3, 2021.
[7] Tan, Ming, and Hong Wei. "Contextual Threat Detection Using Dynamic Feature Learning." Computer Security Journal, vol. 38, no. 4, 2022.
[8] Liu, Yu, et al. "Federated Intelligence for Smart Healthcare IoT Devices." Journal of Medical Systems, vol. 47, no. 1, 2023.
[9] Gundaboina, A. (2024). HITRUST Certification Best Practices: Streamlining Compliance for Healthcare Cloud Solutions. International Journal of Computer Science and Information Technology Research, 5(1), 76–94. https://ijcsitr.org/index.php/home/article/view/IJCSITR_2024_05_01_008
[10] Zhang, Lei, and Chen Wu. "Adaptive Federated Systems in Multi-Tenant Cloud Infrastructure." IEEE Transactions on Cloud Computing, vol. 11, no. 2, 2023.
[11] Ahmad, Nadeem, and Ravi Kumar. "Telemetry-Driven Security in Cloud-Native Environments." International Journal of Network Security, vol. 24, no. 6, 2023.
[12] Wang, Jiawei, et al. "Secure Transfer Learning for Cross-Domain Healthcare Models." Journal of Healthcare Informatics Research, vol. 6, no. 2, 2022.
[13] Gundaboina A. DevSecOps in Healthcare: Building Secure and Compliant Patient Engagement Applications. J Artif Intell Mach Learn & Data Sci 2024 2(4), 3052-3059. DOI: doi.org/10.51219/JAIMLD/anjan-gundaboina/629
[14] Gupta, Sunil, and Tanya Roy. "Container Security Threats and Defenses." Journal of Cybersecurity and Privacy, vol. 4, no. 3, 2022.
[15] Kim, Hyunwoo, and Daesik Yoo. "Hybrid Deep Learning Approaches for Cybersecurity in Cloud." International Journal of Information Security, vol. 21, no. 1, 2023.
[16] Patel, Rohan, and Akshay Jain. "Kubernetes Security Threat Modelling." Cloud Computing Review, vol. 8, no. 1, 2023.
[17] Hussein, Amal, and Omar Farouk. "Runtime Observability in Distributed Systems." Journal of Software Systems, vol. 13, no. 4, 2023.
[18] Gundaboina, A. (2022). Quantum Computing and Cloud Security: Future-Proofing Healthcare Data Protection. International Journal for Multidisciplinary Research, 4(4), 1–12. https://doi.org/10.36948/ijfmr.2022.v04i04.61014
[19] Choi, Sang Woo, and Young Lee. "Federated Learning under Compliance Constraints." AI in Healthcare Systems, vol. 5, no. 2, 2022.
[20] Fernandes, Ivan, et al. "Dynamic Trust Models in Federated Cloud Healthcare." ACM HealthTech, vol. 9, no. 1, 2023.