IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

AI THREAT DETECTION FOR CLOUD FILE SHARING: A REAL-TIME SECURITY FRAMEWORK

AUTHORS:
Rituraj
Mentor
Abdul Khalid
Affiliation
B.Tech (Information Technology) Department of Information Technology
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Cloud file sharing has become a normal part of how people work today. But this convenience brings serious security problems. Traditional antivirus and firewall systems were not built for modern cloud environments where files move quickly between many users and devices. After working with three mid- sized companies for over eight months, we observed that most security teams struggle to detect malicious files shared through Google Drive, SharePoint, and similar platforms. This paper presents a practical AI-based solution that we built and tested in real cloud environments. Our system uses a combination of three machine learning methods — Random Forest, Gradient Boosting, and a small neural network — working together to scan files quickly without slowing down users. We achieved 94.7% accuracy on real-world data, with each file taking less than 100 milliseconds to analyze. The system also explains why it flagged something as suspicious, which helps security people trust the alerts and respond faster. Based on our pilot deployments, organizations saw about 65% fewer successful malware infections through cloud sharing channels

Keywords
Article Metrics
Article Views
40
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Rituraj, (2026). AI Threat Detection for Cloud File Sharing: A Real-Time Security Framework. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.211

Rituraj, . "AI Threat Detection for Cloud File Sharing: A Real-Time Security Framework." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.211.

Rituraj, . "AI Threat Detection for Cloud File Sharing: A Real-Time Security Framework." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.211.

References
1.Kumar, S. Patel, and A. Sharma, ”Random forest-based malware classification using portable executable headers,” Journal of Computer Security, vol. 30, no. 4, pp. 521-540, 2022.

2.Singh and P. Patel, ”Gradient boosting for PDF malware detection: A comparative study,” in Proceedings of the International Conference on Cyber Security (ICCS), 2023, pp. 145-158.

3.Chen, L. Wang, and H. Zhang, ”Visual malware classification using CNN on binary images,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 891-906, 2024.

4.Wang and S. Lee, ”RNN-based malware detection using API call sequences,” Computers & Security, vol. 125, Article 103045, 2023.

5.Li and Y. Zhang, ”User behavior analytics for cloud storage insider threat detection,” ACM Transactions on Privacy and Security, vol. 26, no. 3, Article 22, 2023.

6.Lundberg and S. Lee, ”A unified approach to interpreting model predictions,” in Advances in Neural Information Processing Systems (NeurIPS), 2017, pp. 4765-4774.

7.AV-TEST Institute, ”Malware statistics report 2024,” Technical Report,Cloud Security Alliance, ”Cloud file sharing security best practices,” CSA Research Publication, 2023
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Circular Slot-Loaded Square Ring Microstrip Patch Antenna for IOT and ISM Band Application
string(14) "Anirudh Sharma" Sharma, A.et al.
(2026)
DOI: 10.55041/ijsmt.v2i5.010
A Comparative Study on Water Quality Dynamics in Saharanpur District with Reference to Monsoon Fluctuations
string(11) "Priya Patel" Patel, P.
(2026)
DOI: 10.55041/ijsmt.v2i3.129
The Multiplier Effect of Public Infrastructure Spending: An Econometric Analysis of Union Budget Allocations on GDP Growth (FY22–FY26)
string(20) "Saurabh Kumar Gautam" Gautam, S. K.
(2026)
DOI: 10.55041/ijsmt.v2i3.042
Scroll to Top