Computer Vision Conference (CVC) 2026
21-22 May 2026
Publication Links
IJACSA
Special Issues
Computer Vision Conference (CVC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 17 Issue 2, 2026.
Abstract: Distributed Quantum-assisted Cloud Continuum architectures have brought revolutionary changes to the current computing environment through increased data proximity, reduced latency, and real-time responsiveness. These systems are architectures that integrate cloud, fog, and edge computing layers. However, this architectural development comes with many complicated security concerns such as heterogeneous devices, dynamic workloads, splintered attack surfaces, and different policy application across the spectrum. Such dynamic infrastructures need a new security paradigm that is resilient, scalable and responsive to guard against the aged and centralised safety measures. The Adaptive Threat-Aware Security Orchestration (ATASO) framework is a smart, context-aware, and scalable network security solution that is presented in this study as the way to overcome these challenges. Intelligent security monitoring layer (ISML) works in real-time and the Context-Aware Threat Analysis Engine (CTAE) detects distributed anomalies using federated deep learning. Adaptive Policy Enforcement Module (APEM) is a system based on context-aware and blockchain smart contracts to enforce mitigation policies. ATASO is made up of these three units. This multi-layer system is impregnable as far as enforcing policy enforcement is concerned and has a low latency overhead and the ability to monitor threats end to end, as dictated by its multi-layer design. The ATASO model is uniquely applicable where security responsiveness and low-latency response is of utmost importance, including health care monitoring networks, autonomous vehicle networks, smart city networks, and industrial IoT networks. By conducting extensive simulation studies, the approach has been discovered to outperform the existing approaches in a number of important dimensions including the detection accuracy (more than 96%), the response latency (up to 40% less), and the resource consumption where large computers are involved. These findings confirm that ATASO has the potential of being a sophisticated adaptive security system that will protect future cloud continuity designs against the developing cyber threats.
P. Suseendhar and K. P. Sridhar. “Adaptive Network Security Framework for Distributed Quantum-Assisted Cloud Continuum Architectures”. International Journal of Advanced Computer Science and Applications (IJACSA) 17.2 (2026). http://dx.doi.org/10.14569/IJACSA.2026.0170263
@article{Suseendhar2026,
title = {Adaptive Network Security Framework for Distributed Quantum-Assisted Cloud Continuum Architectures},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2026.0170263},
url = {http://dx.doi.org/10.14569/IJACSA.2026.0170263},
year = {2026},
publisher = {The Science and Information Organization},
volume = {17},
number = {2},
author = {P. Suseendhar and K. P. Sridhar}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.