Open Access

Architecting Secure and Cost-Optimized Iot-Cloud Ecosystems: Integrating AI-Driven Intrusion Detection, Multi-Path Routing, And Intelligent Workload Scheduling in Distributed Systems

4 Department of Computer Science, University of Edinburgh, United Kingdom

Abstract

The rapid convergence of Internet of Things (IoT) infrastructures with cloud-scale computing platforms has introduced unprecedented opportunities for automation, data intelligence, and distributed control, while simultaneously amplifying systemic vulnerabilities across network, computation, and application layers. This study develops a unified architectural framework that integrates IoT-based smart security systems, modified hashing techniques for secure device communication, AI-driven intrusion detection strategies, multi-path routing optimization algorithms, and intelligent workload placement mechanisms in hybrid cloud environments. Drawing upon foundational and contemporary works in IoT security, routing optimization, large-scale cluster management, and cloud scheduling systems-including Borg, Apollo, Fuxi, and intelligent hybrid cloud models-this research proposes a layered, security-aware, cost-optimized IoT-cloud ecosystem. The study synthesizes insights from door security IoT implementations (Tiwari & Waoo, 2024), cryptographic communication enhancements (Rao & Waoo, 2024), multi-path routing algorithms (Waoo & Sharma, 2014; Waoo, Sharma, & Jain, 2014), AI-driven network intrusion detection (Waoo, 2024), cloud cost analysis (Dubey & Tiwari, 2024), and intelligent workload placement in hybrid clouds (Hebbar & Maheshkar, 2025). Through detailed theoretical modeling and comparative systems analysis, the research demonstrates that security, performance, and cost efficiency must be co-optimized rather than treated as independent design goals. The findings reveal that integrating adaptive routing with AI-enhanced threat detection and cloud-aware workload orchestration significantly enhances resilience against distributed attacks, reduces latency in IoT communications, and optimizes resource allocation under fluctuating demand. The paper contributes a conceptual architecture that bridges edge devices, network routing, cloud cluster management, and hybrid cloud economics into a cohesive and scalable framework. The proposed approach addresses contemporary literature gaps by unifying security hardening, intelligent scheduling, and cost governance in distributed IoT-cloud systems.

Keywords

References

📄 Boutin, É., Ekanayake, J., Lin, W., Shi, B., Zhou, J., Qian, Z., Wu, M., & Zhou, L. (2014). Apollo: Scalable and coordinated scheduling for cloud-scale computing. Proceedings of OSDI, 285–300.
📄 Dubey, P., & Tiwari, A. K. (2024). AWS spot instances: A cloud computing cost investigation across AWS regions. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 1–10.
📄 Kishore Subramanya Hebbar, Jaykumar Ambadas Maheshkar, “Intelligent Ml-Based Workload Placement In Hybrid Clouds: Optimizing Cost And Sla In Modernized Systems”, AS, vol. 27, no. 1, pp. 84–101, Dec. 2025, doi: 10.22178/acta.27.1.8
📄 Hellerstein, J. L., Cirne, W., & Wilkes, J. (2010). Google cluster data. Google Research Blog.
📄 Naik, N. (2016). Building a virtual system of systems using Docker swarm in multiple clouds. Proceedings of IEEE International Symposium on Systems Engineering, 1–3.
📄 Rao, B. B., & Waoo, A. A. (2024). Improving security of IoT device communication using modified hashing solution.
📄 Tiwari, A., & Waoo, A. A. (2024). Door security system for home monitoring based on IoT.
📄 Verma, A., Pedrosa, L., Korupolu, M., Oppenheimer, D., Tune, E., & Wilkes, J. (2015). Large-scale cluster management at Google with Borg. Proceedings of the European Conference on Computer Systems.
📄 Waoo, A. A. (2024). Strategizing IoT network layer security through advanced intrusion detection systems and AI-driven threat analysis. Journal of Intelligent Systems and Internet of Things, 195–207.
📄 Waoo, A. A., & Sharma, S. (2014). Optimal route based advanced algorithm using hot link split multi-path routing algorithm. International Journal of Computer Network and Information Security.
📄 Waoo, A. A., Sharma, S., & Jain, M. (2014). Optimal route based advanced algorithm using hot link split multi-path routing algorithm. International Journal of Computer Network and Information Security, 6(8), 48–55.

Similar Articles

11-20 of 27

You may also start an advanced similarity search for this article.