Generative adversarial networks-based security and applications in cloud computing: a survey

被引:0
作者
Wang, Shiyu [1 ]
Yin, Ming [1 ]
Liu, Yiwen [2 ]
He, Guofeng [1 ]
机构
[1] China Telecom Res Inst, Shanghai 200120, Peoples R China
[2] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
关键词
Generative adversarial networks; Data augmentation; Cloud computing; Security; Application; INTELLIGENT; SYSTEM;
D O I
10.1007/s11235-024-01166-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing mode that can meet the needs of on-demand distribution and the rapid deployment of computing resources. It can provide strong scalability and applicability through virtualisation technology and elastic technology, and it can adapt to the needs of users in different environments and resources. Through the use of hardware such as cloud sensors, the data collected by various types of sensors can be directly uploaded to the cloud for processing and analysis, so that applications such as management, medical treatment and human-machine cooperation can be provided. However, applications in the cloud have upended traditional security boundaries and will face some unique security challenges. Due to the advantages of generating real data, generative adversarial networks (GANs) have attracted extensive attention in the field of cloud computing, such as data augmentation and encryption. Therefore, this paper reviews GAN-based security and applications in cloud computing. We compare the role of GANs in security and applications in the cloud from multiple dimensions. In addition, we analyse the research trends and future work prospects from the perspective of the algorithm itself, algorithm performance evaluation and cloud computing hardware.
引用
收藏
页码:305 / 331
页数:27
相关论文
共 120 条
[1]   COVID-CAPS: A capsule network-based framework for identification of COVID-19 cases from X-ray images [J].
Afshar, Parnian ;
Heidarian, Shahin ;
Naderkhani, Farnoosh ;
Oikonomou, Anastasia ;
Plataniotis, Konstantinos N. ;
Mohammadi, Arash .
PATTERN RECOGNITION LETTERS, 2020, 138 :638-643
[2]   Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey [J].
Ahmad, Waqas ;
Rasool, Aamir ;
Javed, Abdul Rehman ;
Baker, Thar ;
Jalil, Zunera .
ELECTRONICS, 2022, 11 (01)
[3]  
Arjovsky M., 2017, arXiv, DOI DOI 10.48550/ARXIV.1701.07875
[4]   A Review on Application of GANs in Cybersecurity Domain [J].
Arora, Aayush ;
Shantanu .
IETE TECHNICAL REVIEW, 2022, 39 (02) :433-441
[5]   CVAE-GAN: Fine-Grained Image Generation through Asymmetric Training [J].
Bao, Jianmin ;
Chen, Dong ;
Wen, Fang ;
Li, Houqiang ;
Hua, Gang .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :2764-2773
[6]   Privacy-Preserving Generative Deep Neural Networks Support Clinical Data Sharing [J].
Beaulieu-Jones, Brett K. ;
Wu, Zhiwei Steven ;
Williams, Chris ;
Lee, Ran ;
Bhavnani, Sanjeev P. ;
Byrd, James Brian ;
Greene, Casey S. .
CIRCULATION-CARDIOVASCULAR QUALITY AND OUTCOMES, 2019, 12 (07)
[7]  
Bekkar M., 2013, J Info Eng and Appl, V3, P27
[8]   Password Guessability as a Service (PGaaS) [J].
Bojato, Juan ;
Donado, Daniel ;
Jimeno, Miguel ;
Moreno, Giovanni ;
Villanueva-Polanco, Ricardo .
APPLIED SCIENCES-BASEL, 2022, 12 (03)
[9]   Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks [J].
Budati, Anil Kumar ;
Vulapula, Sridhar Reddy ;
Shah, Syed Bilal Hussian ;
Al-Tirawi, Anas ;
Carie, Anil .
ELECTRONICS, 2023, 12 (07)
[10]   Less Provisioning: A Fine-grained Resource Scaling Engine for Long-running Services with Tail Latency Guarantees [J].
Cai, Binlei ;
Zhang, Rongqi ;
Zhao, Laiping ;
Li, Keqiu .
PROCEEDINGS OF THE 47TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, 2018,