Cloud computing security assurance modelling through risk analysis using machine learning

被引:0
作者
Sharma, Abhishek [1 ]
Singh, Umesh Kumar [2 ]
机构
[1] Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India
[2] Vikram Univ, Ujjain, India
关键词
Cloud computing (CC); Cloud attacks; Cloud security; Machine learning; Intrusion detection system (IDS); Cyber attacks; Cloud security assurance; INTRUSION DETECTION; DDOS ATTACKS; QUALITY; ISSUES; SYSTEM;
D O I
10.1007/s13198-025-02705-8
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The concept of Cloud Computing has exploded in popularity, and the reason for this is the cost-effective transmission, storage, and powerful computation it offers. The objective is to provide end-users with remote storage and data analysis capabilities using shared computing resources, lowering an individual's total cost. Consumers, on the other hand, are still hesitant to use this technology due to security and privacy concerns. In this work a thorough overview of the various Cloud attacks and security challenges is presented and security assurance modelling is done through risk analysis using machine learning. In order to analyze the security risk in terms of threats and attacks for cloud computing environments, the most recent dataset (ISOT Cloud Intrusion Dataset) is used for intrusion detection under cloud computing environments. The methodology involves the implementation of multiple supervised machine learning algorithms like support vector machine (SVM), random forest (RF), logistic regression (LR), Na & iuml;ve Bayes (NB), Artificial Neural Network (ANN), K-nearest Neighbor (kNN) to identify & classify intrusions for cloud environment. As a result, accuracy of the proposed SVM model is evaluated as 99.2%. The performance metrics of various machine learning implementation models are also compared & investigated using parameters like accuracy, AUC, F1, precision, and recall. The results are represented as confusion matrices. The outcome of this work will further help the network security administrator to mitigate the real time attacks under cloud computing environments.
引用
收藏
页码:1287 / 1300
页数:14
相关论文
共 76 条
[1]  
Abdulaziz Aldribi IT., 2020, Computers & Security, P88
[2]  
Abrar Iram, 2020, 2020 International Conference on Smart Electronics and Communication (ICOSEC), P919, DOI 10.1109/ICOSEC49089.2020.9215232
[3]  
Aldribi A, 2018, STUD BIG DATA, V39, P333, DOI 10.1007/978-3-319-73676-1_13
[4]   Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning [J].
Alzubi, Jafar A. ;
Alzubi, Omar A. ;
Singh, Ashish ;
Ramachandran, Manikandan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :1080-1087
[5]   Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Alazab, Moutaz ;
Alrabea, Adnan ;
Awajan, Albara ;
Qiqieh, Issa .
ELECTRONICS, 2022, 11 (19)
[6]   Fusion of deep learning based cyberattack detection and classification model for intelligent systems [J].
Alzubi, Omar A. ;
Qiqieh, Issa ;
Alzubi, Jafar A. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02) :1363-1374
[7]  
[Anonymous], 2010, IT Prof IEEE Comput Societ
[8]  
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[9]  
Bamhdi A. M., 2021, Telkomnika Telecommun. Comput. Electron. Control, V19, P664, DOI DOI 10.12928/TELKOMNIKA.V19I2.18325
[10]  
Basu S, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P347, DOI 10.1109/CCWC.2018.8301700