Cloud computing security assurance modelling through risk analysis using machine learning

被引:0
作者
Sharma, Abhishek [1 ]
Singh, Umesh Kumar [2 ]
机构
[1] Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India
[2] Vikram Univ, Ujjain, India
关键词
Cloud computing (CC); Cloud attacks; Cloud security; Machine learning; Intrusion detection system (IDS); Cyber attacks; Cloud security assurance; INTRUSION DETECTION; DDOS ATTACKS; QUALITY; ISSUES; SYSTEM;
D O I
10.1007/s13198-025-02705-8
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The concept of Cloud Computing has exploded in popularity, and the reason for this is the cost-effective transmission, storage, and powerful computation it offers. The objective is to provide end-users with remote storage and data analysis capabilities using shared computing resources, lowering an individual's total cost. Consumers, on the other hand, are still hesitant to use this technology due to security and privacy concerns. In this work a thorough overview of the various Cloud attacks and security challenges is presented and security assurance modelling is done through risk analysis using machine learning. In order to analyze the security risk in terms of threats and attacks for cloud computing environments, the most recent dataset (ISOT Cloud Intrusion Dataset) is used for intrusion detection under cloud computing environments. The methodology involves the implementation of multiple supervised machine learning algorithms like support vector machine (SVM), random forest (RF), logistic regression (LR), Na & iuml;ve Bayes (NB), Artificial Neural Network (ANN), K-nearest Neighbor (kNN) to identify & classify intrusions for cloud environment. As a result, accuracy of the proposed SVM model is evaluated as 99.2%. The performance metrics of various machine learning implementation models are also compared & investigated using parameters like accuracy, AUC, F1, precision, and recall. The results are represented as confusion matrices. The outcome of this work will further help the network security administrator to mitigate the real time attacks under cloud computing environments.
引用
收藏
页码:1287 / 1300
页数:14
相关论文
共 76 条
[51]   Special Section on Reliability and Risk Assessment of Complex Systems [J].
Misra, Krishna B. ;
Verma, Ajit Kumar .
IEEE TRANSACTIONS ON RELIABILITY, 2011, 60 (01) :59-60
[52]  
Nister D, 2006, 2006 IEEE COMP SOC C, V2, P2161
[53]   An intrusion detection and prevention system in cloud computing: A systematic review [J].
Patel, Ahmed ;
Taghavi, Mona ;
Bakhtiyari, Kaveh ;
Celestino Junior, Joaquim .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :25-41
[54]   RETRACTED: Risk-Based Access Control Mechanism for Internet of Vehicles Using Artificial Intelligence (Retracted Article) [J].
Priscila, S. Silvia ;
Sharma, Abhishek ;
Vanithamani, S. ;
Ahmad, Faiyaz ;
Mahaveerakannan, R. ;
Alrubaie, Ali Jawad ;
Jagota, Vishal ;
Singh, Bhupesh Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[55]  
Ramalakshmi K, 2022, 2022 INT C AUGM INT, P871, DOI [10.1109/ICAISS55157.2022.10010739, DOI 10.1109/ICAISS55157.2022.10010739]
[56]  
Rani M., 2019, SSRN Electron J, DOI [10.2139/ssrn.3355127, DOI 10.2139/SSRN.3355127]
[57]  
Riquet D., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P558, DOI 10.1109/IMIS.2012.76
[58]  
Salmen F, 2015, P 11 ADV INT C TEL, P113
[59]  
Scarfone K., 2007, NIST Spec. Publ, V800, P94, DOI DOI 10.6028/NIST.SP.800-94
[60]  
Sharma A., 2021, 3 INT C INTEGRATED, P445, DOI [10.2991/ahis.k.210913.055, DOI 10.2991/AHIS.K.210913.055]