Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management

被引:1
作者
Ahmad, Shahnawaz [1 ]
Arif, Mohd [2 ]
Mehfuz, Shabana [3 ]
Ahmad, Javed [4 ]
Nazim, Mohd [5 ]
机构
[1] Bennett Univ, Sch Comp Sci Engn & Technol, Greater Noida 201310, India
[2] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida 203201, India
[3] Jamia Millia Islamia, Dept Elect Engn, New Delhi 110025, India
[4] Sharda Univ, Sharda Sch Engn & Technol, Dept Comp Sci & Engn, Greater Noida 201310, India
[5] Noida Inst Engn & Technol, Sch Comp Sci & IT, Dept Comp Sci & Engn, Greater Noida 201306, India
关键词
Security; Optimization; Accuracy; Computational modeling; Privacy; Adaptation models; Training; Resilience; Electronic mail; Computer science; Cloud computing; attack detection; key management; pair key selection; deep learning; hybrid optimization;
D O I
10.1109/TC.2025.3547150
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating advanced security frameworks. Traditional models suffer from high false positives and limited adaptability. To address these challenges, VECGLSTM, an attack detection model integrating Variable Long Short-Term Memory (VLSTM), capsule networks, and the Enhanced Gannet Optimization Algorithm (EGOA), is introduced. This hybrid approach enhances accuracy, reduces false positives, and dynamically adapts to evolving threats. EGOA is employed for its superior optimization capability, ensuring faster convergence and resilience. Additionally, Chaotic Cryptographic Pelican Tunicate Swarm Optimization (CCPTSO) is proposed for privacy-preserving key management. This model combines chaotic cryptographic techniques with the Pelican Tunicate Swarm Optimization Algorithm (PTSOA), leveraging the pelican algorithm's exploration strength and the tunicate swarm's exploitation ability for optimal encryption security. Performance evaluation demonstrates 99.675% accuracy, 99.5175% recall, 99.7075% precision, and 99.615% F1-score, along with reduced training (1.79s), encryption (0.986s), and decryption (1.029s) times. This research significantly enhances CC security by providing a scalable, adaptive framework that effectively counters evolving cyber threats while ensuring efficient key management.
引用
收藏
页码:1978 / 1989
页数:12
相关论文
共 42 条
[1]   An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage [J].
Ahmad, Shahnawaz ;
Mehfuz, Shabana ;
Beg, Javed .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
[2]   PANACEA: a neural model ensemble for cyber-threat detection [J].
AL-Essa, Malik ;
Andresini, Giuseppina ;
Appice, Annalisa ;
Malerba, Donato .
MACHINE LEARNING, 2024, 113 (08) :5379-5422
[3]   A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation [J].
Al-Janabi, Samaher ;
Alkaim, Ayad F. .
SOFT COMPUTING, 2020, 24 (01) :555-569
[4]   Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (13)
[5]   A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset [J].
Alzughaibi, Saud ;
El Khediri, Salim .
APPLIED SCIENCES-BASEL, 2023, 13 (04)
[6]   ROULETTE: A neural attention multi-output model for explainable Network Intrusion Detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
Caforio, Francesco Paolo ;
Malerba, Donato ;
Vessio, Gennaro .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 201
[7]   An Adaptive Tunicate Swarm Algorithm for Optimization of Shallow Foundation [J].
Arabali, Amirbahador ;
Khajehzadeh, Mohammad ;
Keawsawasvong, Suraparb ;
Mohammed, Adil Hussein ;
Khan, Baseem .
IEEE ACCESS, 2022, 10 :39204-39219
[8]   Cloud-based deep learning architecture for DDoS cyber attack prediction [J].
Arango-Lopez, Jeferson ;
Isaza, Gustavo ;
Ramirez, Fabian ;
Duque, Nestor ;
Montes, Jose .
EXPERT SYSTEMS, 2025, 42 (01)
[9]   GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment [J].
Arunkumar M. ;
Kumar K.A. .
International Journal of Information Technology, 2023, 15 (3) :1653-1660
[10]  
Chaput B., 2024, Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage, P105, DOI [10.1007/979-8-8688-0094-8_4, DOI 10.1007/979-8-8688-0094-8_4]