Machine Learning (ML)-centric resource security in cloud computing using authenticated key

被引:0
作者
Saxena, Ravi Shankar [1 ]
Mohapatra, Smaranika [2 ]
Singh, Amit Kumar [3 ]
Bhupati [4 ]
机构
[1] GMRIT, Dept Elect & Commun Engn, Vizianagram, India
[2] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[3] Amity Univ Rajasthan, Amity Inst Informat Technol, Jaipur 302001, Rajasthan, India
[4] KL Univ, Dept IoT, Guntur 522302, Andhra Pradesh, India
关键词
Cloud parameters; Security issues; Machine learning; Security parameters; Cloud services; Cloud security simulation;
D O I
10.47974/JDMSC-1768
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.
引用
收藏
页码:1427 / 1436
页数:10
相关论文
共 19 条
[1]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[2]   Suspicious Behavior Detection: Current Trends and Future Directions [J].
Jiang, Meng ;
Cui, Peng ;
Faloutsos, Christos .
IEEE INTELLIGENT SYSTEMS, 2016, 31 (01) :31-39
[3]   Detection and tracking of moving cloud services from video using saliency map model [J].
Kamble, Shailesh ;
Saini, Dilip Kumar J. ;
Kumar, Vinay ;
Gautam, Arun Kumar ;
Verma, Shikha ;
Tiwari, Ashish ;
Goyal, Dinesh .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04) :1083-1092
[4]   Optimization classification of sunflower recognition through machine learning [J].
Kaur, Rupinder ;
Jain, Anubha ;
Kumar, Sarvesh .
MATERIALS TODAY-PROCEEDINGS, 2022, 51 :207-211
[5]  
Kumar S., 2018, P INT C EM, P15
[6]  
Kumar S, 2022, Int. J. Cloud Appl. Comput., V12, P1, DOI 10.4018/ijcac.311033
[7]   Chaos based image encryption security in cloud computing [J].
Kumar, Sarvesh ;
Srivastava, Prabhat Kumar ;
Srivastava, Gaurav Kumar ;
Singhal, Prateek ;
Singh, Dinesh ;
Goyal, Dinesh .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04) :1041-1051
[8]   Detection of recurring vulnerabilities in computing services [J].
Kumar, Sarvesh ;
Dubey, Kamlesh Kumar ;
Gautam, Arun Kumar ;
Verma, Shikha ;
Kumar, Vinay ;
Mamodiya, Udit .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04) :1063-1071
[9]  
Kumar Singh Neeraj, 2022, 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), P1, DOI 10.1109/CISCT55310.2022.10046448
[10]   An overview of anomaly detection techniques: Existing solutions and latest technological trends [J].
Patcha, Animesh ;
Park, Jung-Min .
COMPUTER NETWORKS, 2007, 51 (12) :3448-3470