Deep learning approach to security enforcement in cloud workflow orchestration

被引:0
作者
Hadeel T. El-Kassabi
Mohamed Adel Serhani
Mohammad M. Masud
Khaled Shuaib
Khaled Khalil
机构
[1] Concordia University,Department of Computer Science and Software Engineering, Gina Cody School of Engineering and Computer Science
[2] Sharjah University,College of Computing and Informatics
[3] UAEU,College of Information Technology
[4] University of Toronto,Faculty of Applied Science & Engineering
来源
Journal of Cloud Computing | / 12卷
关键词
Cloud; Cloud workflow; Security enforcement; Deep learning; Anomaly detection; Prediction; Covid-19;
D O I
暂无
中图分类号
学科分类号
摘要
Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by a workflow deployed on the cloud need to be protected, and communication of such data across multiple stakeholders should also be secured. In general, security threats in cloud environments have been studied extensively. Such threats include data breaches, data loss, denial of service, service rejection, and malicious insiders generated from issues such as multi-tenancy, loss of control over data and trust. Supporting the security of a cloud workflow deployed and executed over a dynamic environment, across different platforms, involving different stakeholders, and dynamic data is a difficult task and is the sole responsibility of cloud providers. Therefore, in this paper, we propose an architecture and a formal model for security enforcement in cloud workflow orchestration. The proposed architecture emphasizes monitoring cloud resources, workflow tasks, and the data to detect and predict anomalies in cloud workflow orchestration using a multi-modal approach that combines deep learning, one class classification, and clustering. It also features an adaptation scheme to cope with anomalies and mitigate their effect on the workflow cloud performance. Our prediction model captures unsupervised static and dynamic features as well as reduces the data dimensionality, which leads to better characterization of various cloud workflow tasks, and thus provides better prediction of potential attacks. We conduct a set of experiments to evaluate the proposed anomaly detection, prediction, and adaptation schemes using a real COVID-19 dataset of patient health records. The results of the training and prediction experiments show high anomaly prediction accuracy in terms of precision, recall, and F1 scores. Other experimental results maintained a high execution performance of the cloud workflow after applying adaptation strategy to respond to some detected anomalies. The experiments demonstrate how the proposed architecture prevents unnecessary wastage of resources due to anomaly detection and prediction.
引用
收藏
相关论文
共 79 条
[1]  
Hashem IAT(2015)The rise of ‘big data’ on cloud computing: review and open research issues Inf Syst 47 98-115
[2]  
Yaqoob I(2013)A survey of cloud workflow Adv Mater Res 765 1343-1348
[3]  
Anuar NB(2018)An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment J Cloud Comput 7 1-18
[4]  
Mokhtar S(2013)Anomaly detection in the cloud: detecting security incidents via machine learning Commun Comput Inf Sci 379 103-116
[5]  
Gani A(2015)Enabling scalable scientific workflow management in the cloud Futur Gener Comput Syst 46 3-16
[6]  
Khan SU(2018)Detecting performance anomalies in scientific workflows using hierarchical temporal memory Futur Gener Comput Syst 88 624-635
[7]  
Huang H(2018)Metric selection and anomaly detection for cloud operations using log and metric correlation analysis J Syst Softw 137 531-549
[8]  
Zhang YL(2013)A case study into using common real-time workflow monitoring infrastructure for scientific workflows J Grid Comput 11 381-406
[9]  
Zhang M(2016)A system architecture for real-time anomaly detection in large-scale NFV systems Procedia Comput Sci 94 491-496
[10]  
Abusitta A(2017)Cloud security: emerging threats and current solutions Comput Electr Eng 59 126-140