Cloud computing security assurance modelling through risk analysis using machine learning

被引:0
|
作者
Abhishek Sharma [1 ]
Umesh Kumar Singh [2 ]
机构
[1] Shri Vaishnav Vidyapeeth Vishwavidyalaya,
[2] Vikram University,undefined
[3] Ujjain,undefined
关键词
Cloud computing (CC); Cloud attacks; Cloud security; Machine learning; Intrusion detection system (IDS); Cyber attacks; Cloud security assurance;
D O I
10.1007/s13198-025-02705-8
中图分类号
学科分类号
摘要
The concept of Cloud Computing has exploded in popularity, and the reason for this is the cost-effective transmission, storage, and powerful computation it offers. The objective is to provide end-users with remote storage and data analysis capabilities using shared computing resources, lowering an individual’s total cost. Consumers, on the other hand, are still hesitant to use this technology due to security and privacy concerns. In this work a thorough overview of the various Cloud attacks and security challenges is presented and security assurance modelling is done through risk analysis using machine learning. In order to analyze the security risk in terms of threats and attacks for cloud computing environments, the most recent dataset (ISOT Cloud Intrusion Dataset) is used for intrusion detection under cloud computing environments. The methodology involves the implementation of multiple supervised machine learning algorithms like support vector machine (SVM), random forest (RF), logistic regression (LR), Naïve Bayes (NB), Artificial Neural Network (ANN), K-nearest Neighbor (kNN) to identify & classify intrusions for cloud environment. As a result, accuracy of the proposed SVM model is evaluated as 99.2%. The performance metrics of various machine learning implementation models are also compared & investigated using parameters like accuracy, AUC, F1, precision, and recall. The results are represented as confusion matrices. The outcome of this work will further help the network security administrator to mitigate the real time attacks under cloud computing environments.
引用
收藏
页码:1287 / 1300
页数:13
相关论文
共 50 条
  • [31] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [32] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [33] Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
    Veeraiah, Duggineni
    Mohanty, Rajanikanta
    Kundu, Shakti
    Dhabliya, Dharmesh
    Tiwari, Mohit
    Jamal, Sajjad Shaukat
    Halifa, Awal
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [34] Analysis on Cloud Computing and its Security
    Liu Xiao-hui
    Song Xin-fang
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 839 - 842
  • [35] Analysis of cloud computing and information security
    Kenan, Wang
    Shao, Qian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3810 - 3813
  • [36] An analysis of security issues for cloud computing
    Hashizume, Keiko
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Fernandez, Eduardo B.
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 13
  • [37] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108
  • [38] Security Analysis and Discussion of Cloud Computing
    Liu Zhi-fang
    Zhang Xue-hong
    12TH ANNUAL MEETING OF CHINA ASSOCIATION FOR SCIENCE AND TECHNOLOGY ON INFORMATION AND COMMUNICATION TECHNOLOGY AND SMART GRID, 2010, : 362 - +
  • [39] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [40] An Analysis of Security Challenges in Cloud Computing
    Parekh, Disha H.
    Sridaran, R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 38 - 46