Machine Learning (ML)-centric resource security in cloud computing using authenticated key

被引:0
|
作者
Saxena, Ravi Shankar [1 ]
Mohapatra, Smaranika [2 ]
Singh, Amit Kumar [3 ]
Bhupati [4 ]
机构
[1] GMRIT, Dept Elect & Commun Engn, Vizianagram, India
[2] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[3] Amity Univ Rajasthan, Amity Inst Informat Technol, Jaipur 302001, Rajasthan, India
[4] KL Univ, Dept IoT, Guntur 522302, Andhra Pradesh, India
关键词
Cloud parameters; Security issues; Machine learning; Security parameters; Cloud services; Cloud security simulation;
D O I
10.47974/JDMSC-1768
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.
引用
收藏
页码:1427 / 1436
页数:10
相关论文
共 50 条
  • [1] Machine learning (ML)-centric resource management in cloud computing: A review and future directions
    Khan, Tahseen
    Tian, Wenhong
    Zhou, Guangyao
    Ilager, Shashikant
    Gong, Mingming
    Buyya, Rajkumar
    Journal of Network and Computer Applications, 2022, 204
  • [2] Machine learning (ML)-centric resource management in cloud computing: A review and future directions
    Khan, Tahseen
    Tian, Wenhong
    Zhou, Guangyao
    Ilager, Shashikant
    Gong, Mingming
    Buyya, Rajkumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [3] Authenticated key exchange protocol security of cloud services management using machine learning
    Agrawal, Vani
    Dubey, Nilesh
    Singh, Virendra
    Singla, Nepali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1381 - 1391
  • [4] Machine learning-centric prediction and decision based resource management in cloud computing environments
    Kashyap, Shobhana
    Singh, Avtar
    Gill, Sukhpal Singh
    Cluster Computing, 2025, 28 (02)
  • [5] Resource Usage Cost Optimization in Cloud Computing Using Machine Learning
    Osypanka, Patryk
    Nawrocki, Piotr
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2079 - 2089
  • [6] A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques
    Bal, Prasanta Kumar
    Mohapatra, Sudhir Kumar
    Das, Tapan Kumar
    Srinivasan, Kathiravan
    Hu, Yuh-Chung
    SENSORS, 2022, 22 (03)
  • [7] A Review of Machine Learning Algorithms for Cloud Computing Security
    Butt, Umer Ahmed
    Mehmood, Muhammad
    Shah, Syed Bilal Hussain
    Amin, Rashid
    Shaukat, M. Waqas
    Raza, Syed Mohsan
    Suh, Doug Young
    Piran, Md. Jalil
    ELECTRONICS, 2020, 9 (09) : 1 - 25
  • [8] Predictive Resource Allocation Strategies for Cloud Computing Environments Using Machine Learning
    Kamble, Torana
    Deokar, Sanjivani
    Wadne, Vinod S.
    Gadekar, Devendra P.
    Vanjari, Hrishikesh Bhanudas
    Mange, Purva
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (02) : 68 - 77
  • [9] Research trends in deep learning and machine learning for cloud computing security
    Alzoubi, Yehia Ibrahim
    Mishra, Alok
    Topcu, Ahmet Ercan
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (05)
  • [10] Cloud Computing Security: Machine and Deep Learning Models Analysis
    Mishra, Janmaya Kumar
    Janarthanan, Midhunchakkaravarthy
    MACROMOLECULAR SYMPOSIA, 2023, 407 (01)