Empirical Analysis of Security Enabled Cloud Computing Strategy Using Artificial Intelligence

被引:1
|
作者
Tadeo, Diego Antonio Garcia [1 ]
John, S. Franklin [2 ]
Bhaumik, Ankan [3 ]
Neware, Rahul [4 ]
Yamsani, Nagendar [5 ]
Kapila, Dhiraj [6 ]
机构
[1] Univ Nacl Santiago Antunez de Mayolo, Dept Civil Engn, Huaraz, Peru
[2] Vignana Jyothi Inst Management, Hyderabad, India
[3] Vidyasagar Univ, Dept Appl Math Oceanol & Comp Programming, Midnapore, India
[4] Hgsk Vestlandet, Dept Comp Math & Phys, Inndalsveien 28, N-5063 Bergen, Norway
[5] SR Univ, Sch Comp Sci & Artificial Intelligence, Warangal, Andhra Pradesh, India
[6] Lovely Profess Univ, Dept Comp Sci & Engn, Phagwara, India
关键词
Cloud computing; artificial intelligence; artificial neural network; security; privacy; ISSUES;
D O I
10.1109/ICCS54944.2021.00024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing (CC) has emerged as an on-demand accessible tool in different practical applications such as digital industry, academics, manufacturing, health sector and others. In this paper different security threats faced by CC are discussed with suitable examples. Moreover, an artificial intelligence based security enabled CC is also discussed based on suitable empirical data. It is found that an artificial neural network (ANN) is an effective system to detect the level of risk factors associated with CC along with mitigating those risk issues with appropriate algorithms. Hence, it provides a desired level of protection against cyber attacks, internal confidential threats and external threat of data theft from a cloud computing system. Levenberg-Marquardt (LMBP) algorithms are also found as a significant tool to estimate the level of security performance around a cloud computing system. ANN is used to improve the performance level of data security across a cloud computing network and make it security enabled to ensure a protected data transmission to clients associated with the system.
引用
收藏
页码:83 / 85
页数:3
相关论文
共 50 条
  • [1] Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing
    Chen Jinyin
    Yang Dongyong
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 : 149 - 153
  • [2] Versatile Cloud Resource Scheduling Based on Artificial Intelligence in Cloud-Enabled Fog Computing Environments
    Lim, JongBeom
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13
  • [3] Artificial Intelligence for Designing User Profiling System for Cloud Computing Security: Experiment
    Neelam, Sahil
    Sood, Sandeep
    Mehmi, Sandeep
    Dogra, Shikha
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 51 - 58
  • [4] Implication of Artificial Intelligence to Enhance the Security Aspects of Cloud Enabled Internet of Things (IoT)
    Shahabadkar, Ramesh
    Shahabadkar, Krutika Ramesh
    [J]. SOFTWARE ENGINEERING METHODS IN INTELLIGENT ALGORITHMS, VOL 1, 2019, 984 : 14 - 24
  • [5] Artificial Intelligence Cyber Security Strategy
    Feng, Xiaohua
    Feng, Yunzhong
    Dawam, Edward Swarlat
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 328 - 333
  • [6] Resource Allocation in Industrial Cloud Computing Using Artificial Intelligence Algorithms
    Sheuly, Sharmin Sultana
    Bankarusamy, Sudhangathan
    Begum, Shahina
    Behnam, Moris
    [J]. THIRTEENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2015), 2015, 278 : 128 - 136
  • [7] Special issue on ''artificial intelligence in cloud computing''
    Mohammed, Sabah
    Fang, Wai Chi
    Ramos, Carlos
    [J]. COMPUTING, 2023, 105 (03) : 507 - 511
  • [8] Enhancing the Swimmer Movement Techniques Using Cloud Computing and Artificial Intelligence
    Liu, Xurui
    Zhang, Guobao
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023,
  • [9] Special issue on ‘‘artificial intelligence in cloud computing’’
    Sabah Mohammed
    Wai Chi Fang
    Carlos Ramos
    [J]. Computing, 2023, 105 : 507 - 511
  • [10] Analysis of IoT Cloud Security Computerization Technology Based on Artificial Intelligence
    Padmaavathy, P. A.
    Bharathi, S. Suganya
    Kumar, K. Arun
    Prasad, Ch. V. Sivaram
    Ramachandran, G.
    [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 296 - 304