0% found this document useful (0 votes)
84 views

Explorning The Role of Machine Learning in Enhancing Cloud Security

The use and acceptance of cloud computing are growing quickly. Numerous businesses are making investments in this area, either for their own needs or to offer services to others. The rise of the cloud has led to a number of security issues for both consumers and businesses. Machine learning is one method of cloud security (ML). ML approaches have been applied in a variety of ways to stop or identify online threats and security holes.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

Explorning The Role of Machine Learning in Enhancing Cloud Security

The use and acceptance of cloud computing are growing quickly. Numerous businesses are making investments in this area, either for their own needs or to offer services to others. The rise of the cloud has led to a number of security issues for both consumers and businesses. Machine learning is one method of cloud security (ML). ML approaches have been applied in a variety of ways to stop or identify online threats and security holes.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR910

Explorning the Role of Machine Learning in Enhancing


Cloud Security
M. Amshavalli1 ; R. Kishore2 ; S.P. Raguvijay3 ; S. Sri Shyam4
Assistant Professor 1, Students 1 2 3, Department of Computer Science and Engineering,
Erode Sengunthar Engineering College,
Perundurai, Erode, Tamil Nadu, India.

Abstract:- The use and acceptance of cloud computing are II. LITERATURE SURVEY
growing quickly. Numerous businesses are making
investments in this area, either for their own needs or to A. An Effective Detection and Prevention System for DDOS
offer services to others. The rise of the cloud has led to a TCP Flood Attacks in a Cloud Setting
number of security issues for both consumers and Assuring the availability and security of project data,
businesses. Machine learning is one method of cloud services, and resources remains a critical and difficult research
security (ML). subject, notwithstanding the recent sharp rise in the number of
cloud projects.
ML approaches have been applied in a variety of
ways to stop or identify online threats and security holes. After information theft, distributed denial of service
We present a Systematic Literature Review (SLR) of cloud (DDOS) assaults are the second most common type of
security and machine learning approaches and techniques cybercrime. DDOS TCP flood attacks quickly destroy an
in this work. After 63 pertinent papers were examined, the entire cloud project by using up all of the cloud's resources
SLR's findings were divided into three primary study and bandwidth. Thus, it is imperative that such assaults in
areas: I. The many forms of cloud security cloud projects be promptly detected and prevented,
particularly for e Health clouds.
Keywords:- DDOS, Machine Learning, Cloud Security,
Privacy, And Security. We provide a novel classifier system in this research that
can identify and stop DDOS TCP flood assaults (CS_DDOS)
I. INTRODUCTION in public clouds. The suggested CS DDOS system provides a
way to protect data that is held
A recent technical development is cloud computing,
which provides information technology infrastructure, B. A Systematic Review of Cloud Computing Security
software, and platforms as online services. Literature: Threats and Mitigation Techniques
In both academia and business, cloud computing research
Said to be the realization of a long-standing idea, "Cing Us," it is now being extensively utilized. Customers and cloud service
is progressively adopted by businesses as private, public, or providers (CSPs) both profit from cloud computing.
hybrid clouds. Its primary goal is to enable consumers to use Numerous studies have been conducted in the literature about
and pay for what they want, offering on-demand services for the security issues related to cloud computing.
their infrastructure or software requirements.
The purpose of this systematic literature review (SLR) is
Despite being viewed as a significant and positive to examine the extant literature on cloud computing security,
change in IT architecture, cloud computing still requires a lot dangers, and difficulties. This SLR looked at research papers
of security work to mitigate vulnerabilities. that were published in popular digital libraries from 2010 and
2020. After a careful review of available studies, we chose 80
A significant quantity of corporate and personal data is papers that address the suggested research questions.
stored in cloud data centers, thus it is necessary to identify and
prevent cloud security risks. This SLR's findings identified seven significant security
risks to cloud computing systems. The findings indicated that
Due to the fact that the associate editor overseeing this among the most talked-about subjects in the selected literature
manuscript's evaluation and approval. were data manipulation and leaks.

IJISRT24APR910 www.ijisrt.com 713


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR910

C. A Survey of Privacy Protection and Data Security for representations with an intelligent and interpretable signal
Cloud Storage propagation known as routing-by-agreement.
The digital transformation of businesses, the Internet of
Things (IOT), smart cities, and the global economy are among Given that Caps Nets are still a relatively new concept,
the emerging development trends. further study is necessary to fully understand Caps Net theory
and develop optimal practices for a variety of application
Due to the enormous amount of data collected, the strain domains. The purpose of this study is to advance caps nets.
on data storage is only going to increase, propelling the quick
expansion of the whole storage business. The ability to store F. Deep Learning-Based Cloud-Based Cyber-Physical
and manage data makes cloud storage systems an essential Intrusion Detection for Vehicles
component of the modern world. Governments, businesses, Interest in the detection of cyber attacks on automobiles
and individual users are currently actively moving their data to is rising.
the cloud. An enormous volume of data may provide
enormous riches. Vehicles usually have limited processing resources, thus
rule-based or lightweight machine learning approaches are
On the other hand, this raises the possibility of risks such suggested as alternatives. We contend that computational
data leakage, illegal access, revelation of sensitive offloading, which is frequently employed for mobile devices
information, and privacy disclosure. There are research on with limited resources, can overcome this restriction. This
data security and privacy protection, but comprehensive gives access to more sophisticated procedures due to the
surveys on the topic are still lacking. greater processing resources made available.

D. Mscryptonet: Deep Learning with Multi-Scheme Private We illustrate the viability and advantages of outsourcing
Preservation in Cloud Computing the ongoing deep learning-based intrusion detection work
A major concern for ubiquitous healthcare systems that using a tiny four-wheel robotic land vehicle as a case study.
rely on collected data and cooperative deep learning amongst Compared to typical machine learning approaches, our
several stakeholders is privacy in the Internet of Things. In methodology regularly achieves high accuracy and is not
this study, a novel framework called MSCryptoNet is restricted to a specific type of attack or the in-vehicle CAN
proposed, which allows the conversion of the state-of-the-art system like earlier work. It utilizes data as input.
trained neural network to MSCryptoNet models in a privacy-
preserving manner, and allows for its scalable execution. G. Posedstacked Sparse Autoencoder in a Hyperband Tuned
Deep Neural Network for the Detection of D Dos Attacks
Additionally, we provide a low degree polynomial Incloud
approach for approximating the activation function, which is Cloud computing offers several alluring characteristics,
essentially employed in convolution neural networks (i.e., such as completely managed computer system resources and
Sigmoid and Rectified linear unit). This method is essential services, as well as elastic and on-demand capabilities.
for computations in homomorphic encryption schemes. The
following situations appear to be the focus of our model: 1) A However, the cloud environment is vulnerable to many
workable method for requiring the classifier's assessment cyber-attacks and security concerns connected to cloud model
whose inputs are encrypted using potentially distinct because of its dispersed and dynamic nature as well as flaws in
encryption techniques. virtualization implementation. A few of these include the
inability to access data entering or leaving cloud services, theft
E. Next-Generation Neural Networks: Capsule Networks for and abuse of hosted data, lack of control over access to
Text Classification with Routing-by-Agreement sensitive data, and advanced threats such as distributed denial
Neural networks are now widely recognized as a crucial of service (DDOS), malware injection assaults, virtual
component of learning systems technology because to their machine escape, and wrapping attacks. One of the most well-
continual demonstration of high capacity for almost all known attacks is DDOS.
application cases.
Although there are several viable methods for detecting
But in order to handle newly presented challenges—such DDOS assaults, the frequency and strength of current attacks
as growing task complexity, explain ability of decision- are growing, and there are always.
making processes, expanding issue areas, and delivering
strong and resilient systems—neural networks must constantly
advance. The novel Capsule Network (Caps Net) technology
represents a potential improvement over conventional neural
networks. It blends the expressiveness of distributed entity

IJISRT24APR910 www.ijisrt.com 714


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR910

H. A Systematic Review, Analysis, and Outlook on Secure The training model in the distributed machine learning
Data Storage and Sharing Techniques for Data Protection system will be significantly impacted and the training results
in Cloud Environments will be incorrect if network attackers falsify, alter, or delete
The cloud environment is becoming more and more the data. As such, ensuring data integrity in the DML is
popular among academics, government agencies, and essential. To guarantee the integrity of training data, we
commercial businesses because it offers maximum scalability, provide in this work a distributed machine learning oriented
little upfront capital requirements, and other benefits. The data integrity verification technique (DML-DIV).
cloud environment supports many advantages, but it also has a
number of drawbacks. The Provable Data Possession (PDP) sample auditing
technique is the first notion we use to provide data integrity
When it comes to cloud computing and information verification, which makes our DML-DIV scheme resistant to
security, data protection is the main worry. Various fabrication.
approaches have been devised to tackle this problem.
Nevertheless, a thorough examination of the current solutions III. EXISTING SYSTEM
is lacking, therefore it becomes necessary to investigate,
categorize, and evaluate the substantial body of prior research  Because cloud computing uses the Internet to convey data
in order to determine if these solutions may be used in order to and host its infrastructure, it is a tremendously large
satisfy the criteria. In-depth research, a methodical industry.
comparison, and a thorough examination of the most effective  It charges according to the demands of the clients and
methods for safe sharing and safeguarding. offers services to suit their needs. The fact that consumers
are beginning to rely on the Cloud and that businesses can
I. An Algorithm for Virtual Machine Consolidation for Cloud now readily acquire Cloud services underscores its
Data Center Based on the Ant Colony System and the significance. Cloud service companies are concerned that
Extreme Learning Machine users may abuse their systems to launch attacks.
The issue of large-scale data centers' energy use is  The expectations of their companies and the facilities they
getting more and more attention. By moving virtual machines will receive from a certain provider are the primary factors
from one physical computer to another, virtual machine in choosing a cloud provider. Vulnerabilities in cloud
consolidation may drastically save energy use. security that an adversary may exploit to get access to the
network and other infrastructure resources. A cloud threat
On the other hand, serious Service Level Agreement is an unfavorable event that might happen maliciously
(SLA) violations might result from excessive virtual machine
consolidation. Thus, there is a dilemma that has to be resolved  Disadvantages
regarding how to efficiently strike a balance between efficient  The resource-intensive processing can lead to increased
energy use and avoiding SLA breaches. It is NP-hard to solve energy consumption, affecting the battery life of IoT
the virtual machine consolidation problem. devices.
 Relying on ECG and PPG signals limits its applicability in
Certain meta-heuristic algorithms can assist in preventing scenarios where additional data sources are necessary for
the local optimum state, which the standard heuristic method comprehensive cardiac monitoring.
is prone to. On the other hand, the complexity of the current  The system's use of DWT and signal quality index
meta-heuristic algorithms is rather considerable. Therefore, we calculations adds computational complexity, potentially
present a reduced complexity multi-population ant colony straining resource-limited IoT devices
system method using the Extreme Learning Machine (ELM)
prediction (ELM_MPACS). IV. PROPOSED SYSTEM
J. Cloud Computing Environment: Distributed Machine It is simple to make their suggested job better by giving
Learning Oriented Data Integrity Verification Scheme it additional features or making it capable of detecting new
AI is based on several key technologies, one of which is kinds of assaults. The suggested method uses support vector
distributed machine learning (DML). Nevertheless, data machines, which are more accurate and efficient when paired
integrity is not considered in the current distributed machine with J48. We suggest a hybrid algorithm for quicker, more
learning architecture. accurate, and more efficient outcomes when identifying
DDOS assaults using the fundamental feature choices.

IJISRT24APR910 www.ijisrt.com 715


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR910

VI. CONCLUSION

We conducted a thorough analysis of the literature to


examine ML methods used to cloud security.

The study looked at pertinent works that addressed three


research questions: the field of cloud security, the nature of the
ML approaches employed, and the ML model's accuracy
estimation. After using our selection criteria, we ultimately
received 60 research publications. Furthermore, we found that
the application of deep learning methods to cloud security has
Fig 1 Architecture Diagram not received much attention.

V. SCREENSHOTS In this sense, we urge researchers to leverage deep


learning.

REFFERENCES

[1]. OWUSU-AGYEMANG. KWABENA, ZHEN QIN,


TIANMING ZHUANG, AND ZHIGUANG QIN
MSCryptoNet: Multi- Scheme Privacy-Preserving Deep
Learning in Cloud Computing, publication February 25,
2019,
[2]. NIKOLAI A. K. STEUR AND FRIEDHELM
SCHWENKER, (Member, and IEEE) Next-Generation
Neural Networks: Capsule Networks with Routing- by-
Agreement for Text Classification publication September
7, 2021
[3]. GEORGE LOUKAS, TUAN VUONG, RYAN
HEARTFIELD, GEORGIA SAKELLARI, YONGPIL
YOON, AND DIANE GAN Cloud-Based Cyber-
Physical Intrusion Detection for Vehicles Using Deep
Learning Publication December 11, 2017
[4]. AANSHI BHARDWAJ, VEENU MANGAT, (Member,
IEEE), AND RENU VIG Hyper band Tuned Deep
Neural Network with Well Posed Stacked Sparse Auto
Encoder for Detection of DDoS Attacks in Cloud
Publication October 5, 2020.
[5]. CHUNG-NAN ASHUTOSH KUMAR SINGH, AND
ISHU GUPTA LEE1 AND, RAJKUMAR BUYYA ,
Secure Data Storage and Sharing Techniques for Data
Protection in Cloud Environments: A Systematic
Review, Analysis, and Future Directions publication 4
July 2022.
[6]. FAGUI LIU, ZHENJIANG MA, BIN WANG , AND
WEIWEI LIN A Virtual Machine Consolidation
Algorithm Based on Ant Colony System and Extreme
Learning Machine for Cloud Data Center publication
December 23, 2019
[7]. XIAO-PING ZHAO AND RUI JIANG Distributed
Machine Learning Oriented Data Integrity Verification
Scheme in Cloud Computing Environment publication
February 4, 2020

IJISRT24APR910 www.ijisrt.com 716


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR910

[8]. ÁLVARO LÓPEZ GARCÍA, JESÚS MARCO DE


LUCAS, MARICA ANTONACCI, WOLFGANG ZU
CASTELL, MARIO DAVID , MARCUS HARDT,
LARA LLORET IGLESIAS, GERMÁN MOLTÓ,
MARCIN PLOCIENNIK , VIET TRAN A Cloud- Based
Framework for Machine Learning Workloads and
Applications publication January 6, 2020
[9]. MUHAMMAD MEHMOOD, RASHID AMIN,
MUHANA MAGBOUL ALI MUSLAM, (Member,
IEEE), JIANG XIE, AND HAMZA ALDABBAS
Privilege Escalation Attack Detection and Mitigation in
Cloud Using Machine Learning publication 8 May 2023
[10]. KAUSHIK SEKARAN, MOHAMMAD S. KHAN,
RIZWAN PATAN , AMIR H.
[11]. GANDOMI, PARIMALA VENKATA KRISHNA, AND
SURESH KALLAM Improving the Response Time of
M-Learning and Cloud Computing Environments Using
a Dominant Firefly Approach publication February 12,
2019

IJISRT24APR910 www.ijisrt.com 717

You might also like