A Review of Machine Learning Algorithms for Cloud Computing Security

Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users. CC recently has emerged as a set of public and private datacenters that offers the client a single platform across the Internet. Edge computing is an evolving computing paradigm that brings computation and information storage nearer to the end-users to improve response times and spare transmission capacity. Mobile CC (MCC) uses distributed computing to convey applications to cell phones. However, CC and edge computing have security challenges, including vulnerability for clients and association acknowledgment, that delay the rapid adoption of computing models. Machine learning (ML) is the investigation of computer algorithms that improve naturally through experience. In this review paper, we present an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms. We review different ML algorithms that are used to overcome the cloud security issues including supervised, unsupervised, semi-supervised, and reinforcement learning. Then, we compare the performance of each technique based on their features, advantages, and disadvantages. Moreover, we enlist future research directions to secure CC models.

[1]  Shu Yun Lim,et al.  Security Issues and Future Challenges of Cloud Service Authentication , 2017 .

[2]  Eryk Dutkiewicz,et al.  Cyberattack detection in mobile cloud computing: A deep learning approach , 2017, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[3]  Laurence T. Yang,et al.  A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment , 2019, IEEE Transactions on Big Data.

[4]  Asad Malik,et al.  Learning from Privacy Preserved Encrypted Data on Cloud Through Supervised and Unsupervised Machine Learning , 2019, 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).

[5]  Ziwei Li,et al.  Machine-Learning-Based Positioning: A Survey and Future Directions , 2019, IEEE Network.

[6]  Edi Abdurachman,et al.  Survey on Threats and Risks in the Cloud Computing Environment , 2019, Procedia Computer Science.

[7]  Shao Ying Zhu,et al.  A survey on top security threats in cloud computing , 2015 .

[8]  Junaid Qadir,et al.  Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges , 2017, IEEE Access.

[9]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[10]  R. Ramadan,et al.  Resource Scheduling for Offline Cloud Computing Using Deep Reinforcement Learning , 2019 .

[11]  Ahmed Khalid,et al.  A survey of Cloud Computing Security challenges and solutions , 2016 .

[12]  Kevin Li,et al.  Assessment of machine learning algorithms in cloud computing frameworks , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.

[13]  Shilpashree Srinivasamurthy,et al.  Survey on Cloud Computing Security , 2010 .

[14]  Roderic Broadhurst,et al.  Malicious Spam Emails Developments and Authorship Attribution , 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop.

[15]  Mohamed Ashour,et al.  Resource Management using Machine Learning in Mobile Edge Computing: A Survey , 2019, 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS).

[16]  Dong Hoon Lee,et al.  Privacy Preserving k-Nearest Neighbor for Medical Diagnosis in e-Health Cloud , 2018, Journal of healthcare engineering.

[17]  Amelec Viloria,et al.  Supervised and Unsupervised Learning Applied to Crowdfunding , 2019 .

[18]  Said El Kafhali,et al.  DDoS attack detection using machine learning techniques in cloud computing environments , 2017, 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech).

[19]  Ricardo Calderon,et al.  The Benefits of Artificial Intelligence in Cybersecurity , 2019 .

[20]  Chu-Hsing Lin,et al.  Response to Co-resident Threats in Cloud Computing Using Machine Learning , 2019, AINA.

[21]  Di Wu,et al.  Multi-Task Network Anomaly Detection using Federated Learning , 2019, SoICT.

[22]  Low Tang Jung,et al.  K-NN classifier for data confidentiality in cloud computing , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).

[23]  Liakat Ali,et al.  CLOUD COMPUTING SECURITY THREATS AND SOLUTIONS , 2017 .

[24]  Minhaj Ahmad Khan,et al.  A survey of security issues for cloud computing , 2016, J. Netw. Comput. Appl..

[25]  M. I. Zabezhailo,et al.  On some artificial intelligence methods and technologies for cloud-computing protection , 2017, Automatic Documentation and Mathematical Linguistics.

[26]  Hamid Mirvaziri,et al.  Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms , 2018 .

[27]  Chunlin Li,et al.  Effective replica management for improving reliability and availability in edge-cloud computing environment , 2020, J. Parallel Distributed Comput..

[28]  Anthony T. Chronopoulos,et al.  A new malware detection system using a high performance-ELM method , 2019, IDEAS.

[29]  Ram Shankar Siva Kumar,et al.  Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward , 2017, AISec@CCS.

[30]  Sarina Sulaiman,et al.  Web pre-fetching schemes using Machine Learning for Mobile Cloud Computing , 2017 .

[31]  Piotr Nawrocki,et al.  Adaptable mobile cloud computing environment with code transfer based on machine learning , 2019, Pervasive Mob. Comput..

[32]  Giuseppe Aceto,et al.  Performance-based service-level agreement in cloud computing to optimise penalties and revenue , 2020, IET Commun..

[33]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[34]  Patrice Wira,et al.  User Behavior Analysis with Machine Learning Techniques in Cloud Computing Architectures , 2018, 2018 International Conference on Applied Smart Systems (ICASS).

[35]  Nagaraju Kilari,et al.  A Survey on Security Threats for Cloud Computing , 2012 .

[36]  Mathew Nicho,et al.  Dimensions Of Security Threats In Cloud Computing: A Case Study , 2013, BIS 2013.

[37]  Adel A. Alyoubi,et al.  Application of Intelligent Data Mining Approach in Securing the Cloud Computing , 2016 .

[38]  Kwok-Wing Chau,et al.  A Survey of Deep Learning Techniques: Application in Wind and Solar Energy Resources , 2019, IEEE Access.

[39]  Florin Ogigau-Neamtiu,et al.  CLOUD COMPUTING SECURITY ISSUES , 2012 .

[40]  Latha Tamilselvan,et al.  A focus on future cloud: machine learning-based cloud security , 2019, Service Oriented Computing and Applications.

[41]  Hyeonjoon Moon,et al.  A Survey on Internet of Things and Cloud Computing for Healthcare , 2019, Electronics.

[42]  Amar Meryem,et al.  Enhancing Cloud Security using advanced MapReduce k-means on log files , 2018, ICSIM2018.

[43]  Sunil Shukla,et al.  Discerning the Threats in Cloud Computing Security , 2019, Journal of Computational and Theoretical Nanoscience.

[44]  Norbert Ritter,et al.  Latency in Cloud-Based Applications , 2020 .

[45]  B AmaneY.,et al.  Security Issues in Cloud Computing , 2011, HPAGC.

[46]  R. Vinayakumar,et al.  A hybrid deep learning image-based analysis for effective malware detection , 2019, J. Inf. Secur. Appl..

[47]  Y. Srinivas,et al.  Improving the Performance of Secure Cloud Infrastructure with Machine Learning Techniques , 2016, 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[48]  Victor S. Sheng,et al.  Machine Learning with Crowdsourcing: A Brief Summary of the Past Research and Future Directions , 2019, AAAI.

[49]  Rongmao Chen,et al.  SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition , 2020, ACISP.

[50]  Raouf Boutaba,et al.  Latency and energy-aware provisioning of network slices in cloud networks , 2020, Comput. Commun..

[51]  Chirag N. Modi,et al.  An enhanced intrusion detection framework for securing network layer of cloud computing , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).

[52]  Athanasios V. Vasilakos,et al.  A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..

[53]  Anthony T. Chronopoulos,et al.  Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues , 2020, J. Inf. Secur. Appl..

[54]  Brij B. Gupta,et al.  Security Threats and Recent Countermeasures in Cloud Computing , 2020 .

[55]  Antonio Bucchiarone,et al.  Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era , 2019, Future Internet.

[56]  Naveen Gondhi,et al.  Machine Learning Techniques: A Survey , 2019 .

[57]  E. Anita,et al.  A survey on data breach challenges in cloud computing security: Issues and threats , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).

[58]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[59]  Paolo Casari,et al.  Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing , 2019, ACM Comput. Surv..

[60]  Yukio Tsuruoka,et al.  Cloud Computing - Current Status and Future Directions , 2016, J. Inf. Process..

[61]  Weishi Zhang,et al.  An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).

[62]  Antonio Pescapè,et al.  Know your Big Data Trade-offs when Classifying Encrypted Mobile Traffic with Deep Learning , 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA).

[63]  Sajjad Haider,et al.  Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[64]  Xin Huang,et al.  Use of Machine Learning in Detecting Network Security of Edge Computing System , 2019, 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA).

[65]  Rakesh Ranjan Swain,et al.  Trust-Based Access Control in Cloud Computing Using Machine Learning , 2018, Studies in Big Data.

[66]  Alessio Botta,et al.  Characterizing Cloud-to-User Latency as Perceived by AWS and Azure Users Spread over the Globe , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[67]  A. Behl,et al.  An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.

[68]  Zhiguo Ding,et al.  A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art , 2019, IEEE Access.

[69]  R. Jagadeesh Kannan,et al.  Security Threat and Attack in Cloud Infrastructure: A Survey , 2013 .

[70]  Tutut Herawan,et al.  On Cloud Computing Security Issues , 2012, ACIIDS.

[71]  Sitalakshmi Venkatraman,et al.  Use of Data Visualisation for Zero-Day Malware Detection , 2018, Secur. Commun. Networks.

[72]  Stephen S. Yau,et al.  Attack Detection in Cloud Infrastructures Using Artificial Neural Network with Genetic Feature Selection , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[73]  Abdelrafe Elzamly,et al.  Classification of Critical Cloud Computing Security Issues for Banking Organizations: A Cloud Delphi Study , 2016 .

[74]  Md. Sakib Bin Alam,et al.  Cloud Computing – Architecture, Platform and Security Issues: A Survey , 2017 .

[75]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[76]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[77]  Mingfu Xue,et al.  Machine Learning Security: Threats, Countermeasures, and Evaluations , 2020, IEEE Access.

[78]  Jiafu Wan,et al.  Artificial Intelligence for Cloud-Assisted Smart Factory , 2018, IEEE Access.

[79]  Nitin Pandey,et al.  Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).

[80]  Mohammed Samaka,et al.  Feasibility of Supervised Machine Learning for Cloud Security , 2016, 2016 International Conference on Information Science and Security (ICISS).

[81]  Jiguo Yu,et al.  Edge Computing Security: State of the Art and Challenges , 2019, Proceedings of the IEEE.

[82]  Muhammad Aamir Nadeem Cloud Computing: Security Issues and Challenges , 2016 .

[83]  Nivedita M. Mathkunti Cloud Computing: Security Issues , 2014 .

[84]  Kangchan Lee Security Threats in Cloud Computing Environments , 2012 .

[85]  Wei Cai,et al.  A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.

[86]  Fakariah Hani Mohd Ali,et al.  Comparison of malware detection techniques using machine learning algorithm , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[87]  Rui L. Aguiar,et al.  Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra Dense Network Capabilities , 2019, Wirel. Commun. Mob. Comput..

[88]  Yunjung Lee,et al.  Security Threats Analysis and Considerations for Internet of Things , 2015, 2015 8th International Conference on Security Technology (SecTech).

[89]  Mohammad Abdallah,et al.  Cloud Computing: Legal and Security Issues , 2018, 2018 8th International Conference on Computer Science and Information Technology (CSIT).

[90]  Harsh Gupta,et al.  Security Threats in Cloud Computing , 2019, 2019 International Conference on Intelligent Computing and Control Systems (ICCS).