Skip to main content
Log in

Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective technique of data processing. In addition, cloud computing services are used in edge computing, often referred to as fog computing, to address new IoT challenges. Cloud computing is vulnerable to many infiltration flaws as a result of its Identity Server's shaky connection and dispersed communication features. Since distributed cloud computing systems are widely used, the great majority of research has concentrated on vulnerability scanning and defense. Nevertheless, there is still promise for the creation of fresh intrusion defense and detection methods. As a result, employing an edge computing-based topology of the network, this research proposed a novel hybrid optimal intelligence technique for the detection and authorization of anomalous dangerous behaviors in IoT networks. To discover anomalies in edge computing networks for detecting device behavior, a unique Evolving Neuro-Fuzzy Intelligence for Anomaly Detection (EFNI-AD) method is proposed in this research. Additionally, an Improved Cipher Crypto System (ICCS) is developed to ensure the reliability of data-passing edge devices. The edge device functions as a certification authority (CA) for the specified trusted domain. In this proposed ICCS paradigm, the edge node just verifies the certificate once to eliminate the overhead of edge devices, and once confidence has been established, all communication may be conducted utilizing regional credentials. The Lionized African Buffalo Optimization (LABO) also improves the assault detection system and trust authorization. The simulation findings indicate that the proposed methods outperform the current methods in terms of several performance criteria such as Packet delivery time, End-to-End delay, throughput, Routing overhead, Packet loss, Accuracy, processing time, Packet Delivery Ratio, and Recall. The proposed method provides lower end-to-end delay and a higher packet delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  • Alfakih, T., et al.: Task offloading and resource allocation for mobile edge computing by deep reinforcement learning based on SARSA. IEEE Access 8, 54074–54084 (2020)

    Google Scholar 

  • Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22(6), 13027–13039 (2019)

    Google Scholar 

  • Bedi, P., et al.: Detection of attacks in IoT sensors networks using machine learning algorithm. Microprocess. Microsyst. 82, 103814 (2021)

    Google Scholar 

  • Chen, A., Fu, Y., Zheng, X., Lu, G.: An efficient network behavior anomaly detection using a hybrid DBN-LSTM network. Comput. Secur. 114, 102600 (2022)

    Google Scholar 

  • Dovom, E.M., et al.: Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 97, 1–7 (2019)

    Google Scholar 

  • Ferrer, A.J., Marquès, J.M., Jorba, J.: Towards the decentralised cloud: survey on approaches and challenges for mobile, ad hoc, and edge computing. ACM Comput. Surv. (CSUR) 51(6), 1–36 (2019)

    Google Scholar 

  • Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manage. 16(3), 924–935 (2019)

    Google Scholar 

  • Hasan, M., et al.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7, 100059 (2019)

    Google Scholar 

  • Himeur, Y., Ghanem, K., Alsalemi, A., Bensaali, F., Amira, A.: Artificial intelligence based anomaly detection of energy consumption in buildings: a review, current trends and new perspectives. Appl. Energy 287, 116601 (2021)

    Google Scholar 

  • Hosseinzadeh, M., et al.: A hybrid service selection and composition model for cloud-edge computing in the internet of things. IEEE Access 8, 85939–85949 (2020)

    Google Scholar 

  • Jeffrey, N., Tan, Q., Villar, J.R.: A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics 12(15), 3283 (2023)

    Google Scholar 

  • Kumar, P., Herbert Rav, P., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 125, 691–6972 (2018)

    Google Scholar 

  • Li, B., et al.: DeepFed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Ind. Inf. 17(8), 5615–5624 (2020)

    Google Scholar 

  • Lin, F., et al.: "Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consumer Electron. Mag. 7(6), 45–50 (2018)

    ADS  Google Scholar 

  • Lin, B., et al.: A time-driven data placement strategy for a scientific workflow combining edge computing and cloud computing. IEEE Trans. Ind. Inf. 15(7), 4254–4265 (2019)

    Google Scholar 

  • Liu, H., Zhang, Y., Yang, T.: Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 32(3), 78–83 (2018)

    Google Scholar 

  • Liu, P., et al.: Optimization of edge-PLC-based fault diagnosis with random forest in industrial internet of things. IEEE Internet Things J. 7(10), 9664–9674 (2020)

    Google Scholar 

  • Minh Dang, L., et al.: A survey on internet of things and cloud computing for healthcare. Electronics 8(7), 7684 (2019)

    Google Scholar 

  • Minu, R.I., Nagarajan, G., Asmaa Munshi, Almukadi, W., Venkatachalam, K., Abouhawwash, M.: An edge based attack detection model (EBAD) for increasing the trustworthiness in IoT enabled smart city environment. IEEE Access 10, 89499–89508 (2022)

    Google Scholar 

  • Muhammad, G., et al.: Edge computing with cloud for voice disorder assessment and treatment. IEEE Commun. Mag. 56(4), 60–65 (2018)

    MathSciNet  Google Scholar 

  • Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Netw. Appl. 21(3), 494–505 (2016)

    Google Scholar 

  • Patrikar, Devashree R., and MayurRajramParate. Anomaly detection using edge computing in video surveillance system." arXiv preprint arXiv:2107.02778 (2021).

  • Peng, Y., et al.: Hierarchical edge computing: a novel multi-source multi-dimensional data anomaly detection scheme for industrial internet of things. IEEE Access 7, 111257–111270 (2019)

    Google Scholar 

  • Punitha, A., Angel, A., Indumathi, G.: A novel centralized cloud information accountability integrity with ensemble neural network based attack detection approach for cloud data. J. Ambient Intell. Humaniz. Comput. 12(5), 4889–4900 (2021)

    Google Scholar 

  • Qi, Q., Tao, F.: A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access 7, 86769–86777 (2019)

    Google Scholar 

  • Qureshi, K.N., Jeon, G., Piccialli, F.: Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput. Netw. 184, 107647 (2021)

    Google Scholar 

  • Rabbani, M., et al.: A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. J. Netw. Comput. Appl. 151, 102507 (2020)

    Google Scholar 

  • Sajith, P.J., Nagarajan, G.: Intrusion detection system using deep belief network & particle swarm optimization. Wireless Pers. Commun. 125(2), 1385–1403 (2022)

    Google Scholar 

  • Sajith, P.J., Nagarajan, G.: Network intrusion detection system using ANFIS classifier. Soft. Comput. 27(3), 1629–1638 (2023)

    Google Scholar 

  • Sangaiah, A.K., et al.: Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans. Ind. Inf. 15(7), 4189–4196 (2019)

    MathSciNet  Google Scholar 

  • Sha, K., et al.: A survey of edge computing-based designs for IoT security1. Digital Commun. Netw. 6(2), 195–202 (2020)

    Google Scholar 

  • Shahzadi, S., et al.: Multi-access edge computing: open issues, challenges and future perspectives. J. Cloud Comput. 6(1), 1–13 (2017)

    MathSciNet  Google Scholar 

  • Singh, S., et al.: Machine learning assisted security and privacy provisioning for edge computing: a survey. IEEE Internet Things J. 9(1), 236–260 (2021)

    Google Scholar 

  • Somula, R.S., Sasikala, R.: A survey on mobile cloud computing: mobile computing+ cloud computing (MCC= MC+ CC). Scalable Comput. Pract. Exp. 19(4), 309–337 (2018)

    Google Scholar 

  • Sunyaev, Ali: Cloud computing. In: Internet computing, pp. 195–236. Springer, Cham (2020)

    Google Scholar 

  • Tan, H., Gui, Z., Chung, I.: A secure and efficient certificateless authentication scheme with unsupervised anomaly detection in VANETs. IEEE Access 6, 74260–74276 (2018)

    Google Scholar 

  • Varghese, B., RajkumarBuyya: Next generation cloud computing: new trends and research directions. Future Generat. Comput. Syst. 79, 849–861 (2018)

    Google Scholar 

  • Verma, C, and R Pandey. Mobile cloud computing integrating cloud, mobile computing, and networking services through virtualization. In: Research anthology on architectures, frameworks, and integration strategies for distributed and cloud computing. IGI Global, 2021. 209–226.

  • Wang, Z.: Research on digital economy and human resources based on fuzzy clustering and edge computing. Secur. Commun. Netw. 2021, 1–8 (2021)

    Google Scholar 

  • Xiao, Y., et al.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)

    Google Scholar 

  • Xu, S., Qian, Y., Hu, R.Q.: Data-driven edge intelligence for robust network anomaly detection. IEEE Trans. Netw. Sci. Eng. 7(3), 1481–1492 (2019)

    Google Scholar 

  • Yazdani, M., Jolai, F.: Lion optimization algorithm (LOA): a nature-inspired metaheuristic algorithm. J. Comput. Design Eng. 3(1), 24–36 (2016)

    Google Scholar 

  • Zhang, J., et al.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 18209–18237 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Dr. NP: Idea conceptualization, correspondence. Dr. JV: Algorithm specialization A: Validation of the results Dr.SR: Algorithm specialization Dr. NV: Writing original draft SVA: Editing AR: Data collection, validation. Dr. BS: Reviewing

Corresponding author

Correspondence to N. Prakash.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent does not apply as this was a retrospective review with no identifying patient information.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prakash, N., Vignesh, J., Ashwin, M. et al. Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach. Opt Quant Electron 56, 251 (2024). https://doi.org/10.1007/s11082-023-05781-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-023-05781-x

Keywords

Navigation