Skip to main content

A Secure Mechanism for Safeguarding Cloud Infrastructure

  • Conference paper
  • First Online:
Advancements in Smart Computing and Information Security (ASCIS 2022)


Security is frequently viewed as the largest impediment to a cloud-based approach, but in actuality, it can be the majorenabler. Cloud security guarantees that your information and apps are easily accessible to authorized users. In this paper, we shall be putting forward, the cloud ecosystem's security concerns. The most crucial concerns for the popularity of cloud computing services are privacy and security. Here we try to depict a study of data that is hosted on the cloud and the issues in its security. The study will examine the particular data protection practices used globally to offer optimum data security while reducing threats and risks. Although many apps benefit by having access to data on the cloud, but doing so poses concerns since it makes data accessible to apps that could already contain security flaws. Analog to this, data may be at risk if a guest OS operates on top of the hypervisor, without consideration for dependability of the guest OS, resulting in a flaw in security. The paper ends with a case study where the request has been classified as safe or malicious. If the malicious request is identified, then these requests are to be discarded so that the cloud remains safe. The classification has been conducted using Machine Learning and Deep Learning concepts and an accuracy of 85% has been achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others


  1. Srinivas, J., Reddy, K., Qyser, A.: Cloud computing basics. Build Infrastruct. Cloud Secur. 1(2011), 3–22 (2014)

    Google Scholar 

  2. Vouk, M.A.: Cloud computing - issues, research and implementations. In: Proceedings of the International Conference on Information Technologies Interfaces, ITI, pp. 31–40 (2008)

    Google Scholar 

  3. Wooley, P.S.: Identifying cloud computing security risks. Contin. Educ. 1277 (2011)

    Google Scholar 

  4. Alharthi, A., Yahya, F., Walters, R.J., Wills, G.B.: An Overview of Cloud Services Adoption Challenges in Higher Education Institutions (2015)

    Google Scholar 

  5. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  6. Ranchal, R., Bhargava, B.: Epics: A framework for enforcing security policies in composite Web services. IEEE Trans. Services Comput. 12(3), 12–22(2019

    Google Scholar 

  7. Martin, K.: The penalty for privacy violations: how privacy violations impact trust online. J. Bus. Res. 82, 103–116 (2018)

    Google Scholar 

  8. Ali, T.: The next generation cloud technologies: a review on distributed cloud, fog and edge computing and their opportunities and challenges. Res. Berg Rev. Sci. Technol. 1(1), 1–15 (2021)

    Google Scholar 

  9. Ramesh, N.P., Guruprasad, N., Dankan Gowda, V.: A high-availability and integrity layer for cloud storage, cloud computing security: from single to multi-clouds. J. Phys. Conf. Ser. 1921(1) (2021). (IOP Publishing)

    Google Scholar 

  10. Abhishek, S., et al.: A comparative analysis of security issues & vulnerabilities of leading cloud service providers and in-house university cloud platform for hosting e-educational applications. In: 2021 IEEE Mysore Sub Section International Conference (MysuruCon). IEEE (2021)

    Google Scholar 

  11. Tawalbeh, L.A., Saldamli, G.: Reconsidering big data security and privacy in cloud and mobile cloud systems. J. King Saud Univ. Comput. Inform. Sci. 33.7, 810–819 (2021)

    Google Scholar 

  12. Bhardwaj, A., Krishna, C.R.: Virtualization in cloud computing: moving from hypervisor to containerization—a survey. Arab. J. Sci. Eng. 46, 8585–8601 (2021)

    Google Scholar 

  13. Ali, O.: Assessing information security risks in the cloud: a case study of Australian local government authorities. Gov. Inf. Q. 37(1), 101419 (2020)

    Article  Google Scholar 

  14. Identity, I., Anand, P.M.R., Bhaskar, V.: Identity and access management in cloud environment: mechanisms and challenges. Eng. Sci. Technol. Int. J. 21.4, 574–588 (2018)

    Google Scholar 

  15. Wu, H., et al.: Network security for virtual machine in cloud omputing. In: 5th International Conference on Computer Sciences and Convergence Information Technology. IEEE (2010)

    Google Scholar 

  16. Gururaj, R., Iftikhar, M., Khan, F.A.: A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 465–472 (2017)

    Google Scholar 

  17. Hassan, R.: Data and infrastructure security auditing in cloud computing environments. Int. J. Inform. Manage. 34.3, 364–368 (2014)

    Google Scholar 

  18. Hanan, S., et al.: Cloud computing virtualization of resources allocation for distributed systems. J. Appl. Sci. Technol. Trends 1.3, 98–105 (2020)

    Google Scholar 

  19. Theodor, B., et al.: Digital transformation of manufacturing through cloud services and resource virtualization. Comput. Indust. 108,150–162 (2019)

    Google Scholar 

  20. Xue, Y., et al.: An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans. Inform. Forens. Secur. 14.11, 2927–2942 (2019)

    Google Scholar 

  21. Ru, J., et al.: A systematic review of scheduling approaches on multi-tenancy cloud platforms. Inform. Softw. Technol. 132, 106478 (2021)

    Google Scholar 

  22. Kandukuri, B., Paturi, V., Rakshit, A.: Cloud security issues. In: International Conference on Services Computing, pp. 517–520. IEEE (2009)

    Google Scholar 

  23. Almulla, S., Yeun, C.: Cloud computing security management. In: 2nd International Conference on ICESMA, pp 1–7. IEEE (2010)

    Google Scholar 

  24. Palivela, H., Chawande, N., Wani, A.: Development of server in cloud computing to solve issues related to security and backup. In: IEEE CCIS, pp 158–163 (2011)

    Google Scholar 

  25. Laura, A., Moro, R.: Support vector machines (SVM) as a technique for solvency analysis. DIW Berlin discussion paper (2008)

    Google Scholar 

  26. Zhang, X., Zhao, Y.: Application of support vector machine to reliability analysis of engine systems. Telkomnika 11(7), 3352–3560 (2013)

    Google Scholar 

  27. Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Prentice Hall, Englewood Cliffs, NJ (2009)

    Google Scholar 

  28. Michalski, R., Carbonell, J., Mitchell, T.: Machine Learning: An Artificial Intelligence Approach. Springer, Berlin (2013)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Vivek Kumar Prasad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pratyush, K., Prasad, V.K., Mehta, R., Bhavsar, M. (2022). A Secure Mechanism for Safeguarding Cloud Infrastructure. In: Rajagopal, S., Faruki, P., Popat, K. (eds) Advancements in Smart Computing and Information Security. ASCIS 2022. Communications in Computer and Information Science, vol 1760. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23094-3

  • Online ISBN: 978-3-031-23095-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics