Skip to main content

A Comprehensive Review on Cloud Security Using Machine Learning Techniques

  • Chapter
  • First Online:
Artificial Intelligence in Cyber Security: Theories and Applications

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 240))

  • 180 Accesses

Abstract

With the increasing demand and popularity in the usage of cloud computing, there has been a necessity to prevent common attacks and security threats to cloud computing services. The consumers of cloud services are constantly concerned about the cyber-security risks, data loss, and slowdown of services. With the advancement of machine learning techniques, learning-based methods for security applications are gaining tremendous popularity in the field of literature. Over the past few years, ML techniques have been shown to prevent as well as to detect security attacks on the cloud. In this paper, we provide a comprehensive and systematic literature review on the use of ML in cloud security and its applications and techniques to prevent security issues on cloud computing. We further evaluated relevant research and studies and divide them into three main categories: (1) The security threats and attacks on cloud computing, (2) Types of ML technologies used to prevent security threats, (3) Evaluating the results and discussing the performance outcome of the models. The extensive review and findings proposed in this paper can contribute to further enhancements and improvements in cloud computing and security issues with the use of machine learning algorithms. Moreover, it will provide the basis for other researchers to contribute new ideas and enhancements in achieving reliable and safe methods to access cloud computing applications and avoid any potential security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Gordon, The hybrid cloud security professional. IEEE Cloud Comput. 3(1), 82–86 (2016). https://doi.org/10.1109/MCC.2016.21

  2. A. Qayyum et al., Securing machine learning in the cloud: a systematic review of cloud machine learning security. Front. Big Data 3(November) (2020). https://doi.org/10.3389/fdata.2020.587139

  3. M. Amar, M. Lemoudden, B. El Ouahidi, Log file’s centralization to improve cloud security, in 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech) (2016), pp. 178–183. https://doi.org/10.1109/CloudTech.2016.7847696

  4. J. Soni, S.K. Peddoju, N. Prabakar, H. Upadhyay, Comparative analysis of LSTM, one-class SVM, and PCA to monitor real-time malware threats using system call sequences and virtual machine introspection, in International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering, vol 733, ed. by V. Bindhu, J.M.R.S. Tavares, A.A. Boulogeorgos, C. Vuppalapati (Springer, Singapore, 2021), pp. 113–127. https://doi.org/10.1007/978-981-33-4909-4

  5. P. Gangwani, J. Soni, H. Upadhyay, S. Joshi, A deep learning approach for modeling of geothermal energy prediction. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 18(1) (2020)

    Google Scholar 

  6. L. Auria, R.A. Moro, Support Vector Machines (SVM) as a technique for solvency analysis. SSRN Electron. J. (2008). https://doi.org/10.2139/ssrn.1424949

  7. G. Stein, B. Chen, A.S. Wu, K.A. Hua, Decision tree classifier for network intrusion detection with GA-based feature selection, in Proceedings of the 43rd Annual Southeast Regional Conference on—ACM-SE 43 (2005), vol. 2, p. 136. https://doi.org/10.1145/1167253.1167288

  8. T. Bhardwaj, H. Upadhyay, L. Lagos, deep learning-based cyber security solutions for smart-city: application and review, in Artificial Intelligence in Industrial Applications, vol. 25, ed. by T. Sharma, S. Fernandes (Springer, Cham, 2022)

    Google Scholar 

  9. S. Muthurajkumar, S. Ganapathy, M. Vijayalakshmi, A. Kannan, Secured temporal log management techniques for cloud. Procedia Comput. Sci. 46, 589–595 (2015). https://doi.org/10.1016/j.procs.2015.02.098

  10. S. Muthurajkumar, M. Vijayalakshmi, S. Ganapathy, A. Kannan, Agent based intelligent approach for the malware detection for infected cloud data storage files, in 2015 Seventh International Conference on Advanced Computing (ICoAC) (2015), pp. 1–5. https://doi.org/10.1109/ICoAC.2015.7562810

  11. B. Jin, Y. Wang, Z. Liu, J. Xue, A trust model based on cloud model and Bayesian networks. Procedia Environ. Sci. 11, 452–459 (2011). https://doi.org/10.1016/j.proenv.2011.12.072

  12. N.S. Selamat, F.H.M. Ali, Comparison of malware detection techniques using machine learning algorithm. Indones. J. Electr. Eng. Comput. Sci. 16(1), 435–440 (2019). https://doi.org/10.11591/ijeecs.v16.i1.pp435-440

  13. G. Ramachandra, M. Iftikhar, F.A. Khan, A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 465–472 (2017). https://doi.org/10.1016/j.procs.2017.06.124

  14. D. Gangwani, P. Gangwani, Applications of machine learning and artificial intelligence in intelligent transportation system: a review, in Lecture Notes in Electrical Engineering, Springer (2021), pp. 203–216

    Google Scholar 

  15. T. Bhardwaj, R. Mittal, H. Upadhyay, L. Lagos, Applications of swarm intelligent and deep learning algorithms for image-based cancer recognition, in Artificial Intelligence in Healthcare (Springer, Singapore, 2022), pp. 133150

    Google Scholar 

  16. P. Gangwani, A. Perez-Pons, T. Bhardwaj, H. Upadhyay, S. Joshi, L. Lagos, Securing environmental IoT data using masked authentication messaging protocol in a DAG-based blockchain: IOTA tangle. Futur. Internet 13(12), 312 (2021). https://doi.org/10.3390/fi13120312

  17. T. Bhardwaj, C. Reyes, H. Upadhyay, S.C. Sharma, L. Lagos, Cloudlet-enabled wireless body area networks (WBANs): a systematic review, architecture, and research directions for QoS improvement. Int. J. Syst. Assur. Eng. Manag. (2021). https://doi.org/10.1007/s13198-021-01508-x

  18. D. Gangwani, Q. Liang, S. Wang, X. Zhu, An empirical study of deep learning frameworks for melanoma cancer detection using transfer learning and data augmentation, in 2021 IEEE International Conference on Big Knowledge (ICBK) (2021), pp. 38–45. https://doi.org/10.1109/ICKG52313.2021.00015

  19. T. Bhardwaj, H. Upadhyay, S.C. Sharma, Framework for quality ranking of components in cloud computing: regressive rank, in 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2020), pp. 598–604. https://doi.org/10.1109/Confluence47617.2020.9058016

  20. M.A. Zardari, L.T. Jung, N. Zakaria, K-NN classifier for data confidentiality in cloud computing, in 2014 International Conference on Computer and Information Sciences (ICCOINS) (2014), pp. 1–6. https://doi.org/10.1109/ICCOINS.2014.6868432

  21. T. Bhardwaj, H. Upadhyay, S.C. Sharma, Autonomic resource provisioning framework for service-based cloud applications: a queuing-model based approach, in 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2020), pp. 605–610. https://doi.org/10.1109/Confluence47617.2020.9058266

  22. D. Richards, The Benefits of Artificial Intelligence on Workplace Productivity. Mavinlink (2017)

    Google Scholar 

  23. S. Shamshirband, A.T. Chronopoulos, A new malware detection system using a high performance-ELM method, in Proceedings of the 23rd International Database Applications & Engineering Symposium on IDEAS’19 (2019), pp. 1–10. https://doi.org/10.1145/3331076.3331119

  24. J. Park, D.H. Lee, Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud. J. Healthc. Eng. 2018, 1–11 (2018). https://doi.org/10.1155/2018/4073103

  25. T. Bhardwaj, H. Upadhyay, S.C. Sharma, An autonomic resource allocation framework for service-based cloud applications: a proactive approach, in Soft Computing: Theories and Applications (2020), pp. 1045–1058

    Google Scholar 

  26. A. Elzamly, B. Hussin, S. Abu Naser, K. Khanfar, M. Doheir, A. Selamat, A. Rashed, A new conceptual framework modelling for cloud computing risk management in banking organizations. Int. J. Grid Distrib. Comput. 9, 137–154 (2016). https://doi.org/10.14257/ijgdc.2016.9.9.13

  27. T. Bhardwaj, H. Upadhyay, S.C. Sharma, Autonomic resource allocation mechanism for service-based cloud applications, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (2019), pp. 183–187. https://doi.org/10.1109/ICCCIS48478.2019.8974515

  28. S. Guha, S.S. Yau, A.B. Buduru, Attack detection in cloud infrastructures using artificial neural network with genetic feature selection, in 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing (2016), pp. 414–419. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.32

  29. T. Bhardwaj, S.C. Sharma, An autonomic resource provisioning framework for efficient data collection in cloudlet-enabled wireless body area networks: a fuzzy-based proactive approach. Soft Comput. 23(20), 10361–10383 (2019). https://doi.org/10.1007/s00500-018-3587-x

    Article  Google Scholar 

  30. A.N. Khan, M.Yu. Fan, A. Malik, R.A. Memon, Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning, in 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) (2019), pp. 1–5. https://doi.org/10.1109/ICOMET.2019.8673524

  31. A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyy, V.O. Piskovski, Secure automatic reconfiguration of cloudy computing. Syst. Means Inform. 26(3), 83–92 (2016). https://doi.org/10.14357/08696527160306

    Article  Google Scholar 

  32. V. Sharma, V. Verma, A. Sharma, Detection of DDoS attacks using machine learning in cloud computing. Commun. Comput. Inf. Sci. 1076, 260–273 (2019). https://doi.org/10.1007/978-981-15-0111-1_24

    Article  Google Scholar 

  33. M. Zekri, S. El Kafhali, N. Aboutabit, Y. Saadi, DDoS attack detection using machine learning techniques in cloud computing environments, in 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (2017), pp. 1–7. https://doi.org/10.1109/CloudTech.2017.8284731

  34. H.M. Said, I. El Emary, B.A. Alyoubi, A.A. Alyoubi, Application of intelligent data mining approach in securing the cloud computing. Int. J. Adv. Comput. Sci. Appl. 7(9), 151–159 (2016). https://doi.org/10.14569/ijacsa.2016.070921

  35. A. Mishra, N. Gupta, B.B. Gupta, Security Threats and Recent Countermeasures in Cloud Computing (2020), pp. 145–161

    Google Scholar 

  36. K. Arjunan, C.N. Modi, An enhanced intrusion detection framework for securing network layer of cloud computing, in 2017 ISEA Asia Security and Privacy (ISEASP) (2017), pp. 1–10. https://doi.org/10.1109/ISEASP.2017.7976988

  37. A. Meryem, D. Samira, E.O. Bouabid, Enhancing Cloud Security using advanced MapReduce k-means on log files, in Proceedings of the 2018 International Conference on Software Engineering and Information Management—ICSIM2018 (2018), pp. 63–67. https://doi.org/10.1145/3178461.3178462

  38. R.S.S. Kumar, A. Wicker, and M. Swann, Practical machine learning for cloud intrusion detection, in Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (2017), pp. 81–90. https://doi.org/10.1145/3128572.3140445

  39. J. Feng, L.T. Yang, G. Dai, W. Wang, D. Zou, A secure high-order Lanczos-based orthogonal tensor SVD for big data reduction in cloud environment. IEEE Trans. Big Data 5(3), 355–367 (2019). https://doi.org/10.1109/TBDATA.2018.2803841

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Divya Gangwani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gangwani, D., Sanghvi, H.A., Parmar, V., Patel, R.H., Pandya, A.S. (2023). A Comprehensive Review on Cloud Security Using Machine Learning Techniques. In: Bhardwaj, T., Upadhyay, H., Sharma, T.K., Fernandes, S.L. (eds) Artificial Intelligence in Cyber Security: Theories and Applications. Intelligent Systems Reference Library, vol 240. Springer, Cham. https://doi.org/10.1007/978-3-031-28581-3_1

Download citation

Publish with us

Policies and ethics