Abstract
With the increasing demand and popularity in the usage of cloud computing, there has been a necessity to prevent common attacks and security threats to cloud computing services. The consumers of cloud services are constantly concerned about the cyber-security risks, data loss, and slowdown of services. With the advancement of machine learning techniques, learning-based methods for security applications are gaining tremendous popularity in the field of literature. Over the past few years, ML techniques have been shown to prevent as well as to detect security attacks on the cloud. In this paper, we provide a comprehensive and systematic literature review on the use of ML in cloud security and its applications and techniques to prevent security issues on cloud computing. We further evaluated relevant research and studies and divide them into three main categories: (1) The security threats and attacks on cloud computing, (2) Types of ML technologies used to prevent security threats, (3) Evaluating the results and discussing the performance outcome of the models. The extensive review and findings proposed in this paper can contribute to further enhancements and improvements in cloud computing and security issues with the use of machine learning algorithms. Moreover, it will provide the basis for other researchers to contribute new ideas and enhancements in achieving reliable and safe methods to access cloud computing applications and avoid any potential security issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Gordon, The hybrid cloud security professional. IEEE Cloud Comput. 3(1), 82–86 (2016). https://doi.org/10.1109/MCC.2016.21
A. Qayyum et al., Securing machine learning in the cloud: a systematic review of cloud machine learning security. Front. Big Data 3(November) (2020). https://doi.org/10.3389/fdata.2020.587139
M. Amar, M. Lemoudden, B. El Ouahidi, Log file’s centralization to improve cloud security, in 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech) (2016), pp. 178–183. https://doi.org/10.1109/CloudTech.2016.7847696
J. Soni, S.K. Peddoju, N. Prabakar, H. Upadhyay, Comparative analysis of LSTM, one-class SVM, and PCA to monitor real-time malware threats using system call sequences and virtual machine introspection, in International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering, vol 733, ed. by V. Bindhu, J.M.R.S. Tavares, A.A. Boulogeorgos, C. Vuppalapati (Springer, Singapore, 2021), pp. 113–127. https://doi.org/10.1007/978-981-33-4909-4
P. Gangwani, J. Soni, H. Upadhyay, S. Joshi, A deep learning approach for modeling of geothermal energy prediction. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 18(1) (2020)
L. Auria, R.A. Moro, Support Vector Machines (SVM) as a technique for solvency analysis. SSRN Electron. J. (2008). https://doi.org/10.2139/ssrn.1424949
G. Stein, B. Chen, A.S. Wu, K.A. Hua, Decision tree classifier for network intrusion detection with GA-based feature selection, in Proceedings of the 43rd Annual Southeast Regional Conference on—ACM-SE 43 (2005), vol. 2, p. 136. https://doi.org/10.1145/1167253.1167288
T. Bhardwaj, H. Upadhyay, L. Lagos, deep learning-based cyber security solutions for smart-city: application and review, in Artificial Intelligence in Industrial Applications, vol. 25, ed. by T. Sharma, S. Fernandes (Springer, Cham, 2022)
S. Muthurajkumar, S. Ganapathy, M. Vijayalakshmi, A. Kannan, Secured temporal log management techniques for cloud. Procedia Comput. Sci. 46, 589–595 (2015). https://doi.org/10.1016/j.procs.2015.02.098
S. Muthurajkumar, M. Vijayalakshmi, S. Ganapathy, A. Kannan, Agent based intelligent approach for the malware detection for infected cloud data storage files, in 2015 Seventh International Conference on Advanced Computing (ICoAC) (2015), pp. 1–5. https://doi.org/10.1109/ICoAC.2015.7562810
B. Jin, Y. Wang, Z. Liu, J. Xue, A trust model based on cloud model and Bayesian networks. Procedia Environ. Sci. 11, 452–459 (2011). https://doi.org/10.1016/j.proenv.2011.12.072
N.S. Selamat, F.H.M. Ali, Comparison of malware detection techniques using machine learning algorithm. Indones. J. Electr. Eng. Comput. Sci. 16(1), 435–440 (2019). https://doi.org/10.11591/ijeecs.v16.i1.pp435-440
G. Ramachandra, M. Iftikhar, F.A. Khan, A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 465–472 (2017). https://doi.org/10.1016/j.procs.2017.06.124
D. Gangwani, P. Gangwani, Applications of machine learning and artificial intelligence in intelligent transportation system: a review, in Lecture Notes in Electrical Engineering, Springer (2021), pp. 203–216
T. Bhardwaj, R. Mittal, H. Upadhyay, L. Lagos, Applications of swarm intelligent and deep learning algorithms for image-based cancer recognition, in Artificial Intelligence in Healthcare (Springer, Singapore, 2022), pp. 133150
P. Gangwani, A. Perez-Pons, T. Bhardwaj, H. Upadhyay, S. Joshi, L. Lagos, Securing environmental IoT data using masked authentication messaging protocol in a DAG-based blockchain: IOTA tangle. Futur. Internet 13(12), 312 (2021). https://doi.org/10.3390/fi13120312
T. Bhardwaj, C. Reyes, H. Upadhyay, S.C. Sharma, L. Lagos, Cloudlet-enabled wireless body area networks (WBANs): a systematic review, architecture, and research directions for QoS improvement. Int. J. Syst. Assur. Eng. Manag. (2021). https://doi.org/10.1007/s13198-021-01508-x
D. Gangwani, Q. Liang, S. Wang, X. Zhu, An empirical study of deep learning frameworks for melanoma cancer detection using transfer learning and data augmentation, in 2021 IEEE International Conference on Big Knowledge (ICBK) (2021), pp. 38–45. https://doi.org/10.1109/ICKG52313.2021.00015
T. Bhardwaj, H. Upadhyay, S.C. Sharma, Framework for quality ranking of components in cloud computing: regressive rank, in 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2020), pp. 598–604. https://doi.org/10.1109/Confluence47617.2020.9058016
M.A. Zardari, L.T. Jung, N. Zakaria, K-NN classifier for data confidentiality in cloud computing, in 2014 International Conference on Computer and Information Sciences (ICCOINS) (2014), pp. 1–6. https://doi.org/10.1109/ICCOINS.2014.6868432
T. Bhardwaj, H. Upadhyay, S.C. Sharma, Autonomic resource provisioning framework for service-based cloud applications: a queuing-model based approach, in 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2020), pp. 605–610. https://doi.org/10.1109/Confluence47617.2020.9058266
D. Richards, The Benefits of Artificial Intelligence on Workplace Productivity. Mavinlink (2017)
S. Shamshirband, A.T. Chronopoulos, A new malware detection system using a high performance-ELM method, in Proceedings of the 23rd International Database Applications & Engineering Symposium on IDEAS’19 (2019), pp. 1–10. https://doi.org/10.1145/3331076.3331119
J. Park, D.H. Lee, Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud. J. Healthc. Eng. 2018, 1–11 (2018). https://doi.org/10.1155/2018/4073103
T. Bhardwaj, H. Upadhyay, S.C. Sharma, An autonomic resource allocation framework for service-based cloud applications: a proactive approach, in Soft Computing: Theories and Applications (2020), pp. 1045–1058
A. Elzamly, B. Hussin, S. Abu Naser, K. Khanfar, M. Doheir, A. Selamat, A. Rashed, A new conceptual framework modelling for cloud computing risk management in banking organizations. Int. J. Grid Distrib. Comput. 9, 137–154 (2016). https://doi.org/10.14257/ijgdc.2016.9.9.13
T. Bhardwaj, H. Upadhyay, S.C. Sharma, Autonomic resource allocation mechanism for service-based cloud applications, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (2019), pp. 183–187. https://doi.org/10.1109/ICCCIS48478.2019.8974515
S. Guha, S.S. Yau, A.B. Buduru, Attack detection in cloud infrastructures using artificial neural network with genetic feature selection, in 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing (2016), pp. 414–419. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.32
T. Bhardwaj, S.C. Sharma, An autonomic resource provisioning framework for efficient data collection in cloudlet-enabled wireless body area networks: a fuzzy-based proactive approach. Soft Comput. 23(20), 10361–10383 (2019). https://doi.org/10.1007/s00500-018-3587-x
A.N. Khan, M.Yu. Fan, A. Malik, R.A. Memon, Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning, in 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) (2019), pp. 1–5. https://doi.org/10.1109/ICOMET.2019.8673524
A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyy, V.O. Piskovski, Secure automatic reconfiguration of cloudy computing. Syst. Means Inform. 26(3), 83–92 (2016). https://doi.org/10.14357/08696527160306
V. Sharma, V. Verma, A. Sharma, Detection of DDoS attacks using machine learning in cloud computing. Commun. Comput. Inf. Sci. 1076, 260–273 (2019). https://doi.org/10.1007/978-981-15-0111-1_24
M. Zekri, S. El Kafhali, N. Aboutabit, Y. Saadi, DDoS attack detection using machine learning techniques in cloud computing environments, in 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (2017), pp. 1–7. https://doi.org/10.1109/CloudTech.2017.8284731
H.M. Said, I. El Emary, B.A. Alyoubi, A.A. Alyoubi, Application of intelligent data mining approach in securing the cloud computing. Int. J. Adv. Comput. Sci. Appl. 7(9), 151–159 (2016). https://doi.org/10.14569/ijacsa.2016.070921
A. Mishra, N. Gupta, B.B. Gupta, Security Threats and Recent Countermeasures in Cloud Computing (2020), pp. 145–161
K. Arjunan, C.N. Modi, An enhanced intrusion detection framework for securing network layer of cloud computing, in 2017 ISEA Asia Security and Privacy (ISEASP) (2017), pp. 1–10. https://doi.org/10.1109/ISEASP.2017.7976988
A. Meryem, D. Samira, E.O. Bouabid, Enhancing Cloud Security using advanced MapReduce k-means on log files, in Proceedings of the 2018 International Conference on Software Engineering and Information Management—ICSIM2018 (2018), pp. 63–67. https://doi.org/10.1145/3178461.3178462
R.S.S. Kumar, A. Wicker, and M. Swann, Practical machine learning for cloud intrusion detection, in Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (2017), pp. 81–90. https://doi.org/10.1145/3128572.3140445
J. Feng, L.T. Yang, G. Dai, W. Wang, D. Zou, A secure high-order Lanczos-based orthogonal tensor SVD for big data reduction in cloud environment. IEEE Trans. Big Data 5(3), 355–367 (2019). https://doi.org/10.1109/TBDATA.2018.2803841
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Gangwani, D., Sanghvi, H.A., Parmar, V., Patel, R.H., Pandya, A.S. (2023). A Comprehensive Review on Cloud Security Using Machine Learning Techniques. In: Bhardwaj, T., Upadhyay, H., Sharma, T.K., Fernandes, S.L. (eds) Artificial Intelligence in Cyber Security: Theories and Applications. Intelligent Systems Reference Library, vol 240. Springer, Cham. https://doi.org/10.1007/978-3-031-28581-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-28581-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28580-6
Online ISBN: 978-3-031-28581-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)