Abstract
Cloud computing facilitates the enormous support of the public, business and emerging applications such as healthcare and nature disasters. Based on their services and characteristics, it can be classified as private cloud and public cloud. In this scenario, we need these two kinds of cloud services for an organization to provide the better service to the society. For that purpose, introduced a new cloud service called hybrid cloud service which is the combination of both private and public cloud. Security to the cloud environment is a challenging issue today especially for the hybrid cloud due to the combination of both. Many security mechanisms available in the literature but these are not achieved the sufficient level of security. For this purpose, we propose a new machine learning application for providing security to the hybrid cloud networks while storing the data and retrieving or accessing the data from the cloud. This proposed algorithm combines an existing Enhanced C4.5, newly proposed deduplication processing algorithm and the newly proposed dynamic access control mechanism. Moreover, we introduce a new deduplication processing algorithm for secure storage and retrieval without duplication or redundancy. In addition, a newly proposed dynamic access control mechanism called Dynamic Spatial Role Based Access Control Algorithm is also used in the proposed security framework. The proposed security framework has been implemented and also evaluated that the security level of the hybrid cloud while storing, retrieving and accessing the data from the cloud database.
Similar content being viewed by others
References
Alabdulatif A, Kumarage H, Khalil I, Yi X (2017) Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J Comput Syst Sci 90:28–45
Elumalaivasan P, Kulothungan K, Ganapathy S, Kannan A (2016) Trust based Ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Aust J Basic Appl Sci 10(2):18–26
Gordon A (2016) The hybrid cloud security professional. IEEE Cloud Comput 3(1):82–86
Helmi AM, Farhan MS, Nasr MM (2018) A framework for integrating geospatial information systems and hybrid cloud computing. Comput Electr Eng 67:145–158
Hudic A, Smith P, Weippl ER (2017) Security assurance assessment methodology for hybrid clouds. Comput Sec 70:723–743
Khan KM, Malluhi Q (2010) Establishing Trust in Cloud Computing. IT Prof 12(5):20–27
Laatikainen G, Mazhelis O, Tyrvainen P (2016) Cost benefits of flexible hybrid cloud storage: mitigating volume variation with shorter acquisition cycle. J Syst Softw 122:180–201
Li J, Li YK, Chen X, Lee PPC, Lou W (2014) A hybrid cloud approach for secure authorized Deduplication. IEEE Trans Paral Distrib Syst 26(5):1206–1216
Li X, Ma H, Zhou F, Yao W (2015) T-broker: a trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Trans Info Foren Sec 10(7):1402–1415
Linthicum DS (2016) Emerging hybrid cloud patterns. IEEE Cloud Comput 3(1):88–91
Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2015a) Secured temporal log management techniques for cloud. Procedia Comput Sci Elsevier 46:589–595
Muthurajkumar S, Vijayalakshmi M, Ganapathy S, Kannan A (2015b) Agent based intelligent approach for the malware detection for infected cloud data storage files. Seventh international conference on advanced computing (ICoAC), IEEE 1–5
Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2015c) An effective intrusion detection on cloud virtual machines using hybrid feature selection and multiclass classifier. Aust J Basic Appl Sci 9(6):38–41
Nagashree N, Tejasvi R, Swathi KC (2018) An early risk detection and management system for the cloud with log parser. Comput Ind 07:24–33
Prema Rajeswari L, Arputharaj K (2008) An active rule approach for network intrusion detection with enhanced C4.5 algorithm. Int J Commun, Network and System Sciences 1(4):314–321
Qiu M, Gai K, Thuraisingham B, Tao L, Zhao H (2018) Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Futur Gener Comput Syst 80:421–429
Saber T, Thorburn J, Murphy L, Ventresque A (2018) VM reassignment in hybrid clouds for large decentralised companies: a multi-objective challenge. Futur Gener Comput Syst 79(2):751–764
Tysowski PK, Anwarul Hasan M (2013) Hybrid attribute- and re-encryption-based key Management for Secure and Scalable Mobile Applications in clouds. IEEE Trans Cloud Comput 1(2):172–186
Yuan H, Chen X, Jiang T, Zhang X, Yan Z, Xiang Y (2018) DedupDUM: secure and scalable data deduplication with dynamic user management. Inf Sci 456:159–173
Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Info Foren Sec 8(12):1947–1960
Zhou Y, Feng D, Hua Y, Xia W, Fu M, Huang F, Zhang Y (2018a) A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Futur Gener Comput Syst 84:177–189
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors have no conflicts of interest to declare. I certify that no funding has been received for the conduct of this study and/or preparation of this manuscript.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Praveena, D., Rangarajan, P. A machine learning application for reducing the security risks in hybrid cloud networks. Multimed Tools Appl 79, 5161–5173 (2020). https://doi.org/10.1007/s11042-018-6339-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6339-0