Skip to main content
Log in

A machine learning application for reducing the security risks in hybrid cloud networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cloud computing facilitates the enormous support of the public, business and emerging applications such as healthcare and nature disasters. Based on their services and characteristics, it can be classified as private cloud and public cloud. In this scenario, we need these two kinds of cloud services for an organization to provide the better service to the society. For that purpose, introduced a new cloud service called hybrid cloud service which is the combination of both private and public cloud. Security to the cloud environment is a challenging issue today especially for the hybrid cloud due to the combination of both. Many security mechanisms available in the literature but these are not achieved the sufficient level of security. For this purpose, we propose a new machine learning application for providing security to the hybrid cloud networks while storing the data and retrieving or accessing the data from the cloud. This proposed algorithm combines an existing Enhanced C4.5, newly proposed deduplication processing algorithm and the newly proposed dynamic access control mechanism. Moreover, we introduce a new deduplication processing algorithm for secure storage and retrieval without duplication or redundancy. In addition, a newly proposed dynamic access control mechanism called Dynamic Spatial Role Based Access Control Algorithm is also used in the proposed security framework. The proposed security framework has been implemented and also evaluated that the security level of the hybrid cloud while storing, retrieving and accessing the data from the cloud database.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Alabdulatif A, Kumarage H, Khalil I, Yi X (2017) Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J Comput Syst Sci 90:28–45

    Article  MathSciNet  Google Scholar 

  2. Elumalaivasan P, Kulothungan K, Ganapathy S, Kannan A (2016) Trust based Ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Aust J Basic Appl Sci 10(2):18–26

    Google Scholar 

  3. Gordon A (2016) The hybrid cloud security professional. IEEE Cloud Comput 3(1):82–86

    Article  Google Scholar 

  4. Helmi AM, Farhan MS, Nasr MM (2018) A framework for integrating geospatial information systems and hybrid cloud computing. Comput Electr Eng 67:145–158

    Article  Google Scholar 

  5. Hudic A, Smith P, Weippl ER (2017) Security assurance assessment methodology for hybrid clouds. Comput Sec 70:723–743

    Article  Google Scholar 

  6. Khan KM, Malluhi Q (2010) Establishing Trust in Cloud Computing. IT Prof 12(5):20–27

    Article  Google Scholar 

  7. Laatikainen G, Mazhelis O, Tyrvainen P (2016) Cost benefits of flexible hybrid cloud storage: mitigating volume variation with shorter acquisition cycle. J Syst Softw 122:180–201

    Article  Google Scholar 

  8. Li J, Li YK, Chen X, Lee PPC, Lou W (2014) A hybrid cloud approach for secure authorized Deduplication. IEEE Trans Paral Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  9. Li X, Ma H, Zhou F, Yao W (2015) T-broker: a trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Trans Info Foren Sec 10(7):1402–1415

    Article  Google Scholar 

  10. Linthicum DS (2016) Emerging hybrid cloud patterns. IEEE Cloud Comput 3(1):88–91

    Article  Google Scholar 

  11. Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2015a) Secured temporal log management techniques for cloud. Procedia Comput Sci Elsevier 46:589–595

    Article  Google Scholar 

  12. Muthurajkumar S, Vijayalakshmi M, Ganapathy S, Kannan A (2015b) Agent based intelligent approach for the malware detection for infected cloud data storage files. Seventh international conference on advanced computing (ICoAC), IEEE 1–5

  13. Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2015c) An effective intrusion detection on cloud virtual machines using hybrid feature selection and multiclass classifier. Aust J Basic Appl Sci 9(6):38–41

    Google Scholar 

  14. Nagashree N, Tejasvi R, Swathi KC (2018) An early risk detection and management system for the cloud with log parser. Comput Ind 07:24–33

    Google Scholar 

  15. Prema Rajeswari L, Arputharaj K (2008) An active rule approach for network intrusion detection with enhanced C4.5 algorithm. Int J Commun, Network and System Sciences 1(4):314–321

    Google Scholar 

  16. Qiu M, Gai K, Thuraisingham B, Tao L, Zhao H (2018) Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Futur Gener Comput Syst 80:421–429

    Article  Google Scholar 

  17. Saber T, Thorburn J, Murphy L, Ventresque A (2018) VM reassignment in hybrid clouds for large decentralised companies: a multi-objective challenge. Futur Gener Comput Syst 79(2):751–764

    Article  Google Scholar 

  18. Tysowski PK, Anwarul Hasan M (2013) Hybrid attribute- and re-encryption-based key Management for Secure and Scalable Mobile Applications in clouds. IEEE Trans Cloud Comput 1(2):172–186

    Article  Google Scholar 

  19. Yuan H, Chen X, Jiang T, Zhang X, Yan Z, Xiang Y (2018) DedupDUM: secure and scalable data deduplication with dynamic user management. Inf Sci 456:159–173

    Article  Google Scholar 

  20. Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Info Foren Sec 8(12):1947–1960

    Article  Google Scholar 

  21. Zhou Y, Feng D, Hua Y, Xia W, Fu M, Huang F, Zhang Y (2018a) A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Futur Gener Comput Syst 84:177–189

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Praveena.

Ethics declarations

Conflicts of interest

The authors have no conflicts of interest to declare. I certify that no funding has been received for the conduct of this study and/or preparation of this manuscript.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Praveena, D., Rangarajan, P. A machine learning application for reducing the security risks in hybrid cloud networks. Multimed Tools Appl 79, 5161–5173 (2020). https://doi.org/10.1007/s11042-018-6339-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6339-0

Keywords

Navigation