REVIEW AND ANALYSIS OF RESEARCH ON THE ISSUES OF INFORMATION SECURITY OF CLOUD INFRASTRUCTURES
DOI:
https://doi.org/10.32689/maup.it.2024.1.5Keywords:
cloud computing; informational security; machine learning; cyber attacks, anomaliesAbstract
Cloud computing is an access to network resources, such as data storage and computing power, on demand, without direct control by users. Currently, cloud computing includes both public and private data centers that provide customers with a single platform over the Internet. Peripheral computing (edge computing) is a strategy aimed at bringing computing and information storage closer to end users, reducing response time and optimizing the bandwidth of cloud services. Mobile cloud computing uses distributed computing to deliver applications to mobile devices such as phones and tablets. Numerous studies show that cloud computing and mobile cloud computing face information security (IS) challenges, threats, and vulnerabilities for customers, and one of the promising methods to combat these threats is the use of machine learning (ML) techniques. In this article, an analysis of IS threats and problems is carried out, as well as a review of the solutions proposed by various authors for the IS provision of cloud computing and cloud services. First of all, research based on the application of MN algorithms to ensure the security of cloud computing and cloud services is considered.
References
Горбань О., Браіловський М. Захист хмарної інфраструктури від DDоS атак. Проблеми кібербезпеки інформаційно-телекомунікаційних систем: Збірник матеріалів доповідей та тез; м. Київ, 27-28 жовтня 2022 року; Київський національний університет імені Тараса Шевченка / Редкол.: В.В. Ільченко. (голова) та ін. – К.: ВПЦ «Київський університет», 2022. 159 с.
Маковоз К. О. Методи виявлення вторгнень у хмарних системах відеоспостереження. Хмарні технології в освіті: матеріали Всеукраїнського науково-методичного Інтернет-семінару (Кривий Ріг–Київ–Черкаси–Харків, 21 грудня 2012 р.). – Кривий Ріг: Видавничий відділ КМІ, 2012. 173 с.
Фролов В. В. Analysis of approaches providing security of cloud sevices. Radioelectronic and Computer Systems, 2020. (1), 70-82.
Шимчук Г., Голотенко О., Золотий Р. З. Основні проблеми та загрози хмарної безпеки. Матеріали науково-технічної конференції «Інформаційні моделі, системи та технології» Тернопільського національного технічного університету імені Івана Пулюя, 2022. 59–60.
Aawadallah N. Security Threats of Cloud Computing. Int. J. Recent Innov. Trends Comput. Commun. 2015, 3, 2393–2397.
Al-Janabi S., Shehab A. Edge Computing: Review and Future Directions. REVISTA AUS J. 2019, 26, 368–380.
Alsolami E. Security threats and legal issues related to Cloud based solutions. Int. J. Comput. Sci. Netw. Secur. 2018, 18, 156–163.
Barona R., Anita M. A survey on data breach challenges in cloud computing security: Issues and threats. In Proceedings of the International Conference on Circuit, Power and Computing Technologies (ICCPCT), Paris, France, 17–18 September 2017; pp. 1–8.
Bhamare D., Salman T., Samaka M., Erbad A., Jain, R. Feasibility of Supervised Machine Learning for Cloud Security. In Proceedings of the International Conference on Information Science and Security, Jaipur, India, 16–20 December 2016; pp. 1–5.
Borylo P., Tornatore M., Jaglarz P., Shahriar N., Cholda P., Boutaba R. Latency and energy-aware provisioning of network slices in cloud networks. Comput. Commun. 2020, 157, 1–19.
Butt U. A., Mehmood M., Shah S. B. H., Amin R., Shaukat,M. W., Raza S. M., Piran M. J. A review of machine learning algorithms for cloud computing security. Electronics, 2020. 9(9), 1379.
Callara M., Wira P. User Behavior Analysis with Machine Learning Techniques in Cloud Computing Architectures. In Proceedings of the 2018 International Conference on Applied Smart Systems, Médéa, Algeria, 24–25 November 2018; pp. 1–6.
Carmo M., Dantas Silva F. S., Neto A.V., Corujo D., Aguiar, R. Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra-Dense Network Capabilities. Wirel. Commun. Mob. Comput. 2019, 2019, 8015274.
Deshpande P., Sharma S. C., Peddoju S. K. Security threats in cloud computing. In Proceedings of the International Conference on Computing, Communication and Automation, Greater Noida, India, 11–14 December 2011; pp. 632–636.
Elzamly A., Hussin B., Basari, A. S. Classification of Critical Cloud Computing Security Issues for Banking Organizations: A Cloud Delphi Study. Int. J. Grid Distrib. Comput. 2016, 9, 137–158.
Kazim M., Zhu S. Y. A survey on top security threats in cloud computing. Int. J. Adv. Comput. Sci. Appl. 2015, 6.
Khan A. N., Fan M. Y., Malik A., Memon R. A. Learning from Privacy Preserved Encrypted Data on Cloud Through Supervised and Unsupervised Machine Learning. In Proceedings of the International Conference on Computing, Mathematics and Engineering Technologies, Sindh, Pakistan, 29–30 January 2019; pp. 1–5.
Khan M. A survey of security issues for cloud computing. J. Netw. Comput. Appl. 2016, 71, 11–29.
Khilar P., Vijay C., Rakesh S. Trust-Based Access Control in Cloud Computing Using Machine Learning. In Cloud Computing for Geospatial Big Data Analytics; Das, H., Barik, R., Dubey, H., Roy, D., Eds.; Springer: Cham, Switzerland, 2019; Volume 49, pp. 55–79.
Le Duc T., Leiva R. G., Casari P., Östberg, P. O. Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing: A Survey. ACM Comput. Surv. 2019, 52, 1–39.
Lee Y., Yongjoon P., Kim, D. Security Threats Analysis and Considerations for Internet of Things. In Proceedings of the International Conference on Security Technology (SecTech), Jeju Island, Korea, 25–28 November 2015; pp. 28–30.
Lim S. Y., Kiah M. M., Ang T. F. Security Issues and Future Challenges of Cloud Service Authentication. Polytech. Hung. 2017, 14, 69–89.
Lin C., Lu H. Response to Co-resident Threats in Cloud Computing Using Machine Learning. In Proceedings of the International Conference on Advanced Information Networking and Applications, Caserta, Italy, 15–17 April 2020; Volume 926, pp. 904–913.
Mathkunti N. Cloud Computing: Security Issues. Int. J. Comput. Commun. Eng. 2014, 3, 259–263.
Nadeem M. Cloud Computing: Security Issues and Challenges. J. Wirel. Commun. 2016, 1, 10–15.
Salah K., Hammoud M., Zeadally, S. Teaching cybersecurity using the cloud. IEEE Transactions on Learning Technologies, 2015. 8(4), 383–392.
Sarma M., Srinivas Y., Ramesh N., Abhiram, M. Improving the Performance of Secure Cloud Infrastructure with Machine Learning Techniques. In Proceedings of the International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India, 19–21 October 2016; pp. 78–83.
Sayantan G., Stephen Y., Arun-Balaji B. Attack Detection in Cloud Infrastructures Using Artificial Neural Network with Genetic Feature Selection. In Proceedings of the IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, Athens, Greece, 12–15 August 2016; pp. 414–419.
Selamat N., Ali F. Comparison of malware detection techniques using machine learning algorithm. Indones. J. Electr. Eng. Comput. Sci. 2019, 16, 435.
Stefan H., Liakat M. Cloud Computing Security Threats And Solutions. J. Cloud Comput. 2015, 4, 1.
Subashini S., Kavitha V. A Survey on Security Issues in Service Delivery Models of Cloud Computing. J. Netw. Comput. Appl. 2011, 35, 1–11.
Sulistio A., Reich C., Doelitzscher, F. Cloud infrastructure & applications–CloudIA. In Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings 1 (pp. 583–588). Springer Berlin Heidelberg.
Varun K. A., Rajkumar N., Kumar N. K. Survey on security threats in cloud computing. Int. J. Appl. Eng. Res. 2014, 9, 10495–10500.
Venkatraman S., Mamoun A. Use of data visualisation for zero-day malware detection. Secur. Commun. Netw. 2018, 1–13.
Xue M., Yuan C., Wu H., Zhang Y., Liu W. Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 2020, 8, 74720–74742.
Yau S. S., Buduru A. B., Nagaraja, V. Protecting critical cloud infrastructures with predictive capability. In 2015 IEEE 8th International Conference on Cloud Computing (2015, June). (pp. 1119-1124). IEEE.
Yuhong L., Yan S., Jungwoo R., Syed R., Athanasios V. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions. J. Comput. Sci. Eng. 2015, 9, 119–133.