Zeba
Zeba
Approach
Aljawarne Anomaly- Develop a Evaluation of testing Cloud-based Microsoft Real
h et al. based intrusion comprehensiv risk assessment dataset, environment sofware
(2018) detection e risk accuracy, KDD Cup
system assessment computational 99 dataset,
through framework efficiency, NSL-KDD
feature for cloud- scalability, and dataset
selection based robustness
analysis and healthcare
building systems
hybrid
efficient model
Alosaimi, RISK Enhance the Evaluation of Security Cloud-based Software Simulation
and MANAGEME effectiveness feature selection datasets environment as a
Alnuem, NT of feature accuracy, Service
(2016) FRAMEWOR selection in computational (SaaS),
KS FOR cloud security efficiency, Platform
CLOUD risk scalability, and as a
COMPUTING assessment real-world Service
applicability (PaaS),
Infrastruct
ure as a
Service
(IaaS)
Cayirci et A risk The Cloud Comparative Security Cloud-based Cloud Simulation
al. (2016) assessment Adoption analysis of datasets environment software
model for Risk predictive applicatio
selecting Assessment accuracy, n
cloud service Model is generalization
providers designed to ability,
help cloud computational
customers in complexity, and
assessing the scalability
risks that they across various
face risk assessment
by selecting a models and
specific cloud datasets
service
provider.
Duc (2019) Survey of Provide Evaluation of Google edge-cloud large- Simulation
technologies, insights into surveyed dataset, environments scale
mechanisms, state-of-the- methods in OpenClou software
and methods art resource terms of d dataset,
for reliable provisioning reliability,
resource methods and scalability,
provisioning challenges adaptability, and
real-world
applicability
Nassif Systematic Analyze the Assessment of KDD and A Systematic software Simulation
(2021) literature landscape of ML techniques' KDD CUP Review of
review of ML ML effectiveness, ’99 dataset informati
and Cloud techniques in comparison of on
security cloud performance technolog
methodologies security; metrics, and y
and techniques identify identification of as Internet
common trends services
threats and
models
Abdelaziz Novel model Enhance Evaluation of Healthcare cloud Cloud Simulation
(2018) for healthcare healthcare model datasets computing computi
services using services and performance in environment ng
References
Ahmed, N. and Abraham, A. (2015a). Modeling cloud computing risk assessment using
ensemble methods,pages 261–274. Springer International Publishing.
Ahmed, N. and Abraham, A. (2015b). Modeling cloud computing risk assessment using machine
learning.
Aljawarneh, S., Aldwairi, M. and Yassein, M.B., 2018. Anomaly-based intrusion detection
system through feature selection analysis and building hybrid efficient model. Journal of
Computational Science, 25, pp.152-160.
Alosaimi, R. and Alnuem, M. (2016). Risk management frameworks for cloud computing: a
criticalreview. AIRCC’s International Journal of Computer Science and Information
Technology, pages 1–11.
Cayirci, E., Garaga, A., Santana de Oliveira, A., and Roudier, Y. (2016). A risk assessment
model forselecting cloud service providers. Journal of Cloud Computing, 5(1):14.
Drissi, S., Benhadou, S., and Medromi, H. (2016a). Evaluation of risk assessment methods
regardingcloud computing. In Proceedings of the 5th Conference on Multidisciplinary Design
Optimization andApplication.
Drissi, S., Benhadou, S., and Medromi, H. (2016b). A new shared and comprehensive tool of
cloudcomputing security risk assessment. In Proceedings of the UNet’15, volume 1, pages 155–
167. SpringerSingapore.
Iyer, E. K. (2014). Segmentation of risk factors associated with cloud computing adoption. In
Proceedingsof The International Conference on Cloud Security Management ICCSM-2014,
pages 82–89.
Latif, R., Abbas, H., Assar, S., and Ali, Q. (2014). Cloud computing risk assessment: a
systematic literature review. In FutureTech 2013, pages 285–295.
Mell, P. and Grance, T. (2011). The nist definition of cloud computing (special publication 800-
145).Technical report, National Institute of Standards and Technology.
Pavithra, B., Mishra, N., and Naveen, G. (2023). Cloud security analysis using machine learning
algorithms.
Sharma, A. and Singh, U. K. (2022). Modelling of smart risk assessment approach for cloud
computingenvironment using ai and supervised machine learning algorithms. Global Transitions
Proceedings,3(1):243–250.
Duc, T. L., Leiva, R. G., Casari, P., &Östberg, P. O. (2019). Machine learning methods for
reliable resource provisioning in edge-cloud computing: A survey. ACM Computing Surveys
(CSUR), 52(5), 1-39.”?”
Nassif, A. B., Talib, M. A., Nasir, Q., Albadani, H., &Dakalbab, F. M. (2021). Machine learning
for cloud security: a systematic review. IEEE Access, 9, 20717-20735.
Abdelaziz, A., Elhoseny, M., Salama, A. S., &Riad, A. M. (2018). A machine learning model for
improving healthcare services on cloud computing environment. Measurement, 119, 117-128.
Zekri, M., El Kafhali, S., Aboutabit, N., &Saadi, Y. (2017, October). DDoS attack detection
using machine learning techniques in cloud computing environments. In 2017 3rd international
conference of cloud computing technologies and applications (CloudTech) (pp. 1-7). IEEE.
Nguyen, K. K., Hoang, D. T., Niyato, D., Wang, P., Nguyen, D., &Dutkiewicz, E. (2018, April).
Cyberattack detection in mobile cloud computing: A deep learning approach. In 2018 IEEE
wireless communications and networking conference (WCNC) (pp. 1-6). IEEE.