Cloud Computing Security Assurance Modelling Through Risk
Cloud Computing Security Assurance Modelling Through Risk
https://doi.org/10.1007/s13198-025-02705-8
ORIGINAL ARTICLE
Abstract The concept of Cloud Computing has exploded help the network security administrator to mitigate the real
in popularity, and the reason for this is the cost-effective time attacks under cloud computing environments.
transmission, storage, and powerful computation it offers.
The objective is to provide end-users with remote stor- Keywords Cloud computing (CC) · Cloud attacks ·
age and data analysis capabilities using shared computing Cloud security · Machine learning · Intrusion detection
resources, lowering an individual’s total cost. Consumers, system (IDS) · Cyber attacks · Cloud security assurance
on the other hand, are still hesitant to use this technology
due to security and privacy concerns. In this work a thor-
ough overview of the various Cloud attacks and security 1 Introduction
challenges is presented and security assurance modelling
is done through risk analysis using machine learning. In One of the primary motivations for cloud computing is
order to analyze the security risk in terms of threats and the usage of current-generation Internet-based technology.
attacks for cloud computing environments, the most recent Cloud computing, according to the National Institute of
dataset (ISOT Cloud Intrusion Dataset) is used for intrusion Standards and Technology (NIST) (Mell & Grance 2011),
detection under cloud computing environments. The meth- provides on-demand, convenient, ubiquitous, and reliable
odology involves the implementation of multiple supervised network access to large configured shareable computing
machine learning algorithms like support vector machine resources that can be easily managed and utilized with
(SVM), random forest (RF), logistic regression (LR), Naïve minimal effort and interaction with cloud service providers
Bayes (NB), Artificial Neural Network (ANN), K-nearest (Nister & Stewenius 2006). It’s a cutting-edge information
Neighbor (kNN) to identify & classify intrusions for cloud system technique that provides dynamically shared resources
environment. As a result, accuracy of the proposed SVM through the Internet while also generating revenue (Kim
model is evaluated as 99.2%. The performance metrics of 2013).
various machine learning implementation models are also Cloud computing is inspired by the Pay As You Go
compared & investigated using parameters like accuracy, (PYAG) concept, in which you only pay for the services
AUC, F1, precision, and recall. The results are represented you use (Subashini & Kavitha 2011). One of the most nota-
as confusion matrices. The outcome of this work will further ble benefits of the PAYG approach is that we can reduce our
usage by delivering specific assets as needed. Clients can
customize the operating system, memory, CPU, networking,
and access control to meet their own requirements. Assets
* Abhishek Sharma are delivered at the client’s or end-request user’s (Ku & Chiu
[email protected]
2013). Individual users as well as industry benefit greatly
Umesh Kumar Singh from cloud computing, which has attracted the attention of
[email protected]
researchers (Fotiou et al. 2015).
1
Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India The cloud services defined by XaaS and X = [S, P, I]
2
Vikram University, Ujjain, Ujjain, India and their use of internet task execution. Cloud enables the
Vol.:(0123456789)
Int J Syst Assur Eng Manag
resource sharing option to increase execution time and their servers (Sharma & Singh 2021a, 2021b). Authors
service availability (Gill et al., 2019). Cloud computing give a specific section on reliability and risk of complex
addresses resource scarcity concerns by delivering a vari- systems in (Misra & Verma, 2011), which is an attempt
ety of services tailored to the needs of clients (Buyya et al. to convey the state-of-the-art on new capabilities, meth-
2010), (Villegas et al. 2012) at multiple levels, such as Infra- odologies, implementations, strategies, and surveys per-
structure as a Service (IaaS), Platform as a Service (PaaS), taining to particular areas of reliability and risk analy-
and Software as a Service (SaaS). sis and management. The authors (Kansal et al., 2019)
Different applications are delivered over the cloud with- describe how to filter the most commonly seen vulner-
out having to be installed on the client’s machine. It allows ability type/class using a multi-criteria decision-making
developers and application designers to create applications approach called analytic network process, which involves
without having to purchase a server. It also provides vir- dependency among many criteria and input from various
tual instances of the actual hardware resources. All of these options. The concept of an automated deployment method
cloud services have the potential to reduce costs and pro- for computer program applications based on cloud com-
cessing power (Bermbach 2017), but they are all subject to puting is described in (Zhai et al., 2021). Computer serv-
security threats. Data breach is one of the most serious prob- ers typically reserve adequate resources for the highest
lems that a cooperative server can cause for both the tenant load in order to meet potential load situations, resulting
and the cloud service provider. Personal information (social in a significant reduction in resource use. Simultaneously,
security numbers, personal messages, credit card informa- the server load will be tracked in real time. In (Jaiswal
tion, and addresses) as well as commercial information could & Gupta 2017), the authors provide a plan that detects
be taken. In the existing scenario, the cloud consumer, which and addresses the system’s security vulnerabilities. It was
could be a service or data owner, must totally depend on the also suggested that potential risks to the cloud system be
service provider for information security and privacy (Basu identified first (Sharme et al, 2023), (Alzubi et al 2023),
et al. 2018). Users lose control of their data when it is kept and then algorithms implemented by existing systems be
on a cloud server, which leads to problems like data breaches assessed by calculating the security index to see if they can
(Mather et al. 2009). protect the system from the dangers indicated.
Security is the primary concern of the cloud computing Complex methods rely on the convergence of physi-
environment, and hence the security framework will guide cal and cyber or software components are known as CPSs.
both the cloud consumer as well as Cloud Service Provider CPS provides a diverse set of services. The number of CPS
about the clear perimeter of individuals and their shared deployed is steadily rising, posing a multitude of secu-
responsibility at each level. The cloud actors are able to rity and safety concerns. The concept and architecture of
simulate the proposed SRM based Cloud Computing secu- Cyber Physical Systems, explain the security objectives
rity framework either in there in-house or external cloud and difficulties of Cyber Physical Systems, and examine
environment for evaluation of the security parameters and the security risks and assaults of 3 levels of CPSs in this
compliance (Singh & Sharma, 2021). Identity management work (Sharma & Singh, 2022; Kumar & Vajpayee, 2016).
of cloud users is one of numerous challenges with cloud Cloud Computing is prone to manifold security threats
computing, including cloud user administration, multi-ten- varying from network level threats to application-level
dency support, and application security (Karthiban & Smys threats. Cloud network security brings out the taxonomy
2018). The major goal is to bring attention to the assurance of various types of cloud attacks that have occurred in the
concerns that are threatening cloud computing’s expansion. recent past, and it also lists out the successfully imple-
As a result, the aim of this research is to develop a taxonomy mented solutions to mitigate the risks (Sharma & Singh
of the security concerns that cloud environments face. This 2021c, 2022).
taxonomy is based on the identification of various security Here in this work introduction section includes the
vulnerabilities at various levels, as well as viable mitigation cloud computing issues and challenges. The second sec-
approaches for cloud applications security assurance. tion introduces the cloud computing security attacks which
As a service provider is accountable for accessibility also includes the application level attacks, traditional
and availability of various services, cost of maintenance attacks, wrapping attack and virtual machine (VM) based
entangled with it is negligible and clients remain free from attacks. The third section represents the literature review.
management and maintenance issues of resources at pro- The force action includes the proposed methodology
vider’s end. Because of these characteristics, Cloud Com- which starts with the experimental setup then the data sets
puting came to be called simply IT on demand or utility used attack scenarios and followed by the implementation
computing. A main significant feature of Cloud Comput- methodology. Within the fifth section the result analysis
ing is its Scalability and is attained via virtualization of is done through various graphs and tables followed by the
conclusion in the 6th section.
Int J Syst Assur Eng Manag
2 Cloud computing security attacks IP address in this circumstance. As a result, data ends up
in an undesired location. In comparison to cryptographic
A cloud computing attack is a malicious operation aimed approaches, a distributed anomaly detection system pro-
at causing harm to the cloud’s resources. Many researchers vides equivalent security and has a more acceptable adop-
have explored and investigated security problems (Lombardi tion route. In (Karlin et al. 2008), an analogous security
and Pietro 2011) and have provided a full description of scheme is detailed.
secure cloud infrastructure. This section discusses the basic
security attacks specified in taxonomy, as well as the avail- 2.1.4 Sniffer attack
able mitigation measures.
Intruders can collect data packets flowing over the network
using a variety of apps. It is possible to read data sent in an
2.1 Network level attacks unencrypted format. There is a chance that crucial informa-
tion travelling via the network will be intercepted or traced.
The machines that are operating within a cloud platform are Reusing IP addresses Attack. Sniffer detection platform
connected to the cloud platforms outside platform via a net- based on RTT (round trip time) and ARP (address resolu-
work. Over the network, an intruder might assault a system, tion protocol), which is used to find a sniffing structure on
thereby weakening cloud-based services and compromising the network (Chen et al. 2017).
data privacy. The following sections explain network-level
attacks. 2.1.5 Botnets
DDoS attack detection and sensing efficiency. In this sec- 2019) provide the best mathematical model for predicting
tion (Salmen et al. 2015), we’ve summarized a few recent the level of stakeholder satisfaction (Q) as part of their
studies on detecting DDoS attacks. work on software quality prediction, although security
Fadir Salmen (Liu & Chang et al., 2011) et al. devised concerns for cloud-specific applications have not yet been
and proposed a community-level digital signature to monitor resolved. In order to improve prediction accuracy, the
flow using two meta-heuristic methods. They demonstrated author of (Jain, Rachna et al., 2019) proposes an ensem-
improved accuracy by integrating random site visitors into ble learning technique that uses predictions from earlier
the detection of DDoS attacks to test the effectiveness of the supervised learning algorithms. However, this approach is
designed procedures, but the required model was unable to only applicable to life insurance datasets; it cannot be used
discover DOS attacks. Liu et al. (Eskin et al. 2002) used 2 with real-time datasets in a cloud computing environment.
coordinated protectors, Behavior Analyzer and Egress Filter, In addition to network security, researchers have expressed
to safeguard systems from DDoS cyber-attacks. Counter- a strong interest in applying machine learning and deep
attack strategies implemented provide various services for learning techniques to other healthcare and medical sec-
every application dependent on the degree of deviation. tors, including radiography, drug development, cancer
A standalone classification based on SVM is utilized to diagnosis, and medical data privacy (Jafar et al., 2022).
discover anomalies in (Dantas et al. 2014), where train-
ing data is charted within a specified characteristic space.
Various approaches have been used to mine relevant fea-
tures from a set of data, and then a few classifiers, like 4 Proposed methodology
pattern recognition, ML, and statistics, have been trained
using the data set section. Adaptive Selective Verification For investigating the security risks in terms of threads
(ASV) is a hosted protection solution that protects against and identification of intrusion during the runtime, an inte-
HTTP POST Flooding attacks, according to Dantas Y et al. grated approach is implemented using multiple machine
(Vijayalakshmi et al. 2012). Because ASV is designed to learning algorithms simultaneously. Before implementa-
prevent DDoS attacks at the network layer, it assumes that tion, it is required to collect the data from the memory
interactions between server and consumer stateless syn- dump and log files and prepare various data sets. Then
ack connections are ongoing. However, such attempts are the data sets are preprocessed using multiple methods to
insufficient as a mechanism for preventing DDoS attacks prevent under and out fitting. During the preprocessing of
at the Application Layer. To protect against DDoS attacks, the data set the correlation among the various features are
many systems involving machine learning and data mining required to find out so that it will be free from the outliers.
have been implemented. Alkasassbeh et al. (Salmen et al.
2015)) looked at 27 features in numbers in a recent batch 4.1 Experimental setup
of data for present DDOS attacks in network layers, which
included (HTTP, SIDDOS) Flood. The work focused on The experimental setup is implemented using Jupyter note-
the relative evaluation of several classifiers used inside a book which is deployed over the Google Cloud. Using this
pool and the calculation of the evaluation matrix for each platform, the algorithm is implemented using python with
method used. This notion encompasses Naive Bayes, MLP, various machine learning libraries and packages. Before
and machine learning, which are all typical Random For- implementation of ML algorithms, the ISOT data set is pre-
est mechanisms. MLPs had the greatest accuracy rate of processed by implementing the various steps. The processed
98.63 percent out of all these concepts and techniques (Liu ISOT data set is then imported and visualized using python
& Chang et al., 2011). The authors (Vijayakumar et al., & Jupyter notebook. Due to the large size of the data set,
2022) propose the Evolutionary Optimization Algorithm Google Cloud platform is used here for implementation of
for Cloud Based Image Retrieval System (EOA-CIRS) the proposed methodology. Following is the configuration
method, whereas the author of (Priscila, 2022) explored of Google Cloud virtual machine used as an experimental
risk-Based access control mechanisms for the Internet of setup:
Vehicles utilizing artificial intelligence. Platform: Google Cloud Platform (GPU based).
The authors demonstrate that machine learning-based Region & Zone: asia-southeast1-a(Singapore).
intrusion detection systems perform well in contexts of fog Machine-Type: n1-standard-8 (8 vCPUs with 30 GB
and edge computing (Alzubi et al. 2022a, b). Omar Alzubi memory).
et al. (2022a, b) developed edge concepts including mobile CPU platform: Intel-Broadwell.
edge computing (MEC) and fog computing (FC) to address Disk Size: 100 GB.
IoT implementation issues. The authors of (Gheisari et al OS:Debian.
Environment:Python 3 (with Intel® MKL).
Int J Syst Assur Eng Manag
Table 1 Phase vice monitored packets Details This is critical for the development and evaluation of truthful
Phase No. of days Total packets Benign Malicious
intrusion prototypes for cloud computing by industry and
/ phase observed (logged) research (Aldribi, 2018; Aldribi, 2020). The details of phase
vice monitored packets is represented in Table 1:
1 4 24,519,987 15,306,027 9,213,960
To avoid the problem of overfitting and to eliminate outli-
(62.42%) (37.58%)
ers, the characteristics of 55,379 packets are used as a train-
2 5 12,418,998 9,770,676 2,648,322
(78.68%) (21.32%) ing and testing dataset for machine learning algorithms for
intrusion detection.
Application Layer HTTP Flood DOS, Dictionary/Brute Force login attacks, Web Vulnerabilities Scanning, Cross-site scripting (XSS),
Network Scanning, SQL injection, Fuzzers, HTTP Flood DOS
Network Layer DNS Amplification DOS, Synflood DOS, UDP Flood DOS, Path/directory traversal, DNS Amplification DOS, Network
Probing, Backdoor (reverse shell), Remote-to-Local (R2L), Scanning, Synflood DOS, UDP Flood DOS, Unclassified
Network Scanning, Trojan Horse, Unclassified (unsolicited (unsolicited traffic)
traffic)
Int J Syst Assur Eng Manag
b) Represent the gathered data into csv format. feature space having highest value at the SV and uniform
decay in all dimensions around the SV, resulting in hyper-
Result: ISOT-CID data set csv files. spherical edges of the kernel function. The Gaussian or RBF
Step -2: Data Preprocessing kernel is:
( )
a) Digitalize all the features of the dataset using numeric ||x − y||2
K(x, y) = EXP −
values. 2𝜎 2
b) Define & declare the target feature within the proposed
Here, ||x–y|| represents the Euclidean distance. The lin-
dataset.
ear weighted arrangement of the kernel function generated
c) Fill up the missing parameters of the dataset by finding
within a data point and every SV is the SVM classifier hav-
‘mode’ of the respective feature.
ing Gaussian kernel. The importance of a SV in data point
d) Find the Pearson Correlation coefficient of all the pairs
categorization is tempered by the SV’s global prediction
of features using following expression:
utility, and K(x,y), the SV’s local influence on prediction at
n(Σxy) − (Σx)(Σy) a specific data point.
R= √
(nΣx2 − (Σx)2 )(nΣy2 − (Σy)2 ) b) Implement Random Forest, logistic regression, KNN,
Naive Bayes algorithms of the same dataset.
Where R is Pearson correlation coefficient between x c) Evaluate all the supervised classification algorithms or
and y, n is number of observations. models with respective performance matrices.
e) Identify the features on the basis of correlation threshold Results: Performance Matrix content accuracy, F1, Preci-
value. sion & recall.
f) Find the outliers and discard them.
Fig. 2 a Correlation of selected feature pairs b Heat Map respective to outliers
set. The comparison of implemented models on the basis The whole experiment and implementation is carried out
of 5 parameters like AUC, CA, precision all, recall & F1 is on the Google cloud platform using GPU based VM. The
performed as presented in the following table: performance of the execution was recorded & is as follows:
Now, it is clear from the above table that the random for-
est, ANN and kNN algorithm has 100% accuracy, precision 1) Training Time: 4.32 s
and other performance parameters. As far as the training 2) CPU utilization: 12.41% (maximum)
time is concerned, the support vector machine (SVM) is hav- 3) Memory utilization:4.63% (maximum)
ing the best performance (4.32 s) among all of them & as 4) Disk Space utilization: 9.58% (maximum)
compared to previous implementation (Liu & Chang et al., 5) Disk Throughput: 1.66 MB/S
2011). As compared to the previous implemented algorithms 6) Model execution Parallelism: Yes
which was having the accuracy rate of 97% (Liu & Chang
et al., 2011) for RF, less than 90% (Dantas et al. 2014) for
RF, 99.1% for FCM–SVM (Patel et al. 2013), 98.63% for
Naive Bayes & ANN [(Lua, 2011), the proposed method is 6 Conclusion
having better performance with respect to all the five param-
eters represented in Table 3.The following figure 4 represent The cloud paradigm has changed the IT sector. For busi-
ROC curve and Cumulative gains (Lift Curve with Convex nesses and organizations, it offers a variety of advan-
hull) of implemented models: tages. Even while the cloud offers many benefits, it’s still
Int J Syst Assur Eng Manag
security vulnerable. Therefore, one of the biggest obstacles algorithms abstracted also including support vector machine
to adopting the cloud is security. Customers and vendors (SVM), random forest (RF), logistic regression (LR), Naive
are aware of security problems and assaults. The adoption Bayes (NB), artificial neural network (ANN), and K-nearest
of cloud computing is being hampered by a number of Neighbor (kNN). Training and testing of data were carried
problems, threats, and security vulnerabilities that have out using various supervised ML algorithms or Models in
been shown by this research. As a result of the special which multiple attacks variations are involved were detected
characteristics of the cloud, security problems with virtu- & analysis as a risk. The algorithms & models could detect
alization, resource pooling, and sharing arise. According attack with 99.2% accuracy in case of SVM and with 100%
to provider security concerns, a variety of cloud security in case of Random forest, ANN & kNN. Thus, SVM can be
problems and assaults are analyzed. (Figure 4) used effectively to detect intrusion in real-time networks.
The work presented in this paper can help better under- Various machine learning algorithms can also be applied in
stand the various threats and security issues connected to parallel for sensing and detecting attack, however amongst
Cloud Computing and used to design countermeasures to these SVM, Naive Bayes, ensemble methods, logistic regres-
an existing set of threats. In this work, the intrusion detec- sion algorithm over Machine learning had proved to produce
tion was performed using the most recent ISOT-CID data- efficient outcome.
set. The dataset was preprocessed by choosing 10 attributes As a future work multiple classification algorithms &
based on their correlation & significance. To detect and models can be implemented as an integrated approach at real
categorize intrusions in a cloud environment, the meth- time, to perform zero-day protection. It can be further useful
odology utilizes a variety of supervised machine learning for the taxonomy development of attacks. Due to successful
Int J Syst Assur Eng Manag
Fig. 4 a ROC Curve of implemented model b Cumulative gains (Lift Curve with Convex hull) of supervised model implemented
identification & classification of attacks as a risk, it will Funding They have no known competing financial interests or per-
assist & help the Cloud security administrator for prioritiza- sonal relationships that could have appeared to influence the work
reported in this paper. This research did not receive any specific grant
tion & mitigation plan development. from funding agencies in the public, commercial, or not-for-profit
sectors.
Int J Syst Assur Eng Manag
Kim W (2013) Cloud computing architecture. Int J Web Grid Serv Sharma A, & Singh UK (2021b). Deployment model of e-educational
9(3):287–303. https://doi.org/10.1504/IJWGS.2013.055724 cloud for departmental academics automation using open source.
Kourai K, Azumi T, & Chiba S. (2012). A self-protection mechanism HTL Journal, 27(5, 36), ISSN 1006–6748. https://doi.org/10.
against stepping-stone attacks for IaaS clouds. In Ubiquitous 37896/HTL27.5/3535
intelligence and computing and9th International Conference on Sharma A, Singh UK et al. (2021c). ‘A Comparative analysis of secu-
Autonomic and Trusted Computing (UIC/ATC) 9th International rity issues and vulnerabilities of leading Cloud Service Providers
Conference on, 2012 (pp. 539–546). and in-house University Cloud platform for hosting E-Educational
Ku C-Y, & Chiu Y-S. (2013). A novel infrastructure for data sanitiza- applications,’ IEEE Mysore Sub Section International Conference
tion in cloud computing [Research paper], in Diversity. Technol- (MysuruCon), ISBN 978–0–7381–4662–1.
ogy, and innovation for operational competitiveness. Proceedings Sharma A, Singh UK (2022) Modelling of smart risk assessment
of the 2013 International Conference on Technology Innovation approach for cloud computing environment using AI & supervised
and Industrial Management p. S3_25–28. machine learning algorithms. Global Trans Proc 3(1):243–250
Kumar SN, Vajpayee A (2016) A survey on secure cloud: Security and Sharma A, Singh UK et al. (2023) Security and Privacy aspect of
privacy in cloud computing. Am J Syst Softw 4(1):14–26 Cyber-Physical Systems. In A. Baliyan(Ed.), Cyber Physical
Lin W, & Lee D (2012). Traceback attacks in cloud-Pebbletrace botnet. system: Concept and application. CRC Press Taylor & Francis
In Distributed Computing Systems Workshops (ICDCSW)32nd Group, 1st ed.,Chapman and Hall/CRC. https://doi.org/10.1201/
International Conference on, 2012 (pp. 417–426). 9781003220664-9
Liu HI, & Chang KC. (2011). Defending systems against tilt DDoS Siddiqui ST, Alam S, Shuaib M, Gupta A (2019) Cloud computing
attacks. In 6th International Conference on Telecommunication security using blockchain. J Emerg Technol Innovative Res
Systems, Services, and Applications (TSSA), 2011 (pp. 22–27). 6(6):791–794
IEEE Publications. Singh UK, Sharma A (2021) Cloud Computing Security Framework
Liu A, Yuan Y, Wijesekera D, &Stavrou A (2009). SQLProb: A proxy- Based on Shared Responsibility Models. In: Bali V, Bhatnagar
based architecture towards preventing SQL injection attacks. In V, Aggarwal D, Bali S, Diván MJ (eds) Cyber-Physical, IoT, and
Proceedings of the 2009 ACM Symposium on Applied Computing Autonomous Systems in Industry 4.0. CRC Press, Boca Raton, pp
(pp. 2054–2061). 39–55. https://doi.org/10.1201/9781003146711-3
Lombardi F, Di Pietro R (2011) Secure virtualization for cloud comput- Singh UK, Sharma A, Singh SK, Tomar PS, Dixit K, Upreti K (2022)
ing. J Netw Comput Appl 34(4):1113–1122. https://doi.org/10. Security and Privacy Aspect of Cyber Physical Systems. In: Bali-
1016/j.jnca.2010.06.008 yan A, Kaswan KS, Kumar N, Upreti K, Kannan R (eds) Cyber
Lua R, Yow KC (2011) Mitigating ddos attacks with transparent and Physical Systems: Concepts and Applications. Chapman and Hall/
intelligent fast-flux swarm network. IEEE Network 25(4):28–33. CRC, Boca Raton, pp 141–164. https://doi.org/10.1201/97810
https://doi.org/10.1109/MNET.2011.5958005 03220664-9
Luo S, Lin Z, Chen X, Yang, Z, & Chen J. (2011). Virtualization secu- Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS
rity for cloud computing service. In Cloud and service computing attacks in cloud computing: Issues, taxonomy, and future direc-
(CSC)International Conference on, 2011 (pp. 174–179). tions. Comput Commun 107:30–48. https://doi.org/10.1016/j.
Mather T, Kumaraswamy S, &Latif S (2009) Cloud security and pri- comcom.2017.03.010
vacy: An enterprise perspective on risks and compliance. O‘Reilly Sridhar S, &Smys S (2016). A survey on cloud security issues and
Media, 2009. challenges with possible measures. In International Conference
Mell, P., &Grance, T. (2011). ―The NIST definition of cloud on Inventive Research in Engineering and Technology, 4.
computing. Subashini S, Kavitha V (2011) A survey on security issues in ser-
Misra KB, Verma AK (2011) Special Section on reliability and risk vice delivery models of cloud computing. J Netw Comput Appl
assessment of complex systems. IEEE Trans Reliab 60(1):59–60. 34(1):1–11. https://doi.org/10.1016/j.jnca.2010.07.006
https://doi.org/10.1109/TR.2011.2110210 TerLouw M, &Venkatakrishnan VN. (2009). ―Blueprint: Robust
Nister D, &Stewenius H (2006). Scalable recognition with a vocabulary prevention of cross-site scripting attacks for existing browsers.
tree. In Computer vision and pattern recognitionIEEE computer In Security and Privacy30th IEEE Symposium on, 2009 (pp.
society conference on, 2 (pp. 2161–2168). 331–346).
Patel A, Taghavi M, Bakhtiyari K, CelestinoJúnior J (2013) An intru- Vieira K, Schulter A, Westphall C, Westphall C (2010) Intrusion detec-
sion detection and prevention system in cloud computing: a sys- tion techniques in grid and cloud computing environment. IT Prof
tematic review. J Netw Comput Appl 36(1):25–41. https://d oi.o rg/ IEEE Comput Società 12(4):38–43
10.1016/j.jnca.2012.08.007 T. Vijayakumar K, Ramalakshmi C, Priyadharsini S, Vasanthakumar
Rani M (2019) A review of intrusion detection system in cloud com- S, and Sharma A,(2022) Bio-Inspired Optimization Algorithm on
puting. SSRN Electron J. https://doi.org/10.2139/ssrn.3355127 Cloud based Image Retrieval System using Deep Features," 2022
Riquet D, Grimaud G, & Hauspie M (2012). Large-scale coordinated International Conference on Augmented Intelligence and Sustain-
attacks: Impact on the cloud security. In Innovative mobile and able Systems (ICAISS), Trichy, India, 2022, pp. 871–876, https://
Internet services in ubiquitous computing (IMIS)Sixth Interna- doi.org/10.1109/ICAISS55157.2022.10010739.
tional Conference on, 2012 (pp. 558–563). Vijayalakshmi M, Shalinie SM, &Pragash AA. (2012). IP traceback
Salmen F, Hernandes P, Carvalho L, &Proenca M (2015). Using firefly system for network and application layer attacks. In International
and genetic metaheuristics for anomaly detection based on net- Conference on Recent Trends in Information Technology, (pp.
work flows. In Proceedings of the 11th Advanced International 439–444). IEEE Publications.
Conference on Telecommunications (pp. 113–118). Villegas D, Bobroff N, Rodero I, Delgado J, Liu Y, Devarakonda A,
Scarfone K, Mell P (2007) Guide to intrusion detection and prevention Fong L, MasoudSadjadi S, Parashar M (2012) Cloud federation
systems (idps). NIST Spec Publ 800(2007):94 in a layered service model. J Comput Syst Sci 78(5):1330–1344.
Sharma A, & Singh UK (2021a). Investigation of cloud computing https://doi.org/10.1016/j.jcss.2011.12.017
security issues and challenges, 3rd International Conference on Wu H, Ding Y, Winer C, & Yao L (2010). Network security for virtual
Integrated Intelligent Computing Communication and Security machine in cloud computing. In Computer Sciences and Conver-
(ICIIC), 2021. https://doi.org/10.2991/ahis.k.210913.055 gence Information Technology (ICCIT) 5th International Confer-
ence on, 2010 (pp. 18–21).
Int J Syst Assur Eng Manag
Zaidi, T. (2021), A network intrusion based detection system for cloud Publisher’s Note Springer Nature remains neutral with regard to
computing environment. Preprints. https://d oi.o rg/1 0.2 0944/p repr jurisdictional claims in published maps and institutional affiliations.
ints202104.0183.v1
Zhai H, Wang J (2021) Automatic deployment system of computer Springer Nature or its licensor (e.g. a society or other partner) holds
program application based on cloud computing. Int J Syst exclusive rights to this article under a publishing agreement with the
Assur Eng Manag 12(4):731–740. https:// d oi. o rg/ 1 0. 1 007/ author(s) or other rightsholder(s); author self-archiving of the accepted
s13198-021-01068-0 manuscript version of this article is solely governed by the terms of
Priscila S (2022) Risk-Based Access Control Mechanism for Internet of such publishing agreement and applicable law.
Vehicles Using Artificial Intelligence. Security and Communica-
tion Networks 2022:1-13 https://doi.org/10.1155/2022/3379843