A Review of Machine Learning Algorithms for Cloud Computing Security
Open Access
- 26 August 2020
- journal article
- review article
- Published by MDPI AG in Electronics
- Vol. 9 (9), 1379
- https://doi.org/10.3390/electronics9091379
Abstract
Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users. CC recently has emerged as a set of public and private datacenters that offers the client a single platform across the Internet. Edge computing is an evolving computing paradigm that brings computation and information storage nearer to the end-users to improve response times and spare transmission capacity. Mobile CC (MCC) uses distributed computing to convey applications to cell phones. However, CC and edge computing have security challenges, including vulnerability for clients and association acknowledgment, that delay the rapid adoption of computing models. Machine learning (ML) is the investigation of computer algorithms that improve naturally through experience. In this review paper, we present an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms. We review different ML algorithms that are used to overcome the cloud security issues including supervised, unsupervised, semi-supervised, and reinforcement learning. Then, we compare the performance of each technique based on their features, advantages, and disadvantages. Moreover, we enlist future research directions to secure CC models.Keywords
This publication has 51 references indexed in Scilit:
- A survey of security issues for cloud computingJournal of Network and Computer Applications, 2016
- Cloud Computing - Current Status and Future DirectionsJournal of Information Processing, 2016
- Security Threats Analysis and Considerations for Internet of ThingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Security Threats of Cloud ComputingInternational Journal on Recent and Innovation Trends in Computing and Communication, 2015
- A survey on top security threats in cloud computingInternational Journal of Advanced Computer Science and Applications, 2015
- Cloud Computing: Security IssuesInternational Journal of Computer and Communication Engineering, 2014
- Dimensions Of Security Threats In Cloud Computing: A Case StudyReview of Business Information Systems (RBIS), 2013
- A survey on security issues and solutions at different layers of Cloud computingThe Journal of Supercomputing, 2012
- On Cloud Computing Security IssuesLecture Notes in Computer Science, 2012
- A survey on security issues in service delivery models of cloud computingJournal of Network and Computer Applications, 2011