Results: 4
(searched for: doi:10.17762/ijritcc2321-8169.1504133)
Published: 1 November 2022
by
Elsevier BV
Journal of King Saud University - Computer and Information Sciences, Volume 34, pp 9102-9131; https://doi.org/10.1016/j.jksuci.2022.08.035
Published: 19 September 2022
Journal: Wireless Personal Communications
Wireless Personal Communications, Volume 128, pp 387-413; https://doi.org/10.1007/s11277-022-09960-z
The publisher has not yet granted permission to display this abstract.
Electronics, Volume 9; https://doi.org/10.3390/electronics9091379
Abstract:
Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users. CC recently has emerged as a set of public and private datacenters that offers the client a single platform across the Internet. Edge computing is an evolving computing paradigm that brings computation and information storage nearer to the end-users to improve response times and spare transmission capacity. Mobile CC (MCC) uses distributed computing to convey applications to cell phones. However, CC and edge computing have security challenges, including vulnerability for clients and association acknowledgment, that delay the rapid adoption of computing models. Machine learning (ML) is the investigation of computer algorithms that improve naturally through experience. In this review paper, we present an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms. We review different ML algorithms that are used to overcome the cloud security issues including supervised, unsupervised, semi-supervised, and reinforcement learning. Then, we compare the performance of each technique based on their features, advantages, and disadvantages. Moreover, we enlist future research directions to secure CC models.
Published: 1 May 2019
Abstract:
Within the recent decade, major innovations in technology have emerged, that potentially add more convenience to daily life practices not only on an enterprise level but on an individual level as well. Cloud Computing technology has witnessed significant advances in its implementation and become widely adopted by either private or public sectors. It was obvious recently that a lot of organizations and enterprises are transferring their workloads to the cloud. However, security is a major concern for the cloud computing services which is based on Internet connection that makes it vulnerable to multiple types of attacks. Even though that the security measures implemented over cloud computing are developing every passing year, Security still a challenge. In this paper, we conducted a survey study on cloud computing and addressed different types of attacks and possible threats to this emerging technology, as well as protection methods and existing solutions to such attacks.