Refine Search

New Search

Results: 4

(searched for: doi:10.17762/ijritcc2321-8169.1504133)
Save to Scifeed
Page of 1
Articles per Page
by
Show export options
  Select all
Umer Ahmed Butt, , Muhammad Mehmood, Hamza Aldabbas, Mafawez T. Alharbi, Nasser Albaqami
Wireless Personal Communications, Volume 128, pp 387-413; https://doi.org/10.1007/s11277-022-09960-z

The publisher has not yet granted permission to display this abstract.
Published: 26 August 2020
by MDPI
Journal: Electronics
Abstract:
Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users. CC recently has emerged as a set of public and private datacenters that offers the client a single platform across the Internet. Edge computing is an evolving computing paradigm that brings computation and information storage nearer to the end-users to improve response times and spare transmission capacity. Mobile CC (MCC) uses distributed computing to convey applications to cell phones. However, CC and edge computing have security challenges, including vulnerability for clients and association acknowledgment, that delay the rapid adoption of computing models. Machine learning (ML) is the investigation of computer algorithms that improve naturally through experience. In this review paper, we present an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms. We review different ML algorithms that are used to overcome the cloud security issues including supervised, unsupervised, semi-supervised, and reinforcement learning. Then, we compare the performance of each technique based on their features, advantages, and disadvantages. Moreover, we enlist future research directions to secure CC models.
Lubna Alhenaki, Alaa Alwatban, Bashaer Alamri, Noof Alarifi
Abstract:
Within the recent decade, major innovations in technology have emerged, that potentially add more convenience to daily life practices not only on an enterprise level but on an individual level as well. Cloud Computing technology has witnessed significant advances in its implementation and become widely adopted by either private or public sectors. It was obvious recently that a lot of organizations and enterprises are transferring their workloads to the cloud. However, security is a major concern for the cloud computing services which is based on Internet connection that makes it vulnerable to multiple types of attacks. Even though that the security measures implemented over cloud computing are developing every passing year, Security still a challenge. In this paper, we conducted a survey study on cloud computing and addressed different types of attacks and possible threats to this emerging technology, as well as protection methods and existing solutions to such attacks.
Page of 1
Articles per Page
by
Show export options
  Select all
Back to Top Top