You are on page 1of 10

Soft Computing

https://doi.org/10.1007/s00500-020-05122-0 (0123456789().,-volV)(0123456789().
,- volV)

METHODOLOGIES AND APPLICATION

Enhancing cloud security using crypto-deep neural network for privacy


preservation in trusted environment
P. Abirami1 • S. Vijay Bhanu1

 Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract
The users in communication interact over cloud for data exchange. The participants are in various levels, and their
expectation varies on the nature of interactions. Though building a common platform for interactions over cloud envi-
ronment is difficult, there is scope for developing security solutions that can ensure confidentiality of data exchange. In the
proposed model distributed secure outsourcing scheme is enhanced using crypto-deep neural network. The proposed model
has cloud server, web server, data center and cloud agent. The model mainly targets in handling impersonation attack using
crypto-deep neural network cloud security (CDNNCS). The proposed framework is suitable for enhancing the level of trust
among cloud users in comparison to secure linear algebraic equation scheme. The performance has been presented in terms
of parameters namely Delay, Jitter, Throughput and Goodput. From the results it can be observed that with CDNNCS
packet loss has been reduced by 10% and the response time has been increased by 5% in comparison to existing approach.

Keywords Cloud  Security  Linear algebraic equation  Neural network

1 Introduction • Power expand min–max and minimization migrations


• Highest potential growth
Cloud can be considered as a virtual hosting environment
They differ in the energy models, cluster formation and
with the behavior of scalability and elasticity on the fly.
node communication mechanism. Fine tuning the optimal
Cloud is broadly categories into three as private, public and
parameters is the key focus for formulating the algorithm in
community category. In general, cloud offerings are
the paper. This research paper aims at proposing solution
infrastructure as a service, platform as a service and soft-
for enhancing security aspects in cloud environment, by
ware as a service.
using a crypto-deep neural network.
1.1 Energy aspects of cloud computing
2 Related works
Energy is related to the access aspects of cloud computing.
The access is related to the infrastructure and type of
Cloud security is a broad spectrum and presents many
operations by cloud users. Most popular algorithms are the
challenges. However, in this paper, the paper outlines
following:
addressing approaches, Quality of Service parameters,
• Maximum bin packing Deep learning approach and its related challenges in cloud
environment.
Communicated by V. Loia.
2.1 Cloud service addressing
& P. Abirami
abiramipadmanaban.research@gmail.com Kritikos and Plexousakis (2015) in their paper present a
S. Vijay Bhanu multiple cloud-based application tool that can do the better
svbhanu22@gmail.com cloud service composition on the basis of the user
1
Department of Computer Science and Engineering,
requirements. This design approach could be able to do
Annamalai University, Chidambaram, India various types of cloud services at the same time. The

123
P. Abirami, S. V. Bhanu

above-mentioned simultaneous approach is not seen in the approaches. VerifyNet is the approach given in the paper,
previous cloud service designs. The approach includes where it guarantees the privacy. Data set used is the real-
quality, security, deployment, placement and the cost world data for the approach. The performance parameters
requirements concurrently. The parameters used for the for the analysis of the proposed method is Classification
approach are QoS, cost, utility function, availability. accuracy, verification accuracy, functionality, performance
Average solving time is the parameter used for the analysis of the analysis of client and server. The communication
of the result. Performance wise and stability wise the overhead of the entire protocol is one of the disadvantages
approach has to be improved. The above approach has not found in the proposed method.
yet been integrated with the cloud service solution to Kwabena et al. (2019) proposed MSCryptoNet as state-
provide it for multi cloud applications. of-the-art neural network to the MSCryptoNet models in
Dynamic data driven cloud systems (DDDCS) is a cloud the privacy-conserving setting. Deals with the encryption
servicing approach proposed by Shekhar (2016). This and minimization of communication and computational
method deals with the challenges faced by the IOT appli- costs. The performance evaluation is based on accuracy,
cations in the cloud. Approach works as, by using the runtime and data transfer. The proposed method gives
appropriate cloud resources the method could adapt itself better results in all the three approaches compared with the
to the varying requirements. This continuously enhances existing ones.
the infrastructure of the cloud. This is applied and tested in Packets can be inspected with artificial neural network-
various IOT and smart city transportations. The major based approach for training the network of packet inspector
parameters considered are networking latency, computa- by Yoon (2019) provides the characterization of the IoT
tional needs and timeliness. Distributed algorithms and attacks and for each attack formation of neural network
distributed cloud-based systems have to be used for the nodes. The method detects and prevents the attacking
approach. packages. Time and error rate and the major two perfor-
A unified monitoring and management framework mance comparison methods of this model. With the com-
developed by Zhao et al. (2016). In their approach this parison of the other models this shows better results. The
method consists of 4 components which includes a moni- Raspberry—Pi is used as the network service to serve only
toring application, a compiler, an executable engine and a the IoT devices.
runtime. Totally this approach provides better management A decentralized block-chain-based prediction as a ser-
services and integrated monitoring for cloud and services. vice method, proposed by Santhosh et al. (2019) in their
The read and write performances with some databases like paper gives some counter measures to some attacks by
MYSQL and HBase are used for the assessment of the executing deep neural network models. The system per-
approach and also the proposed model is compared with formance is produced with the response time and changes
other 3 more already existing models for the performance, while during the varying complexity are the trainable
functioning and agility. The limitation of the method is parameters. In both decentralized and centralized servers
only the fundamental model is developed and still the other the experiments are done. Model extraction attacks are still
services are yet to be covered. an ongoing issue for the above-mentioned method. It
Khasnabish et al. (2017) proposed a Tier-centric Busi- cannot deal with multiple attacks at a single time.
ness and Cost Analysis (T-BICA), a tier-centric optimal In this approach, Hesamifard et al. (2019) proposed to
resource allocation algorithm, as a solution for rapid pur- use convolutional neural network over the data that is
veying of the IT resources in the modern enterprise cloud encrypted. This can help in dealing with the privacy-pre-
environment. This method and analytic lessens the cost by serving classification in a Machine Learning as a Service
65.19%, and performance increased by 74.18% with cloud (MLaaS). The performance of the system is evaluated at
provisioning. Efficiency of utilization is also increased by each step. The MNIST optical character recognition is
the above-mentioned approach. The method analyzes the applied and achieved a result with an accuracy of 99.25%.
cpu usage and the storage consumption with the other The accuracy, running time, data transfer and predictions
approaches as the parameters for comparison. The cost and are the major analysis parameters used in the approach.
time are the other major parameters considered for the The current system deals with the simple data and privacy
analysis. preserving training of the deep neural networks is not
mentioned.
2.2 Deep learning
2.3 Hierarchical agent-based method
Xu et al. (2020) considers the issues like user’s privacy and
the correctness of the results from the server side. The A hierarchical agent-based method proposed by Farah-
given approach helps in solving the above-mentioned two nakian et al. (2014), where according to the resources

123
Enhancing cloud security using crypto-deep neural network for privacy preservation…

multiple agents work together to reduce the active physical could give a healthy and proper service for the users.
machines. The result shows that it can reduce energy Response time from the server to the number of requests is
consumption, without any reduction in the quality. The used for the analysis of the methodology. Although proper
performance evaluation is done based on Average SLA results are produced there are chances of getting abnormal
Violation Percentage and energy consumption. The method behavior over various places while using the algorithm is
is just only compared with the three benchmark algorithms spotted. The system complexity is also a bit high because
in cloudSim. of the application running over several servers.
Han and Stroulia (2014) analyzed hierarchical clouds.
Spatiotemporal data is analyzed with HBase with aggre- 2.4 QoS and cloud security
gation. An aggregation-based approach is presented for a
cloud environment. Two key elements proposed by Hammami et al. (2012) are
Marrero-Almonte et al. (2015) proposed a conceptual- ubiquitous services in service-oriented architecture and the
ized approach with hierarchical model. In this approach, second one considers QoS management that has security
they provide content integration and various business aspects on the basis of Event Driven Architecture. The
models on the basis of cloud and ITS ecosystem are gen- major components considered in the approach are avail-
erated. This provides the benefit of scalability, reliability ability, capacity, reliability and delay. The method is a
and elasticity on the resources that are shared. Flexibility in better approach for cloud user requirements and also can
the cloud services are the other benefit for the method. face major security attacks (Karunakaran 2019).
Al-Rayis and Kurdi (2013) in their paper provides a Security is one of the major issues faced in the cloud. In
bridging gap between 3 load balancing architectures hier- their paper Sarma et al. (2017) proposed the model for
archical, decentralized, centralized load balancers. Cloud handling the insecurities and also the performance is also
delivery models, service type, cloud deployment, applica- much better. KNN algorithm is the major one used in their
tion type, model Simulation time, Number of servers, cli- approach. The classifier QoS mentioned in the paper pro-
ents, load balancers are the parameters used in the vides significant performance and cost improvements for
approach. Private and hybrid clouds are not yet considered the overall mechanism.
in the given approach. Kahvazadeh et al. (2019) in their paper used decoupled
A light-weight and the most scalable hierarchical-MVC transversal security strategy (DCF) with a novel architec-
architecture for the Web application development in a tural-oriented policy contending the QoS-Security trade-off
Cloud environment proposed by Ma et al. (2019) that The major steps involved in their method are authentication
supports application structure and feature-based modular- phase, key distribution and management, service request
ization. Proposed methods provide maintainability and assignment and execution. The major target is to analyze
scalability in both the front and back end components. The the consequence of adding certainty QoS for a F2C system.
maintenance components are not yet developed in this The parameters for the analysis include the number of
proposed architecture. blocking per service request. The proposed method is not
Data mining for K-means approach is a successful capable of supporting CAU dynamic collaborative
approach developed by Nair and Madhuri (2011). Hierar- scenarios.
chical virtual K-means is the algorithm they have used with Xu et al. (2018) proposed a Sos-driven approach for
Euclidean Distance Formula for the distance measurement. cloud service and security. The CCS with hidden Markov
The results produced homogenous data spread over various model that gathers certainty factors such as malicious
data centers and machines in the cloud. attacks and also the safety protection mechanism is taken
To access the existing component libraries is very dif- with a hierarchical model is proposed to build the flexible
ficult and also it faces infrastructure supply and mainte- connection between service execution and reliability. The
nance challenges. Junwei et al. (2011) in their paper parameter values for the security mechanisms are intensity
proposed a cloud computing model that resolved the of a reliable mechanism, existing probability of VM, state
above-mentioned issues. A hierarchical component model transition probability and mean sojourn time. Service rate
is introduced for this. A component library retrieval and average completing rate are the analysis parameters.
framework can improve the scalability and performance of The service-oriented computing method is not much sup-
the system. The running time of various file sizes with the ported by this approach.
corresponding document size is used for the analysis of the To those who consider adopting cloud storage service
results. This is not much of a cost efficient system. (CSS) for data access, cost, security, and production are the
Currie et al. (2014) in their paper proposed a cloud- problems faced by the users. Su and Dai (2017) proposed
based approach with problem solving. The conflicts on QoS-aware Distributed Cloud Storage Service (QDCSS)
resource allocations are a common thing. So the monitoring that targets to supply users using appropriate CSS in

123
P. Abirami, S. V. Bhanu

accordance with their quality of service (QoS). This security-SLA evaluation is not attained in this approach.
includes problem formulation, solution reduction, QDCSS- From the study it can be concluded that there is scope for
optimization and QDCSS-Approximation. Data back top improvement in the following findings:
and data sharing are not much supported in this approach.
(i) Improving security in node authentication process
Frey et al. (2014) proposed the scaling of cloud QoS
(ii) Anonymous certificate generation and verification
using fuzzy logic. In their method we can optimize a cloud
against impersonation attacks
service with additional imprecise information, pattered
(iii) Applying crypto-deep neural network to maintain
with fuzzy logic and can be used in a conduct, load and the
the data secrecy
execution predictive prototype. Fuzzy rule set is an
(iv) Deep learning with hyperparameter tuning will
important component mentioned in their paper. The results
improve the trust of users in the network.
show that the responding time and the SLA threshold are
better retained. The violations of the SLA are also very
less. But there is no space for mentioning the imprecise 2.5 Motivation
information input.
Chen and Zhu (2017) in their approach contract theory Cloud computing is related to access of data and information
developed a framework that combines cyber-physical in a open access environment (Raj and Smys 2019). There is
coatings of the Internet of Controlled things. The device large scope for users trying to access the data in open envi-
plans a menu of contracts for a better compatible and ronment. This becomes largely difficulty in current situa-
reliable service. This method is a capable cloud induced tions of access to services in a remote manner. As the number
framework that imparts a methodical approach to remove of users increases, the nodes have constraint in terms of
over-sight of the physical systems. The major parameters in resources and security. Providing a framework with algo-
the evaluation of this method are quality control with the rithms considering the security aspects using deep learning is
cloud quality. The paper is limited to only symmetric the main focus of the work. The work can be applied for
information and intermittent cloud service providers and health care in the following directions (IBM 2020):
also the security between the cyber-level and physical layer
(a) The patient data as it is stored and accessed in open
is less. The broad category of cryptographic algorithms is
environment
presented below in Fig. 1 (Wahid et al. 2018):
(b) Access to health care data at various levels like
Na and Huh (2014) proposed a methodology that could
guest, admin, third-party users
assess the reliability prospect of cloud computing in the
(c) Access to medical records that is stored over time in
outlook of the users for both the service and security-level
distributed data servers.
agreement. This is attained with a compound focus on the
basis of benefits type, network environments and proba-
bilities of threats to attain a security-SLA analysis. The 2.6 Methodology
various parameters for the evaluation are security storage,
security networking, access control, secure handling, audit, The proposed contribution suggests a framework interac-
authentication and consent. A user perspective-level tion that has the following components:

Fig. 1 Cryptographic
algorithms hierarchy

123
Enhancing cloud security using crypto-deep neural network for privacy preservation…

cd
inverse = 1./(determinant) * d - b
-ca
determinant = (bd - ca)
The Pi matrix is multiplied with inverse matrix and the output is
also multiplied with the PiT matrix
Fig. 2 Overall architecture for cloud users
The final output matrix indicates the orthogonal projection matrix
with the next iterative projection
• Cloud Server: The centralized server to provide the The validation is performed based on the value of the projection
available cloud resource to the user device matrix
• Web Server: The primary interface to access the cloud
server
• Data Center: The repository composed of networked
storage and computers to perform the computing The second phase uses distributed neural network for
• Cloud Agent: The agent portal to provide the subscrip- ensuring security during transactions.
tion and the registration process for the users
• impersonation attack: The attackers in which an adver-
During the system initialization process, cloud server generates
sary successfully assumes the identity of one of the
the system parameters from the bilinear parameters
legitimate parties in a system
It selects two random number as master key from the bilinear
The overall architecture diagram is presented in Fig. 2. mapping and also selects the cryptographic hash function
During interaction, the users have a challenge in During the registration process, devices store the Cloud server
information and the corresponding webserver
securing the information. This can be found by imperson-
In this phase, the users directly perform the registration process
ation attack. The attack is largely persistent and is found
by providing its identity-based information to the CS
using the proposed algorithm [crypto-deep neural network
CS receives and validates the registration information and
cloud security (CDNNCS)] as presented below: generates the key for each individual users
CS generates the original identity and dummy identity by using
the random numbers and modules function with the large prime
The resource and the credential information of the cloud data number
center and the user are protected by applying the LAE
It computes the mapping information (Ti) by using the power and
outsourcing model
inverse function which takes random number as input and
From the available information about the user and the server, the generates the authorization key
secured data projection process is initiated as follows
The security model for generating the key is derived using the
The input 2 9 2 matrix is formulated with the data scheduling crypto-deep neural network
requirement, trust metric based on the credential and the
It contains the multiple level of latent variable as hidden units
corresponding additive value with the expected variance and the
pCap values The probability of the nodes are distributed using the Bernoulli
distributiont
For the input matrix, orthogonal projection matrix is computed as
follows The training model is applied with the collaborative deep learning
algorithm with the combined form of forward propagation and
Initially, the identity matrix is formed for the corresponding
backward propagation
2 9 2 matrix
The weight value for the input neuron is updated using the
I=10
method of gradient descent
01
The gradient descent is the first order iterative optimization
The input matrix is considered as matrix A and the Transpose of function with the approximate gradients
A is computed and denoted as AT
The derivative of the ReLU function is used as the activation
Using the matrix multiplication, product of the A and AT is function
estimated in both form as A_AT = A*AT and AT_A = AT*A
In the hidden layers, the weight update is performed by applying
By taking the ratio between these two with the subtraction value the gradient descent function in the reconstruction step
with the identity matrix is computed as follows
With the forward and backward propagation, the output layer is
I_AAT_ATA = I - A_AT/AT_A obtained with the required anonymous certificate information
This matrix is considered as projected matrix and it is denoted as This anonymous information is propagated to the user device as
Pi secret parameter
The transpose of the Pi is computed and represented as PiT The user generates the anonymous certificate from the secret
The product of the PiT and Pi calculated and marked as PiT_Pi parameter using the hash function, certificate parameters,
For this value matrix, the inverse matrix is applied as follows random dummy identity of the user
PiT_Pi = a b

123
P. Abirami, S. V. Bhanu

The anonymous certificate is transmitted to the CS by using the 3.2 Discussion


WebServer as intermediate device from the user devices
From the anonymous certificate, the CS extracts the public key The proposed algorithm [crypto-deep neural network cloud
information and dummy identity of the users security (CDNNCS)] is compared with secure linear alge-
The CS validates that the extracted information should be equal braic equation (SLAE) and the results are presented below
to the public parameters of the user during the registration in the graphs.
process
From Fig. 3 it can be observed that number of transac-
Upon successful validation, the user is considered as the
authenticated user to access the service
tions increases with time. It can also be observed that the
In order to authenticate and preserve the integrity of the message
during the data transmission, the short time anonymous
signature is generated
If the certificate validation is failed then the device is reported as
malicious device and the same is eliminated from the data
transmission and in the service access

The approach has a learning component that ensures


security with authentication. The simulation and analysis is
presented in the following section.

3 Results and discussion

3.1 Simulation environment

The proposed algorithm using deep neural network is


simulated using NS2. The simulation parameters is pre-
sented in Table 1.

Fig. 3 Time versus transactions


Table 1 Simulation parameters for cloud security model
Parameter Value

No of nodes 50
Mac type IEEE802.11
Queue type Priority queue
Coverage area 250 m
Topology area 1000 9 1000
Antenna type OmniDirectional
Packet size 2000
Connection type UDP
Application type Web data using CBR
Packet generation interval 0.1, 0.15, 0.2, 0.25, 0.3
Data rate 3 mbps
Simulation time 100–200 s
No of transactions generated 100 with average request of 3
in unit time handled per second
No of cloud server 1
No of web server 5
No of data center 5
No of cloud agents 10

Fig. 4 Time versus PDR

123
Enhancing cloud security using crypto-deep neural network for privacy preservation…

Fig. 5 Time versus NRO Fig. 7 Time versus Througput

From Fig. 5 it can be observed that NRO decreases with


time. It can also be observed that the proposed algorithm
(CDNNCS) hence provides reliable communication with
less packet loss compared to SLAE algorithm.
From Fig. 6 it can be observed that delay decreases with
time. It can also be observed that the proposed algorithm
(CDNNCS) has 10% less delay compared to SLAE
algorithm.
From Fig. 7 it can be observed that throughput increases
with time. It can also be observed that the proposed algo-
rithm (CDNNCS) provides faster response time for users
compared to SLAE algorithm.
From Fig. 8 it can be observed that Goodput increases
with time. It can also be observed that the proposed algo-
rithm (CDNNCS) follows a ramp like pattern for users
compared to SLAE algorithm. It can be observed that the
packet loss is reduced to a optimal minimum using the
proposed CDNNCS algorithm.
From Fig. 9 it can be observed that jitter decreases with
time. It can also be observed that the proposed algorithm
(CDNNCS) provides error free communication compared
to SLAE algorithm. The Algorithm proposed is better
Fig. 6 Time versus delay because of the following reasons as seen from graphs
above:
proposed algorithm (CDNNCS) allows for more transac-
tions compared to SLAE algorithm. • Increase in packet-level communication
From Fig. 4 it can be observed that packet delivery ratio • Reduction in delay for delivering packets to destination
increases with time. It can also be observed that the pro- • Optimal data utilization
posed algorithm (CDNNCS) has less computational over- The algorithm performance is presented as a summary in
head compared to SLAE algorithm. Table 2.

123
P. Abirami, S. V. Bhanu

Table 2 Cloud computing-based challenges


Cloud Infrastructure as a service (IAAS)—running an
services private data with the capability of scaling and fault
tolerance. This provides rapid solution for any
individuals or corporate to adopt Cloud
environment for their purpose
Platform as a service (PAAS)—the cloud service
provide take care of OS, middleware, scaling and
fault tolerance etc. This helps a lot startups &
Entrepreneur to develop their business and
researches
Software as a service (SAAS)—the complete
solution is offered with cloud provider, if the
solution is suitable for business can be adopted
immediately
Cloud Subscriptions, resource groups, virtual machines,
concepts connectivity (VNET to VNET, VPN (between
resource groups, subscriptions and on-premises),
monitoring, scaling, storage, identity access
management (IAM), access controls etc., fault
tolerance, governance and compliance
Security for Key security concern and considering on Cloud
cloud environment are
Fig. 8 Time versus Goodput Secure deployment
Segregation of environment on internal aspects and
securing from external attacks
Storage management
Identity and access management [includes of
multifactor authentication (MFA)]
Continuous monitoring if performance and security
Vulnerability management solutions (anti-virus,
IDS/IPS, SIEM, vulnerability scanning etc.)
Encryption and key management
Data privacy
Governance, risk and compliance monitoring

4 Conclusion and future work

The paper has proposed a Crypto-Deep Neural Network


Cloud Security (CDNNCS) for enhancing the security in
the network. The node-level traffic has been presented and
the communication is enhanced using proposed model. The
learning component serves as the key factor for improving
the security of the network. It can be observed from the
Fig. 9 Time versus Jitter
graphs that the proposed CDNNCS algorithm improves the
communication level with optimal traffic and security. The
In overall from Figs. 3, 4, 5, 6, 7, 8 and 9 it can be
trust is improved in the cloud environment using the pro-
observed that the proposed Deep learning
posed crypto-deep neural network cloud security. The work
Approach (CDNNCS) improves the security of the
can be extended in future considering the dynamic
network model in cloud environment (Table 3).
behavior of the node communication in cloud environment
using other Deep learning architectures. Considering the
access-level nature of users, it is also suggested to consider

123
Enhancing cloud security using crypto-deep neural network for privacy preservation…

Table 3 Summary of
Time Delay Dropping ratio Goodput Jitter
performance of algorithms
SLAE CDNNCS SLAE CDNNCS SLAE CDNNCS SLAE CDNNCS

100 0.28163 0.131568 10.8235 5.52941 56,812.1 121,611 0.111875 0.105721


125 0.283623 0.13422 12 5.45455 56,412.9 119,207 0.113404 0.105718
150 0.479047 0.305045 13.037 6 33,399.7 52,451.3 0.114791 0.106328
175 0.624944 0.405311 13.25 6.0625 25,602.3 39,475.9 0.115111 0.106419
200 0.717043 0.42905 12.1044 5.55247 22,313.9 37,291.7 0.1141 0.105896

the behavioral aspects of the users as a multivariate prob- Junwei G, Cong T, Yiqiu F (2011) Architecture for component library
lem in cloud environment. retrieval on the cloud. In: 2011 7th international conference on
computational intelligence and security, Hainan, pp 536–539
Kahvazadeh S et al (2019) Balancing security guarantees vs. QoS
provisioning in combined fog-to-cloud systems. In: 2019 10th
Acknowledgement This research is not supported under any funding. IFIP international conference on new technologies, mobility and
security (NTMS), Canary Islands, pp 1–6
Karunakaran V (2019) A stochastic development of cloud computing
Compliance with ethical standards based task scheduling algorithm. J Soft Comput Paradigm
(JSCP) 1(01):41–48
Conflict of interest The authors declare that they have no conflict of Khasnabish JN, Mithani MF, Rao S (2017) Tier-centric resource
interest. allocation in multi-tier cloud systems. IEEE Trans Cloud
Comput 5(3):576–589
Research involving human participants and/or animal This article Kritikos K, Plexousakis D (2015) Multi-cloud application design
does not contain any studies with human participants or animals through cloud service composition. In: 2015 IEEE 8th interna-
performed by any of the authors. tional conference on cloud computing, New York, pp 686–693
Kwabena O, Qin Z, Zhuang T, Qin Z (2019) MSCryptoNet: multi-
Informed consent All referred study is highlighted in the Literature scheme privacy-preserving deep learning in cloud computing.
Review. IEEE Access 7:29344–29354
Ma M, Yang J, Wang P, Liu W, Zhang J (2019) Light-weight and
scalable hierarchical-MVC architecture for cloud web applica-
tions. In: 2019 6th IEEE international conference on cyber
References security and cloud computing (CSCloud)/2019 5th IEEE inter-
national conference on edge computing and scalable cloud
Al-Rayis E, Kurdi H (2013) Performance analysis of load balancing (EdgeCom), Paris, pp 40–45
architectures in cloud computing. In: 2013 European modelling Marrero-Almonte R, Marin-Tordera E, Masip-Bruin X, Sanchez-
symposium, Manchester, pp 520–524 Lopez S (2015) Conceptual approach of a hierarchical cloud
Chen J, Zhu Q (2017) Security as a service for cloud-enabled internet architecture for intelligent transport systems. In: 2015 14th
of controlled things under advanced persistent threats: a contract annual mediterranean ad hoc networking workshop (MED-HOC-
design approach. IEEE Trans Inf Forensics Secur NET), Vilamoura, pp 1–8
12(11):2736–2750 Na S-H, Huh E-N (2014) A methodology of assessing security risk of
Currie AR, Mcconnell A, Parr GP, McClean SI, Khan K (2014) cloud computing in user perspective for security-service-level
Truesource: a true performance for hierarchical cloud monitor- agreements. In: 4th edition of the international conference on the
ing. In: 2014 IEEE/ACM 7th international conference on utility innovative computing technology (INTECH 2014), Luton,
and cloud computing, London, pp 980–985 pp 87–92
Farahnakian F, Pahikkala T, Liljeberg P, Plosila J (2014) Hierarchical Nair TRG, Madhuri KL (2011) Data mining using hierarchical virtual
agent-based architecture for resource management in cloud data k-means approach integrating data fragments in cloud computing
centers. In: 2014 IEEE 7th international conference on cloud environment. In: 2011 IEEE international conference on cloud
computing, Anchorage, pp 928–929 computing and intelligence systems, Beijing, pp 230–234
Frey S, Luthje C, Reich C, Clarke N (2014) Cloud QoS scaling by Raj JS, Smys S (2019) Virtual structure for sustainable wireless
fuzzy logic. In: 2014 IEEE international conference on cloud networks in cloud services and enterprise information system.
engineering, Boston, pp 343–348 J ISMAC 1(03):188–205
Hammami A, Simoni N, Salman R (2012) Ubiquity and QoS for Santhosh G, De Vita F, Bruneo D, Longo F, Puliafito A (2019)
cloud security. In: 2012 41st international conference on parallel Towards trustless prediction-as-a-service. In: 2019 IEEE inter-
processing workshops, Pittsburgh, pp 277–278 national conference on smart computing (SMARTCOMP),
Han D, Stroulia E (2014) Federating web-based applications on a Washington, DC, pp 317–322
hierarchical cloud. In: 2014 IEEE 7th international conference Sarma MS, Srinivas Y, Abhiram M, Prasanthi MS, Ramya MSL
on cloud computing, Anchorage, pp 946–947 (2017) KNN file classification for securing cloud infrastructure.
Healthcare Use Cases for IBM Cloud, IBM (2020) In: 2017 2nd IEEE international conference on recent trends in
Hesamifard E, Takabi H, Ghasemi M (2019). In: Proceedings of the electronics, information and communication technology
9th ACM conference on data and application security and (RTEICT), Bangalore, pp 5–9
privacy (CODASPY’19), March, pp 97–108

123
P. Abirami, S. V. Bhanu

Shekhar S (2016) Dynamic data driven cloud systems for cloud- Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: secure and
hosted CPS. In: 2016 IEEE international conference on cloud verifiable federated learning. IEEE Trans Inf Forensics Secur
engineering workshop (IC2EW), Berlin, pp 195–197 15:911–926
Su W, Dai C (2017) QoS-aware distributed cloud storage service Yoon J (2019) Using a deep-learning approach for smart IoT network
based on erasure code in multi-cloud environment. In: 2017 14th packet analysis. In: 2019 IEEE European symposium on security
IEEE annual consumer communications and networking confer- and privacy workshops (EuroS&PW), Stockholm, pp 291–299
ence (CCNC), Las Vegas, pp 365–368 Zhao X, Yin J, Zhi C, Chen Z (2016) MonValley: an unified
Wahid MDNA, Ali A, Esparham B, Marwan MD (2018) A monitoring and management framework for cloud services. In:
comparison of cryptographic algorithms: DES, 3DES, AES, 2016 IEEE international conference on web services (ICWS),
RSA and blowfish for guessing attacks prevention. J Comput Sci San Francisco, pp 682–685
Appl Inf Technol 3(2):1–7
Xu H, Qiu X, Sheng Y, Luo L, Xiang Y (2018) A QoS-driven Publisher’s Note Springer Nature remains neutral with regard to
approach to the cloud service addressing attributes of security. jurisdictional claims in published maps and institutional affiliations.
IEEE Access 6:34477–34487

123

You might also like