skip to main content
research-article

A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications

Authors Info & Claims
Published:22 October 2021Publication History
Skip Abstract Section

Abstract

Cloud services provide decentralized and pervasive access for resources to reduce the complex infrastructure requirements of the user. In decentralized service access, the implication of security is tedious to match the user requirements. Therefore, cloud services incorporate cybersecurity measures for administering standard resource access to users. In this paper, a shared two-way security model (STSM) is proposed to provide adaptable service security for the end-users. In this security model, a cooperative closed access session for information sharing between the cloud and end-user is designed with the help of cybersecurity features. This closed access provides less complex authentication for users and data that is capable of matching the verifications of the cloud services. A deep belief learning algorithm is used to differentiate the cooperative and non-cooperative secure sessions between the users and the cloud to ensure closed access throughout the data sharing time. The output of the belief network decides the actual session time between the user and the cloud, improving the span of the sharing session. Besides, the proposed model reduces false alarm, communication failures, under controlled complexity.

REFERENCES

  1. [1] Choi C. and Choi J.. 2019. Ontology-based security context reasoning for power IoT-Cloud security service. IEEE Access 7 (2019), 110510110517.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Halabi T. and Bellaiche M.. 2018. A broker-based framework for standardization and management of Cloud security-SLAs. Computers & Security 75 (2018), 5971.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Lei C., Dai H., Yu Z., and Li R.. 2020. A service recommendation algorithm with the transfer learning based matrix factorization to improve cloud security. Information Sciences 513 (2020), 98111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Xi Z. et al. 2019. Research on underwater wireless sensor network and MAC protocol and location algorithm. In IEEE Access 7 (2019), 5660656616.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Febin Sheron P. S. et al. 2019. A decentralized scalable security framework for end-to-end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies (2019): e3815.Google ScholarGoogle Scholar
  6. [6] Rizvi S., Ryoo J., Kissell J., Aiken W., and Liu Y.. 2017. A security evaluation framework for cloud security auditing. The Journal of Supercomputing 74, 11 (2017), 57745796. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Preeth S. S. L., Dhanalakshmi R., Kumar R., and Shakeel P. M.. 2018. An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. Journal of Ambient Intelligence and Humanized Computing 113.Google ScholarGoogle Scholar
  8. [8] Thota C., Sundarasekar R., Manogaran G., Varatharajan R., and Priyan M. K.. Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the Convergence of Big Data and the Internet of Things. IGI Global, USA.Google ScholarGoogle Scholar
  9. [9] Lins S., Schneider S., and Sunyaev A.. 2018. Trust is good, control is better: Creating secure clouds by continuous auditing. IEEE Transactions on Cloud Computing 6, 3 (2018), 890903.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Furfaro A., Piccolo A., Parise A., Argento L., and Saccà D.. 2018. A Cloud-based platform for the emulation of complex cybersecurity scenarios. Future Generation Computer Systems 89 (2018), 791803.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] He D., Kumar N., Zeadally S., Vinel A., Yang L. T.. 2017. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Transactions on Smart Grid 8, 5, (2017), 24112419. DOI: 10.1109/TSG.2017.2720159Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Arce D. G.. 2020. Cybersecurity and platform competition in the cloud. Computers & Security 93 (2020), p. 101774.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Malomo O. O., Rawat D. B., and Garuba M.. 2018. Next-generation cybersecurity through a blockchain-enabled federated cloud framework. The Journal of Supercomputing 74, 10 (2018), 50995126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Lee J. K., Chang Y., Kwon H. Y., and Kim B.. 2020. Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Information Systems Frontiers 22, 1 (2020), 4557.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Jegadeesan Subramani, Azees Maria, Malarvizhi Kumar Priyan, Manogaran Gunasekaran, Chilamkurti Naveen, Varatharajan R., and Hsu Ching-Hsien. 2019. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustainable Cities and Society 49, (2019), 101522.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Ficco M. and Palmieri F.. 2019. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios. Journal of Systems Architecture 97 (2019), 107129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Ghosh Ashish, Chakraborty Debasrita, and Law Anwesha. 2018. Artificial intelligence in Internet of Things. CAAI Transactions on Intelligence Technology 3, 4, (2018), 208218. https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/trit.2018.1008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Lee T.-Y., Chen Y.-J., and Horng G.-J.. 2019. Forming high-availability cloud mechanism for secure peer-servicing networks. Wireless Personal Communications 109, 1 (2019), 361391.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Alli A. A. and Alam M. M.. 2019. SecOFF-FCIoT: Machine learning based secure offloading in Fog-Cloud of Things for smart city applications. Internet of Things 7 (2019), p. 100070.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Jia H., Liu X., Di X., Qi H., Cong L., Li J., and Yang H.. 2019. Security strategy for virtual machine allocation in cloud computing. Procedia Computer Science 147 (2019), 140144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Li W., Cao J., Hu K., Xu J., and Buyya R.. 2019. A trust-based agent learning model for service composition in mobile cloud computing environments. IEEE Access 7 (2019), 3420734226.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Kazim M., Liu L., and Zhu S. Y.. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access 6 (2018), 5861958633.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Kong F., Zhou Y., Xia B., Pan L., and Zhu L.. 2019. A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing environment. IEEE Access 7 (2019), 161822161830.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Li J., Wen M., and Zhang K.. 2020. Cloud-assisted secure and conjunctive publish/subscribe service in smart grids. IET Information Security 14, 4 (2020), 470481.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Li X., Wang Q., Lan X., Chen X., Zhang N., and Chen D.. 2019. Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach. IEEE Access 7 (2019), 93689383.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Jiang Q., Ma J., and Wei F.. 2016. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal 12, 2 (2016), 20392042.Google ScholarGoogle Scholar
  27. [27] Wang J., Neil M., and Fenton N.. 2020. A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. Computers & Security 89 (2020), p. 101659.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Amato F., Mazzocca N., and Moscato F.. 2018. Model driven design and evaluation of security level in orchestrated cloud services. Journal of Network and Computer Applications 106 (2018), 7889.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Elsayed M. and Zulkernine M.. 2019. Offering security diagnosis as a service for cloud SaaS applications. Journal of Information Security and Applications 44 (2019), 3248.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Celesti A., Fazio M., Galletta A., Carnevale L., Wan J., and Villari M.. 2019. An approach for the secure management of hybrid cloud–edge environments. Future Generation Computer Systems 90 (2019), 119.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Gahi Y. and Alaoui I. E.. 2019. A secure multi-user database-as-a-service approach for cloud computing privacy. Procedia Computer Science 160 (2019), 811818.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Liu X., Xia C., Wang T., Zhong L., and Li X.. 2020. A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service. Frontiers of Computer Science 14, 6 (2020).Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Hammami H., Yahia S. B., and Obaidat M. S.. 2020. A lightweight anonymous authentication scheme for secure cloud computing services. The Journal of Supercomputing 2020.Google ScholarGoogle Scholar
  34. [34] Park S., Kim H., Park J., and Ryou J.. 2018. Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Lee W.-K., Phan R. C.-W., Poh G.-S., and Goi B.-M.. 2017. SearchaStore: Fast and secure searchable cloud services. Cluster Computing 21, 2 (2017), 11891202.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Bashir A. K., Arul R., Jayaram R., Arulappan A., and Prathiba S. B.. 2019. An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Transactions on Emerging Telecommunications Technologies, Wiley 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Shafiq M., Yu X., Bashir A. K., Chuahdry H. N., and Wang D.. 2018. A machine learning approach for feature selection traffic classification using security analysis. Journal of Supercomputing, Springer 76 (2018), 48674892. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Raja G., Anbalagan S., Vijayaraghavan G., Dhanasekaran P., Al-Otaibi Y. D., and Bashir A. K.. 2020. Energy-efficient end-to-end security for software defined vehicular networks. IEEE Transactions on Industrial Informatics 2020.Google ScholarGoogle Scholar
  39. [39] Shafiq M., Tian Z., Bashir A. K., Du X., and Guizani M.. 2020. Iot malicious traffic identification using wrapper-based feature selection mechanisms. computers & security. Elsevier 2020.Google ScholarGoogle Scholar

Index Terms

  1. A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 22, Issue 2
            May 2022
            582 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/3490674
            • Editor:
            • Ling Liu
            Issue’s Table of Contents

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 October 2021
            • Accepted: 1 October 2020
            • Revised: 1 September 2020
            • Received: 1 August 2020
            Published in toit Volume 22, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Full Text

          View this article in Full Text.

          View Full Text

          HTML Format

          View this article in HTML Format .

          View HTML Format
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!