Abstract
Cloud services provide decentralized and pervasive access for resources to reduce the complex infrastructure requirements of the user. In decentralized service access, the implication of security is tedious to match the user requirements. Therefore, cloud services incorporate cybersecurity measures for administering standard resource access to users. In this paper, a shared two-way security model (STSM) is proposed to provide adaptable service security for the end-users. In this security model, a cooperative closed access session for information sharing between the cloud and end-user is designed with the help of cybersecurity features. This closed access provides less complex authentication for users and data that is capable of matching the verifications of the cloud services. A deep belief learning algorithm is used to differentiate the cooperative and non-cooperative secure sessions between the users and the cloud to ensure closed access throughout the data sharing time. The output of the belief network decides the actual session time between the user and the cloud, improving the span of the sharing session. Besides, the proposed model reduces false alarm, communication failures, under controlled complexity.
- [1] . 2019. Ontology-based security context reasoning for power IoT-Cloud security service. IEEE Access 7 (2019), 110510–110517.Google Scholar
Cross Ref
- [2] . 2018. A broker-based framework for standardization and management of Cloud security-SLAs. Computers & Security 75 (2018), 59–71.Google Scholar
Cross Ref
- [3] . 2020. A service recommendation algorithm with the transfer learning based matrix factorization to improve cloud security. Information Sciences 513 (2020), 98–111.Google Scholar
Digital Library
- [4] 2019. Research on underwater wireless sensor network and MAC protocol and location algorithm. In IEEE Access 7 (2019), 56606–56616.Google Scholar
Cross Ref
- [5] 2019. A decentralized scalable security framework for end-to-end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies (2019): e3815.Google Scholar
- [6] . 2017. A security evaluation framework for cloud security auditing. The Journal of Supercomputing 74, 11 (2017), 5774–5796. Google Scholar
Digital Library
- [7] . 2018. An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. Journal of Ambient Intelligence and Humanized Computing 1–13.Google Scholar
- [8] . Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the Convergence of Big Data and the Internet of Things. IGI Global, USA.Google Scholar
- [9] . 2018. Trust is good, control is better: Creating secure clouds by continuous auditing. IEEE Transactions on Cloud Computing 6, 3 (2018), 890–903.Google Scholar
Cross Ref
- [10] . 2018. A Cloud-based platform for the emulation of complex cybersecurity scenarios. Future Generation Computer Systems 89 (2018), 791–803.Google Scholar
Cross Ref
- [11] . 2017. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Transactions on Smart Grid 8, 5, (2017), 2411–2419.
DOI: 10.1109/TSG.2017.2720159Google ScholarCross Ref
- [12] . 2020. Cybersecurity and platform competition in the cloud. Computers & Security 93 (2020), p. 101774.Google Scholar
Cross Ref
- [13] . 2018. Next-generation cybersecurity through a blockchain-enabled federated cloud framework. The Journal of Supercomputing 74, 10 (2018), 5099–5126. Google Scholar
Digital Library
- [14] . 2020. Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Information Systems Frontiers 22, 1 (2020), 45–57.Google Scholar
Cross Ref
- [15] . 2019. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustainable Cities and Society 49, (2019), 101522.Google Scholar
Cross Ref
- [16] . 2019. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios. Journal of Systems Architecture 97 (2019), 107–129.Google Scholar
Digital Library
- [17] . 2018. Artificial intelligence in Internet of Things. CAAI Transactions on Intelligence Technology 3, 4, (2018), 208–218. https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/trit.2018.1008.Google Scholar
Digital Library
- [18] . 2019. Forming high-availability cloud mechanism for secure peer-servicing networks. Wireless Personal Communications 109, 1 (2019), 361–391.Google Scholar
Digital Library
- [19] . 2019. SecOFF-FCIoT: Machine learning based secure offloading in Fog-Cloud of Things for smart city applications. Internet of Things 7 (2019), p. 100070.Google Scholar
Cross Ref
- [20] . 2019. Security strategy for virtual machine allocation in cloud computing. Procedia Computer Science 147 (2019), 140–144.Google Scholar
Digital Library
- [21] . 2019. A trust-based agent learning model for service composition in mobile cloud computing environments. IEEE Access 7 (2019), 34207–34226.Google Scholar
Cross Ref
- [22] . 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access 6 (2018), 58619–58633.Google Scholar
Cross Ref
- [23] . 2019. A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing environment. IEEE Access 7 (2019), 161822–161830.Google Scholar
Cross Ref
- [24] . 2020. Cloud-assisted secure and conjunctive publish/subscribe service in smart grids. IET Information Security 14, 4 (2020), 470–481.Google Scholar
Cross Ref
- [25] . 2019. Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach. IEEE Access 7 (2019), 9368–9383.Google Scholar
Cross Ref
- [26] . 2016. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal 12, 2 (2016), 2039–2042.Google Scholar
- [27] . 2020. A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. Computers & Security 89 (2020), p. 101659.Google Scholar
Digital Library
- [28] . 2018. Model driven design and evaluation of security level in orchestrated cloud services. Journal of Network and Computer Applications 106 (2018), 78–89.Google Scholar
Cross Ref
- [29] . 2019. Offering security diagnosis as a service for cloud SaaS applications. Journal of Information Security and Applications 44 (2019), 32–48.Google Scholar
Cross Ref
- [30] . 2019. An approach for the secure management of hybrid cloud–edge environments. Future Generation Computer Systems 90 (2019), 1–19.Google Scholar
Cross Ref
- [31] . 2019. A secure multi-user database-as-a-service approach for cloud computing privacy. Procedia Computer Science 160 (2019), 811–818.Google Scholar
Cross Ref
- [32] . 2020. A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service. Frontiers of Computer Science 14, 6 (2020).Google Scholar
Digital Library
- [33] . 2020. A lightweight anonymous authentication scheme for secure cloud computing services. The Journal of Supercomputing 2020.Google Scholar
- [34] . 2018. Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment 2018. Google Scholar
Digital Library
- [35] . 2017. SearchaStore: Fast and secure searchable cloud services. Cluster Computing 21, 2 (2017), 1189–1202.Google Scholar
Cross Ref
- [36] . 2019. An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Transactions on Emerging Telecommunications Technologies, Wiley 2019.Google Scholar
Digital Library
- [37] . 2018. A machine learning approach for feature selection traffic classification using security analysis. Journal of Supercomputing, Springer 76 (2018), 4867–4892. Google Scholar
Digital Library
- [38] . 2020. Energy-efficient end-to-end security for software defined vehicular networks. IEEE Transactions on Industrial Informatics 2020.Google Scholar
- [39] . 2020. Iot malicious traffic identification using wrapper-based feature selection mechanisms. computers & security. Elsevier 2020.Google Scholar
Index Terms
A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications
Recommendations
Network service sharing infrastructure: service authentication and authorization revocation
ICCOM'05: Proceedings of the 9th WSEAS International Conference on CommunicationsWhen a service server receives a request, the server will establish the identity and authorization of the user based on the information stored in authentication information repository (IDAR) before service is provided. The IDAR will determine who can ...
Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics
ITNG '15: Proceedings of the 2015 12th International Conference on Information Technology - New GenerationsWe are currently observing a huge paradigm shift by different organizations moving their information technology services from enterprise-based data centers that run on different dedicated servers on their premises to cloud computing environment. ...
Local Data Security and Privacy Protection in Cloud Service Applications
FCST '15: Proceedings of the 2015 Ninth International Conference on Frontier of Computer Science and TechnologyIn the past ten years, the technology researches and applications on Cloud Computing have been booming. Depending on large data centers and distributed cluster servers, different layers of Cloud Services make it possible that computing performance ...






Comments