Cloud computing security assurance modelling through risk analysis using machine learning
Abhishek Sharma () and
Umesh Kumar Singh ()
Additional contact information
Abhishek Sharma: Shri Vaishnav Vidyapeeth Vishwavidyalaya
Umesh Kumar Singh: Vikram University, Ujjain
International Journal of System Assurance Engineering and Management, 2025, vol. 16, issue 3, No 20, 1287-1300
Abstract:
Abstract The concept of Cloud Computing has exploded in popularity, and the reason for this is the cost-effective transmission, storage, and powerful computation it offers. The objective is to provide end-users with remote storage and data analysis capabilities using shared computing resources, lowering an individual’s total cost. Consumers, on the other hand, are still hesitant to use this technology due to security and privacy concerns. In this work a thorough overview of the various Cloud attacks and security challenges is presented and security assurance modelling is done through risk analysis using machine learning. In order to analyze the security risk in terms of threats and attacks for cloud computing environments, the most recent dataset (ISOT Cloud Intrusion Dataset) is used for intrusion detection under cloud computing environments. The methodology involves the implementation of multiple supervised machine learning algorithms like support vector machine (SVM), random forest (RF), logistic regression (LR), Naïve Bayes (NB), Artificial Neural Network (ANN), K-nearest Neighbor (kNN) to identify & classify intrusions for cloud environment. As a result, accuracy of the proposed SVM model is evaluated as 99.2%. The performance metrics of various machine learning implementation models are also compared & investigated using parameters like accuracy, AUC, F1, precision, and recall. The results are represented as confusion matrices. The outcome of this work will further help the network security administrator to mitigate the real time attacks under cloud computing environments.
Keywords: Cloud computing (CC); Cloud attacks; Cloud security; Machine learning; Intrusion detection system (IDS); Cyber attacks; Cloud security assurance (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s13198-025-02705-8 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:16:y:2025:i:3:d:10.1007_s13198-025-02705-8
Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198
DOI: 10.1007/s13198-025-02705-8
Access Statistics for this article
International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar
More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().