원문정보
초록
영어
Cloud computing is computing that provides, storage, databases, networking, intelligence, software, and analytics over the internet. Cloud services are delivered remotely and almost always from an offsite data center. Cloud services manage a better computing infrastructure efficiently. This study presents security issues & challenges in cloud computing and tries to find out the possible solution for some of the problems. It also discusses some solutions that deal with cloud computing-related to its privacy and security challenges. The proposed Intelligent Cloud Security Issues Detection using Multilayer Mamdani Fuzzy Inference System (ICSID-ML-MFIS) Expert System, can classify the different types of threats. The Expert System has eight input variables at layer-I, three input variables at layers-II, three input variables at layers-III, and six input variables at layers-IV. At layer-I input variables are threat-to-software, Traffic Monitoring, Networking Threat, Resource Availability, Platform availability, Trusted-Service-Availability, Device Availability, and Network Availability that detects output condition of threats to be affected or Not-Affected. At layer-II input variables are Detect SAAS Threats, Detect PAAS Threat, and Detect IAAS Threats, which determine the output condition as Yes or No. At layer-III input variables are Monitoring, Gaining, and managing which determine the output condition as cloud security type DCST. At layer-IV input variables are security incident response (SR), privilege identity management, locate current security problem (SP), super user account, a factor leading to inability to control traffic, and locate social engineering attacks. At last output, the layer consists of eight output types to detect the cloud security issues such as lack of visibility of data, theft of data, inability to control data, hijacking, system vulnerability, social engineering attacks, data breaches, and no-security issues. The proposed model based on Fuzzy reached 91.5% of true positive cases.
목차
I. INTRODUCTION
II. LITERATURE REVIEW
III. METHODOLOGY
IV. RESULTS AND DISCUSSION
V. CONCLUSION
REFERENCES