全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Enhancing Cybersecurity through Cloud Computing Solutions in the United States

DOI: 10.4236/iim.2024.164011, PP. 176-193

Keywords: Cybersecurity, Cloud Computing, Cloud Solutions, Machine Learning, Algorithm

Full-Text   Cite this paper   Add to My Lib

Abstract:

This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of internet criminals in the United States. The study adopted a survey research design, collecting data from 890 cloud professionals with relevant knowledge of cybersecurity and cloud computing. A machine learning approach was adopted, specifically a random forest classifier, an ensemble, and a decision tree model. Out of the features in the data, ten important features were selected using random forest feature importance, which helps to achieve the objective of the study. The study’s purpose is to enable organizations to develop suitable techniques to prevent cybercrime using random forest predictions as they relate to cloud services in the United States. The effectiveness of the models used is evaluated by utilizing validation matrices that include recall values, accuracy, and precision, in addition to F1 scores and confusion matrices. Based on evaluation scores (accuracy, precision, recall, and F1 scores) of 81.9%, 82.6%, and 82.1%, the results demonstrated the effectiveness of the random forest model. It showed the importance of machine learning algorithms in preventing cybercrime and boosting security in the cloud environment. It recommends that other machine learning models be adopted to see how to improve cybersecurity through cloud computing.

References

[1]  Butt, U.A., Mehmood, M., Shah, S.B.H., Amin, R., Shaukat, M.W., Raza, S.M., et al. (2020) A Review of Machine Learning Algorithms for Cloud Computing Security. Electronics, 9, Article No. 1379.
https://doi.org/10.3390/electronics9091379
[2]  Ezzat Salem, I. and Hashim Al-Saedi, K. (2023) Enhancing Cloud Security through the Integration of Deep Learning and Data Mining Techniques: A Comprehensive Review. Periodicals of Engineering and Natural Sciences (PEN), 11, 176-192.
https://doi.org/10.21533/pen.v11i3.3596
[3]  O’Donovan, P., Gallagher, C., Leahy, K. and O’Sullivan, D.T.J. (2019) A Comparison of Fog and Cloud Computing Cyber-Physical Interfaces for Industry 4.0 Real-Time Embedded Machine Learning Engineering Applications. Computers in Industry, 110, 12-35.
https://doi.org/10.1016/j.compind.2019.04.016
[4]  FBI IC3 Report 2023.
https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
[5]  IBM Security (2023) Cost of a Data Breach Report 2023.
https://www.ibm.com/security/data-breach
[6]  Aljumah, A. and Ahanger, T.A. (2020) Cyber Security Threats, Challenges and Defence Mechanisms in Cloud Computing. IET Communications, 14, 1185-1191.
https://doi.org/10.1049/iet-com.2019.0040
[7]  Ramos Brandao, P. (2019) Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Advances in Wireless Communications and Networks, 5, 33-40.
https://doi.org/10.11648/j.awcn.20190501.15
[8]  Khan, N. and Al-Yasiri, A. (2016) Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework. Procedia Computer Science, 94, 485-490.
https://doi.org/10.1016/j.procs.2016.08.075
[9]  Sandesh, A. (2022) Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape. Int. J. Comput. Syst. Eng, 379-384.
[10]  Ukwandu, E., Ben-Farah, M.A., Hindy, H., Bures, M., Atkinson, R., Tachtatzis, C., et al. (2022) Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends. Information, 13, Article No. 146.
https://doi.org/10.3390/info13030146
[11]  Hassan, W., Chou, T., Tamer, O., Pickard, J., Appiah-Kubi, P. and Pagliari, L. (2020) Cloud Computing Survey on Services, Enhancements and Challenges in the Era of Machine Learning and Data Science. International Journal of Informatics and Communication Technology (IJ-ICT), 9, 117-139.
https://doi.org/10.11591/ijict.v9i2.pp117-139
[12]  Ige, T. and Sikiru, A. (2022) Implementation of Data Mining on Secure Cloud Computing over a Web API Using a Supervised Machine Learning Algorithm. Proceedings of the Artificial Intelligence Trends in Systems: Proceedings of 11th Computer Science On-Line Conference, 2, 203-210.
[13]  Hassan, O.F., Aderibigbe, O.O., Efijemue, O.P. and Onasanya, T.D. (2024) The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States. International Journal of Computer Science and Information Technology, 16, 11-23.
https://doi.org/10.5121/ijcsit.2024.16202
[14]  Vinoth, S., Vemula, H.L., Haralayya, B., Mamgain, P., Hasan, M.F. and Naved, M. (2022) Application of Cloud Computing in Banking and E-Commerce and Related Security Threats. Materials Today: Proceedings, 51, 2172-2175.
https://doi.org/10.1016/j.matpr.2021.11.121
[15]  Abdulshaheed, H.R., Binti, S.A. and Sadiq, I.I. (2018) A Review on Smart Solutions Based-On Cloud Computing and Wireless Sensing. International Journal of Pure and Applied Mathematics, 119, 461-486.
[16]  Ahmad, W., Rasool, A., Javed, A.R., Baker, T. and Jalil, Z. (2021) Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics, 11, Article No. 16.
https://doi.org/10.3390/electronics11010016
[17]  Ghobaei-Arani, M., Souri, A., Baker, T. and Hussien, A. (2019) Controcity: An Autonomous Approach for Controlling Elasticity Using Buffer Management in Cloud Computing Environment. IEEE Access, 7, 106912-106924.
https://doi.org/10.1109/access.2019.2932462
[18]  Su, J. (2019) Why Cloud Computing Cyber Security Risks Are on the Rise: Report. Forbes, 25 July 2019.
https://www.forbes.com/sites/jeanbaptiste/2019/07/25/why-cloud-computing-cyber-security-risks-are-on-the-rise-report/#13a36bfc5621
[19]  Shabbir, M., Shabbir, A., Iwendi, C., Javed, A.R., Rizwan, M., Herencsar, N., et al. (2021) Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing. IEEE Access, 9, 8820-8834.
https://doi.org/10.1109/access.2021.3049564
[20]  Mohiyuddin, A., Javed, A.R., Chakraborty, C., Rizwan, M., Shabbir, M. and Nebhen, J. (2021) Secure Cloud Storage for Medical IoT Data Using Adaptive Neuro-Fuzzy Inference System. International Journal of Fuzzy Systems, 24, 1203-1215.
https://doi.org/10.1007/s40815-021-01104-y
[21]  Mishra, N., Singh, R.K. and Yadav, S.K. (2020) Analysis and Vulnerability Assessment of Various Models and Frameworks in Cloud Computing. In: Jain, V., Chaudhary, G., Taplamacioglu, M. and Agarwal, M., Eds., Advances in Data Sciences, Security and Applications, Lecture Notes in Electrical Engineering, Vol. 612, Springer, 407-417.
[22]  Tahirkheli, A.I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., et al. (2021) A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges. Electronics, 10, Article No. 1811.
https://doi.org/10.3390/electronics10151811
[23]  Tabrizchi, H. and Kuchaki Rafsanjani, M. (2020) A Survey on Security Challenges in Cloud Computing: Issues, Threats, and Solutions. The Journal of Supercomputing, 76, 9493-9532.
https://doi.org/10.1007/s11227-020-03213-1
[24]  Bhuvaneswary, N., Prabu, S., Tamilselvan, K. and Parthiban, K.G. (2021) Efficient Implementation of Multiply Accumulate Operation Unit Using an Interlaced Partition Multiplier. Journal of Computational and Theoretical Nanoscience, 18, 1321-1326.
https://doi.org/10.1166/jctn.2021.9398
[25]  Mohammed Sadeeq, M., Abdulkareem, N.M., Zeebaree, S.R.M., Mikaeel Ahmed, D., Saifullah Sami, A. and Zebari, R.R. (2021) IoT and Cloud Computing Issues, Challenges and Opportunities: A Review. Qubahan Academic Journal, 1, 1-7.
https://doi.org/10.48161/qaj.v1n2a36
[26]  Abbas, Z. and Myeong, S. (2023) Enhancing Industrial Cyber Security, Focusing on Formulating a Practical Strategy for Making Predictions through Machine Learning Tools in Cloud Computing Environment. Electronics, 12, Article No. 2650.
https://doi.org/10.3390/electronics12122650
[27]  Tahsien, S.M., Karimipour, H. and Spachos, P. (2020) Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey. Journal of Network and Computer Applications, 161, Article 102630.
https://doi.org/10.1016/j.jnca.2020.102630
[28]  Hobbes, T. (1641) The Third Set of Objections to Descartes Meditations. In: The Philosophical Writings of Descartes, Vol. 2, Trans. J. Cottingham, R. Stoothoff and D. Murdoch, Cambridge University Press, 121-137.
[29]  Beccaria, C., Newman, G.R. and Marongiu, P. (2009) On Crimes and Punishments. Transaction Publishers.
[30]  Moyer, I.L. (2001) Criminological Theory: Traditional and Nontraditional Voices and Themes. Sage.
[31]  Wilson, J.Q. and Herrnstein, R.J. (1985) Crime and Human Nature. Simon & Schuster.
[32]  Saeed, S., Altamimi, S.A., Alkayyal, N.A., Alshehri, E. and Alabbad, D.A. (2023) Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations. Sensors, 23, Article No. 6666.
https://doi.org/10.3390/s23156666
[33]  Nagahawatta, R., Lokuge, S., Warren, M. and Salzman, S. (2021) Cybersecurity Issues and Practices in a Cloud Context: A Comparison amongst Micro, Small and Medium Enterprises. 32nd Australasian Conference on Information Systems (ACIS 2021), Sydney, 6-10 December 2021, 1-9.
[34]  Breiman, L. (2001) Random Forests. Machine Learning, 45, 5-32.
https://doi.org/10.1023/a:1010933404324
[35]  Liaw, A. and Wiener, M. (2002) Classification and Regression by Random Forest. R News, 2, 18-22.
https://www.r-project.org/doc/Rnews/Rnews_2002-3.pdf
[36]  Rodriguez-Galiano, V.F., Ghimire, B., Rogan, J., Chica-Olmo, M. and Rigol-Sanchez, J.P. (2012) An Assessment of the Effectiveness of a Random Forest Classifier for Land-Cover Classification. ISPRS Journal of Photogrammetry and Remote Sensing, 67, 93-104.
https://doi.org/10.1016/j.isprsjprs.2011.11.002
[37]  Nassif, A.B., Talib, M.A., Nasir, Q., Albadani, H. and Dakalbab, F.M. (2021) Machine Learning for Cloud Security: A Systematic Review. IEEE Access, 9, 20717-20735.
https://doi.org/10.1109/access.2021.3054129
[38]  Gupta, I., Gupta, R., Singh, A.K. and Buyya, R. (2021) MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment. IEEE Systems Journal, 15, 4248-4259.
https://doi.org/10.1109/jsyst.2020.3035666
[39]  Folorunsho, F.O., Korkor, P.M., Omolola, H.F. and Adeniyi, P.P. (2023) Quantitative Approaches to Forecasting the Economic Impact of Technological Disruptions in Making Informed Decisions for Sustainable Economic Growth in the U.S. International Journal of Advance Research, Ideas and Innovations in Technology, 9.
https://www.IJARIIT.com

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133