Altmetrics
Downloads
164
Views
58
Comments
0
A peer-reviewed article of this preprint also exists.
supplementary.rar (554.88KB )
This version is not peer-reviewed
Submitted:
21 May 2023
Posted:
22 May 2023
You are already at the latest version
Year | Study | Focus | Key Findings and Limitations |
---|---|---|---|
2016 | Kaur et al. [32] | Data classification In cloud |
Analyze the security issues at authentication and storage. Development of data classification model. Author does not suggest any framework to solve the security concerns. |
2017 | Salman et al. [33] | Anomaly detection and classification | Detection of attacks and their classification by LR and RF. 99 % detection and 93.6 % classification accuracy by RF. Fail to categorize some attacks. |
2018 | Marwan et al. [34] | Healthcare cloud data security | Prevent unauthorized asses to healthcare cloud data. Use of SVM and FCM for image pixel classification to ensure security. Only focus on image segmentation for security and privacy and does not mention future challenges. |
2019 | Subramanian et al. [35] | Cloud cyber security | Avoid static nature for security verification of cloud. Used CNN model for automatic response to threats and save enterprise data. Does not mention type of threats, privacy, trust issues and future challenges in cyber cloud |
2020 | Praveena et al. [36] | Hybrid cloud security | Reduction of security risks to hybrid cloud by enhanced C4.5 algorithm. Determine the level of security during storing and authorizing the data. Author does not discuss threats and trust issues and future concerns of hybrid cloud. |
2020 | Wang et al. [37] | DDOS attack detection | MLP based model to detect the DDOS attacks. Detection based on the feature selection and feedback mechanism to for detection error. Model not able to find global optimized feature, feedback mechanism can generate false response. |
2020 | Chkirbene et al. [27] | Anomalies detection | Classify scheme to protect network from unwanted nodes. Reduce incorrect data issues and differentiate attacks. Author does not discuss trust concerns, industrial cyber issues, and insufficient models' comparison. |
2021 | Haseeb et al. [38] | Health industrial IoT security | Avoid uncertainty in data management of health sector. Data protection by EDM-ML approach and ensures trust between networks. Does not compare performance of Models and not mention future prospects. |
2021 | Alsharif et al. [39] | IoT security | ML-IDS are used to take account of traffic defects. Offloading heavy tasks from cloud. Does not studied industrial cyber cloud concerns, issues regarding using ML approach for cloud. |
2022 | Tabassum et al. [33] | QoS security | Neuro-fuzzy approach to study cloud security, reliability, and efficiency. Discuss threats, security, and trust issues. No comparison of model's performance. |
2022 | Bangui et al. [40] | Threat detection in Vehicular Ad-hoc Network (VANET) | Detection and Prevention of Intrusion in VANET. Use of RF and coresets detection for increasing detection efficacy. Does not provide proper solution to the different types of threats. Lack of performance comparison and trust or privacy factors. |
Sr No. | Survey Questions |
---|---|
1. | How familiar are you with cloud computing security and machine learning? |
2. | Have you or your organization implemented any cloud computing security measures in your operations? |
3. | What are the biggest security concerns you have about cloud computing? |
4. | How do you think ML can be used to improve cloud computing security? |
5. | How confident are you in the effectiveness of current cloud computing security measures? |
6. | In your opinion, what are the biggest challenges in implementing effective cloud computing security? |
7. | How often do you or your organization conduct security assessments or audits for cloud computing systems? |
8. | What role do you think human factors play in cloud computing security? |
9. | What measures do you think cloud service providers should take to improve the security of their offerings? |
10. | How do you think regulations and compliance requirements affect cloud computing security? |
11. | How can organizations ensure their cloud service providers comply with security standards and regulations? |
12. | How do you think increasing Internet of Things (IoT) devices affect cloud computing security? |
13. | How effective do you believe machine learning has improved the security of your industry's cloud computing operations? |
14. | How important is security in your industry's cloud computing operations? |
15. | What are your future plans for using machine learning in cloud computing security in your industry? |
Model | Accuracy | Precision | Recall | F1-score | ROC-AUC |
XGB | 97.50 | 97.60 | 97.60 | 97.50 | 1 |
SVM | 97.35 | 97.30 | 97.30 | 97.30 | 1 |
MLP | 96.20 | 96.21 | 96.20 | 96.20 | 99 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated