Skip to main content

Performance Evaluation of ML-Based AWS Security Evaluation Model for Cloud Computing

  • Conference paper
  • First Online:
Intelligent Computing and Communication (ICICC 2022)

Abstract

As there is a great increase in demand for cloud services, the number of companies that provide cloud services have been increased in number. Cloud-based web services wholly depends on the service provides by the companies. Hence, it is very essential to choose the cloud service provider for obtaining best services. API consistently gives access to different cloud services. In this paper a quantifiable security evaluation system for various clouds is analyzed. A set of evaluation elements are present in the security evaluation model which compresses of various sectors via storage, computing, maintenance, application security, etc. The major aim of this paper is to deal with the issues related and exhibits the comparison of Amazon Work Space (AWS) and International Business Machines (IBM) cloud. Either of the cloud service platforms are compared with each other under some situations for respective instances. A machine learning-based CNN method is used for developing the proposed cloud computing. This mechanism calculates the score for each field and gives the total score as result in order to create one secured pattern. Dynamic security scanning is done for single or multiple clouds by using visual graphs and cloud users are guided for improvement of cloud operations, changing the configuration and to provide protection against vulnerabilities. This ultimately results in the enhancement of security in cloud resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jayanthiladevi R, Mohanasundaram A, Keerthana G (2020) Software defined cloud infrastructure. In: Handbook of research on cloud and fog computing infrastructures for data science, pp 108–123

    Google Scholar 

  2. John W, Rittinghouse, James Ransome F (2020) Cloud computing: implementation, management, and security

    Google Scholar 

  3. Ahmed M, Hossain MA (2019) Cloud computing and security issues in the cloud. Int J Netw Secur Appl 6(1)

    Google Scholar 

  4. Choudhury S, Jain T, Kumar P, Rathore YS (2019) Communication by terrorist using access points: cyber security. SmartTechConference. IEEE Explore

    Google Scholar 

  5. Curran K, Sean C (2018) Cloud computing security

    Google Scholar 

  6. Avuya M, Gerber M, MostertPhipps N (2018) Information security risk measures for Cloud based personal health records. In: 2018 international conference on information society. IEEE

    Google Scholar 

  7. Chitra Rajagopal P (2018) Cloud security algorithm to enhance the security of the layers. In: 5th IntrnConf on Sys modeling and advancement in research trends

    Google Scholar 

  8. John H (2017) Data security in the world of cloud computing. IEEE

    Google Scholar 

  9. Sharma A, Choudhury T (2017) Health monitoring & management using IoT devices in a cloud based framework. In: International conference on advances in computing and communication engineering (ICACCE), IEEE Explore

    Google Scholar 

  10. Ali M, Khan SU, Vasilakos AV (2016) Security in cloud computing: opportunities and challenges. Inform Sci Cloud Comput 305:357–383

    Google Scholar 

  11. Oscar R (2015) Empirical evaluation of a cloud computing information security governance framework. Inform Softw Technol 44–57

    Google Scholar 

  12. Akhil B (2015) An analysis of cloud computing security issues. IEEE

    Google Scholar 

  13. Narula S, Jain A, Prachi (2015) Cloud computing security: Amazon Web Service. IEEE

    Google Scholar 

  14. Zeng W, Zhao J, Liu M, Zhao J, Liu M (2012) Several public commercial clouds and open-source cloud computing software. In: 7th international conference on CSE (ICCSE) 2012

    Google Scholar 

  15. Alexander O (2011) Implementing security rules, safeguards, and IPS tools for private cloud infrastructures. Infrastructure Security as a Service (ISaaS), GROOT

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. L. Malleswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malleswari, B.L., Kolachalama, R., Srivallii, V.S. (2023). Performance Evaluation of ML-Based AWS Security Evaluation Model for Cloud Computing. In: Seetha, M., Peddoju, S.K., Pendyala, V., Chakravarthy, V.V.S.S.S. (eds) Intelligent Computing and Communication. ICICC 2022. Advances in Intelligent Systems and Computing, vol 1447. Springer, Singapore. https://doi.org/10.1007/978-981-99-1588-0_59

Download citation

Publish with us

Policies and ethics