Advancing Cybersecurity: A Comprehensive Approach to Enhance Threat Detection, Analysis, and Trust in Digital Environments
Keywords:
Cloud Computing, Cybersecurity, Digital Environments, Threat Detection, Threat AnalysisAbstract
The rapid expansion of Internet technologies has ushered in an era of unprecedented connectivity, resulting in vast and vulnerable attacks that demand robust countermeasures. Cloud computing has become integral to modern business, offering scalability and flexibility. Ensuring the security of cloud services remains paramount with a focus on confidentiality, availability, and integrity. Our primary objectives of cloud security services are Intrusion Detection and prevention systems (IDPS), Data-Driven threat analysis, and Trust computation framework for cloud services. IDPS oversees network traffic and system operations in cloud infrastructure to detect and counteract security threats and unauthorized access efforts. Cloud environments generate substantial data, comprising logs, user behaviors, and system events. A Data-Driven threat analysis model leverages this data to identify and analyze security threats and vulnerabilities specific to the cloud. Trust is a fundamental aspect of cloud computing, as users and organizations need to trust cloud service providers with their data and operations. The Trust Computation Framework assesses and quantifies the trustworthiness of cloud services, users, and entities within the cloud ecosystem. By integrating these three core elements, the cloud security service enhances the security of cloud environments, ensuring that unauthorized user behavior is promptly identified and mitigated. Employing this proactive strategy serves to mitigate the likelihood of data breaches, service interruptions, and various security concerns within the cloud environment. It concurrently fosters a sense of trust and transparency, benefiting both businesses and users in the realm of cloud computing.
Downloads
References
Tabrizchi, H., Kuchaki Rafsanjani, M. “A survey on security challenges in cloud computing: issues, threats, and solutions”. J Supercomput 76, 9493–9532, 2020, doi- 10.1007/s11227-020-03213-1.
Mohammed K. S. Alwaheidi, Shareeful Islam, "Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems",22(15), 5726, 2022, doi-10.3390/s22155726.
Aisha Kanwal Junejo, Imran Ali Jokhio, Tony Jan, "A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services", 11(13), 1932,2022, doi-10.3390/electronics11131932.
Jour Sheth, Mrs & Bhosale, Sachin & Kadam, Mr & Prof, Asst," Research Paper on Cloud Computing",2021.
D. Stalin David, M. Anam, C. Kaliappan, S. Arun Mozhi Selvi, D. Kumar Sharma, et al., "Cloud security service for identifying unauthorized user behavior," Computers, Materials & Continua, vol. 70, no.2, pp. 2581–2600, 2022.
Abdullah Aljumah, Tariq Ahamed Ahanger, "Cyber security threats, challenges and defense mechanisms in cloud computing",2020, doi-10.1049/it-com.2019.0040.
Mahdi Rabbani, Yong Li Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, Peng Hu, “A hybrid machine learning approach for malicious behavior detection and recognition in cloud computing”, Journal of Network and Computer Applications, Vol: 151,2020,102507, 2020, ISSN 1084-8045, doi- 10.1016/j.jnca.2019.102507.
El Kafhali, S., El Mir, I. & Hanini, M. Security Threats, Defense Mechanisms, "Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing”. Arch Computat Methods Eng 29, 223–246. 2022, doi-10.1007/s11831-021-09573-y.
Patrick Vanin, Thomas Newe, Lubna Luxmi Dhirani, Eoin O’Connell, Donna O’Shea, Brian Lee, Muzaffar Rao, "A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning",12(22), 11752, 2022, doi-10.3390/app122211752.
Ajay Kumar, K. Abhishek, M.R. Ghalib, A. Shankar, X. Cheng, "Intrusion detection and prevention system for an IoT environment", Digital Communications and Networks, Volume 8, Issue 4,2022, Pages 540-551, ISSN 2352-8648, doi-10.1016/2022.05.027.
Hee-Yong Kwon, Taesic Kim, Mun-Kyu Lee, "Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods”, 11(6), 867, 2022, doi-10.3390/11060867.
Bhavsar, M., Roy, K., Kelly, J. et al, "Anomaly-based intrusion detection system for IoT application" Discov Internet Things 3, 5 .2023, doi-10.1007/s43926-023-00034-5.
Jovana Mijalkovic, Angelo Spognardi, "Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems", 15(8), 258, 2022, doi-10.3390/a15080258.
Movva, P.V.M., Chintala, R.R., “A Brief Survey on Enhanced Quality of Service Mechanisms in Wireless Sensor Network for Secure Data Transmission”, Expert Clouds and Applications (ICOECA), vol 673, 2022, https://doi.org/10.1007/978-981-99-1745-7_22.
B. Reddy Bhimireddy, A. Nimmagadda, H. Kurapati, L. Reddy Gogula, R. Rani Chintala, and V. Chandra Jadala, "Web Security and Web Application Security: Attacks and Prevention”, International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 2095-2096, 2023, doi: 10.1109/ICACCS57279.2023.10112741.
M. Kumar and A. K. Singh, "Distributed Intrusion Detection System using Blockchain and Cloud Computing Infrastructure", International Conference on Trends in Electronics and Informatics (ICOEI), pp. 248-252, 2020, doi: 10.1109/ICOEI48184.2020.9142954.
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska, "A Survey on Intrusion Detection Systems for Fog and Cloud Computing", Innovative People-Centered Solutions Applied to Industries, Cities and Societies, 14(3), 89, 2022, https://doi.org/10.3390/fi14030089.
Charan, C., Pradeepthi, A., Jyotsna, J., Lalith, U., Chintala, R.R., Vadlamudi, D, “Big Data Security: Attack’s Detection Methods Using Digital Forensics”, Expert Clouds and Applications (ICOECA), vol 673, 2022, https://doi.org/10.1007/978-981-99-1745-7_7.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.