Secure Approach for Cloud: A Comprehensive Survey of Security Measures
Keywords:
Cloud, Federated Learning (FL), Service Level Agreement (SLA), Quality Of Service (QoS)Abstract
Clients using federated learning can learn a global model simultaneously without submitting their own training data to a central server in the cloud. Malicious clients, however, can potentially damage the global model, leading to inaccurate predictions of legal test labels. Federated Learning (FL) protects user privacy by transmitting information from a centralized server to individual endpoints, allowing AI to be applied to areas with sensitive information and heterogeneity. In addition, iterative local model training methods on end-devices allow computing resources to be shared among the involved parties as opposed to depending on a centralized server. One of the extremely fast fields of machine learning, FL is promising to keep up with new regulations protecting user data according to its decentralized data model. In addition to protecting users' confidentiality, FL provides the benefits of ML to specialized areas where there is not enough data for a stand-alone ML model to be developed. As a result of FL's reputation for protecting user privacy, the technology is increasingly being used by industries that process sensitive information. However, Hackers and interested attackers can utilize the federated environment in novel ways because of the increased number of training variants, communications, and the exchange of model parameters. This can be used to influence the ML model's output or gain access to private user data. This research survey explores different technologies emerged for secure cloud environment with FL and ML terminology
Downloads
References
Saurabh Kumar Garg a, Steve Versteeg b, Rajkumar Buyya a, “A framework for ranking of cloud computing services,” Elsevier, 2013
Mohammad-Mahdi Bazm & Marc Lacoste & Mario Südholt & Jean-Marc Menaud “Isolation in cloud computing infrastructures: new security challenges”2018.
Xiang Wu a, Yongting Zhang a , Minyu Shi a , Pei Li b , Ruirui Li c , Neal N. Xiong“An adaptive federated learning scheme with differential privacy preserving,” Elsevier, 2021.
Lingjuan Lyu , Han Yu , Xingjun Ma, Chen Chen, Lichao Sun, Jun Zhao, Qiang Yang , Fellow, IEEE, and Philip S. Yu, Fellow, IEEE, “Privacy and Robustness in Federated Learning: Attacks and Defenses,” unpublished.2022
Ma S, Shuai X, Zhou Z, Qiao K (2018) Bionic mechanism based dynamic trust evaluation method in cloud environment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE)
Kaushik S, Gandhi C (2019) “Multi-level trust agreement in cloud environment. “,2019 Twelfth International Conference on Contemporary Computing (IC3), pp 1–5
Wang Y, Wen J, Zhou W, Luo F (2018) A novel dynamic cloud service trust evaluation model in cloud computing. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Kanwal A, Masood R, Shibli MA (2014) Evaluation and establishment of trust in cloud federation. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery
K. Wei et al., Federated learning with differential privacy: Algorithms and performance analysis, IEEE Trans. Inf. Forensics Secure. (2020)
C. Zhang et al., Batch crypt: Efficient homomorphic encryption for cross-silo federated learning, in: {USENIX}, 2020
Muhammad Habib ur Rehman, Khaled Salah, Ernesto Damiani, Davor Svetinovic ”Towards Blockchain-Based Reputation-Aware Federated Learning” August 24,2020 ,IEEE Explore
C. S. Rajarajeswari , M. Aramudhan “Ranking Model for SLA Resource Provisioning Management”2014.
Xiang Wu a, Yongting Zhang a, Minyu Shi a, Pei Li b, Ruirui Li c, Neal N. Xion “An adaptive federated learning scheme with differential privacy preserving”,2022
[14] L. Aruna1, M. Aramudhan2 ,“framework for ranking service providers of federated cloud architecture using fuzzy sets”,2016
Rabia Latif · Syeda Hadia Afzaal · Seemab Latif “A novel cloud management framework for trust establishment and evaluation in a federated cloud environment”,2021.
Navroop Kaur, Yachana, Sandeep K. Sood ,“A Trustworthy System for Secure Access to Patient Centric Sensitive Information”.
Bendiab K, Shiaeles S, Boucherkha S (2018) A new dynamic trust model for “on cloud” federated identity management. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
Challagidad PS, Birje MN (2019) Determination of trustworthiness of cloud service provider and cloud customer. In: 2019 5th International Conference on Advanced Computing Communication Systems (ICACCS).
Xinqian Zhang, Ming Hu Student Member, IEEE, Jun Xia, Tongquan Wei Senior Member, IEEE, Mingsong Chen Senior Member, IEEE, and Shiyan Hu Senior Member, IEEE(2020) “Efficient Federated Learning for Cloud-Based AIoT Applications”.
Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis, “PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments”,2021.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Y, “Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems”, ieee transactions on emerging topics in computing 2022.
Jafar A. Alzubi , Senior Member, IEEE, Omar A. Alzubi , Member, IEEE, Ashish Singh , and Manikandan Ramachandran, “Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning”January 2023.
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, and Heiko Ludwig, “DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting”,2022.
PremanandGhadekar, NiketDoke, SushmitaKaneri, Varsha Jha,”Secure Access Control to IoT Devices using Blockchain”, International Journal of Recent Technology and Engineering (IJRTE),2019
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.