Secure Approach for Cloud: A Comprehensive Survey of Security Measures

Authors

  • Madhumati B Shinde, Premanand P Ghadekar

Keywords:

Cloud, Federated Learning (FL), Service Level Agreement (SLA), Quality Of Service (QoS)

Abstract

Clients using federated learning can learn a global model simultaneously without submitting their own training data to a central server in the cloud. Malicious clients, however, can potentially damage the global model, leading to inaccurate predictions of legal test labels. Federated Learning (FL) protects user privacy by transmitting information from a centralized server to individual endpoints, allowing AI to be applied to areas with sensitive information and heterogeneity. In addition, iterative local model training methods on end-devices allow computing resources to be shared among the involved parties as opposed to depending on a centralized server. One of the extremely fast fields of machine learning, FL is promising to keep up with new regulations protecting user data according to its decentralized data model. In addition to protecting users' confidentiality, FL provides the benefits of ML to specialized areas where there is not enough data for a stand-alone ML model to be developed. As a result of FL's reputation for protecting user privacy, the technology is increasingly being used by industries that process sensitive information. However, Hackers and interested attackers can utilize the federated environment in novel ways because of the increased number of training variants, communications, and the exchange of model parameters. This can be used to influence the ML model's output or gain access to private user data. This research survey explores different technologies emerged for secure cloud environment with FL and ML terminology

Downloads

Download data is not yet available.

References

Saurabh Kumar Garg a, Steve Versteeg b, Rajkumar Buyya a, “A framework for ranking of cloud computing services,” Elsevier, 2013

Mohammad-Mahdi Bazm & Marc Lacoste & Mario Südholt & Jean-Marc Menaud “Isolation in cloud computing infrastructures: new security challenges”2018.

Xiang Wu a, Yongting Zhang a , Minyu Shi a , Pei Li b , Ruirui Li c , Neal N. Xiong“An adaptive federated learning scheme with differential privacy preserving,” Elsevier, 2021.

Lingjuan Lyu , Han Yu , Xingjun Ma, Chen Chen, Lichao Sun, Jun Zhao, Qiang Yang , Fellow, IEEE, and Philip S. Yu, Fellow, IEEE, “Privacy and Robustness in Federated Learning: Attacks and Defenses,” unpublished.2022

Ma S, Shuai X, Zhou Z, Qiao K (2018) Bionic mechanism based dynamic trust evaluation method in cloud environment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE)

Kaushik S, Gandhi C (2019) “Multi-level trust agreement in cloud environment. “,2019 Twelfth International Conference on Contemporary Computing (IC3), pp 1–5

Wang Y, Wen J, Zhou W, Luo F (2018) A novel dynamic cloud service trust evaluation model in cloud computing. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

Kanwal A, Masood R, Shibli MA (2014) Evaluation and establishment of trust in cloud federation. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery

K. Wei et al., Federated learning with differential privacy: Algorithms and performance analysis, IEEE Trans. Inf. Forensics Secure. (2020)

C. Zhang et al., Batch crypt: Efficient homomorphic encryption for cross-silo federated learning, in: {USENIX}, 2020

Muhammad Habib ur Rehman, Khaled Salah, Ernesto Damiani, Davor Svetinovic ”Towards Blockchain-Based Reputation-Aware Federated Learning” August 24,2020 ,IEEE Explore

C. S. Rajarajeswari , M. Aramudhan “Ranking Model for SLA Resource Provisioning Management”2014.

Xiang Wu a, Yongting Zhang a, Minyu Shi a, Pei Li b, Ruirui Li c, Neal N. Xion “An adaptive federated learning scheme with differential privacy preserving”,2022

[14] L. Aruna1, M. Aramudhan2 ,“framework for ranking service providers of federated cloud architecture using fuzzy sets”,2016

Rabia Latif · Syeda Hadia Afzaal · Seemab Latif “A novel cloud management framework for trust establishment and evaluation in a federated cloud environment”,2021.

Navroop Kaur, Yachana, Sandeep K. Sood ,“A Trustworthy System for Secure Access to Patient Centric Sensitive Information”.

Bendiab K, Shiaeles S, Boucherkha S (2018) A new dynamic trust model for “on cloud” federated identity management. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

Challagidad PS, Birje MN (2019) Determination of trustworthiness of cloud service provider and cloud customer. In: 2019 5th International Conference on Advanced Computing Communication Systems (ICACCS).

Xinqian Zhang, Ming Hu Student Member, IEEE, Jun Xia, Tongquan Wei Senior Member, IEEE, Mingsong Chen Senior Member, IEEE, and Shiyan Hu Senior Member, IEEE(2020) “Efficient Federated Learning for Cloud-Based AIoT Applications”.

Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis, “PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments”,2021.

Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Y, “Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems”, ieee transactions on emerging topics in computing 2022.

Jafar A. Alzubi , Senior Member, IEEE, Omar A. Alzubi , Member, IEEE, Ashish Singh , and Manikandan Ramachandran, “Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning”January 2023.

Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, and Heiko Ludwig, “DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting”,2022.

PremanandGhadekar, NiketDoke, SushmitaKaneri, Varsha Jha,”Secure Access Control to IoT Devices using Blockchain”, International Journal of Recent Technology and Engineering (IJRTE),2019

Downloads

Published

24.03.2024

How to Cite

Premanand P Ghadekar, . M. B. S. . (2024). Secure Approach for Cloud: A Comprehensive Survey of Security Measures. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2670–2677. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5740

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.