Skip to main content

Modeling Cloud Computing Risk Assessment Using Ensemble Methods

  • Conference paper
  • First Online:
Pattern Analysis, Intelligent Security and the Internet of Things

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 355))

Abstract

Risk Assessment is a common practice in the information system security domain, besides that it is a useful tool to assess risk exposure and drive management decisions. Cloud computing has been an emerging computing model in the IT field. It provides computing resources as general utilities that can be leased and released by users in an on-demand fashion. It is about growing interest in many companies around the globe, but adopting cloud computing comes with greater risks, which need to be assessed. The main target of risk assessment is to define appropriate controls for reducing or eliminating those risks. The goal of this paper was to use an ensemble technique to increase the predictive performance. The main idea of using ensembles is that the combination of predictors can lead to an improvement of a risk assessment model in terms of better generalization and/or in terms of increased efficiency. We conducted a survey and formulated different associated risk factors to simulate the data from the experiments. We applied different feature selection algorithms such as best-first and random search algorithms and ranking methods to reduce the attributes to 4, 5, and 10 attributes, which enabled us to achieve better accuracy. Six function approximation algorithms, namely Isotonic Regression, Randomizable Filter Classifier, Kstar, Extra tree, IBK, and the multilayered perceptron, were selected after experimenting with more than thirty different algorithms. Further, the meta-schemes algorithm named voting is adopted to improve the generalization performance of best individual classifier and to build highly accurate risk assessment model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Avram, M.: Advantages and challenges of adopting cloud computing from an enterprise perspective. Proc. Technol. 12, 529–534 (2014)

    Article  Google Scholar 

  2. Paquette, S., Jaeger, P.T., Wilson, S.C.: Identifying the security risks associated with governmental use of cloud computing. Gov. Inf. Q. 27, 245–253 (2010)

    Article  Google Scholar 

  3. Carroll, M., Van Der Merwe, A., Kotze, P.: Secure cloud computing: benefits, risks and controls. In: Information Security South Africa (ISSA), vol. 2011, pp. 1–9 (2011)

    Google Scholar 

  4. Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc. Eng. 15, 2852–2856 (2011)

    Google Scholar 

  5. Brender, N., Markov, I.: Risk perception and risk management in cloud computing: results from a case study of Swiss companies. Int. J. Inf. Manag. 33, 726–733 (2013)

    Article  Google Scholar 

  6. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Google Scholar 

  7. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)

    Article  Google Scholar 

  8. Chandran, S., Angepat, M.: Cloud computing: analyzing the risks involved in cloud computing environments. Proc. Nat. Sci. Eng., 2–4 (2010)

    Google Scholar 

  9. Chen, H., Tiho, P., Yao, X.: Predictive ensemble pruning by expectation propagation. IEEE Trans. Knowl. Data Eng. 21, 999–1013 (2009)

    Article  Google Scholar 

  10. Freund, Y., Schapire, R.E.: A desicion-theoretic generalization of on-line learning and an application to boosting. In: Computational Learning Theory, pp. 23–37 (1995)

    Google Scholar 

  11. Partalas, I., Tsoumakas, G., Vlahavas, I.: An ensemble uncertainty aware measure for directed hill climbing ensemble pruning. Mach. Learn. 81, 257–282 (2010)

    Google Scholar 

  12. Li, L., Hu, Q., Wu, X., Yu, D.: Exploration of classification confidence in ensemble learning. Pattern Recogn. 47, 3120–3131 (2014)

    Google Scholar 

  13. Prodromidis, A., Chan, P., Stolfo, S.: Meta-learning in distributed data mining systems: Issues and approaches. In: Kargupta, H., Chan, P. (ed.) Advances in Distributed and Parallel Knowledge Discovery, AAAI/MIT Press (2000)

    Google Scholar 

  14. Dietterich, T.G.: Ensemble methods in machine learning. In: Multiple Classifier Systems, pp. 1–15. Springer, Berlin (2000)

    Google Scholar 

  15. Canuto, A.M., Abreu, M.C., de Melo Oliveira, L., Xavier, J.C., Santos, A.D.M.: Investigating the influence of the choice of the ensemble members in accuracy and diversity of selection-based and fusion-based methods for ensembles. Pattern Recogn. Lett. 28, 472–486 (2007)

    Google Scholar 

  16. Melville, P.: Creating Diverse Ensemble Classifiers. Computer Science Department, University of Texas at Austin (2003)

    Google Scholar 

  17. Han, J., Kamber, M.: Data Mining, Southeast Asia Edition: Concepts and Techniques. Morgan Kaufmann, Massachusetts (2006)

    Google Scholar 

  18. Désir, C., Petitjean, C., Heutte, L., Salaun, M., Thiberville, L.: Classification of endomicroscopic images of the lung based on random subwindows and extra-trees. IEEE Trans. Biomed. Eng. 59, 2677–2683 (2012)

    Google Scholar 

  19. Witten, I.H., Frank, E., Trigg, L.E., Hall, M.A., Holmes, G., Cunningham, S.J.: Weka: practical machine learning tools and techniques with Java implementations (1999). http://www.cs.waikato.ac.nz/ml/publications/1999/99IHW-EF-LT-MH-GH-SJC-Tools-Java.ps

  20. Chauhan, H., Kumar, V., Pundir, S., Pilli, E.S.: A comparative study of classification techniques for intrusion detection. In: 2013 International Symposium on Computational and Business Intelligence (ISCBI), pp. 40–43 (2013)

    Google Scholar 

  21. Ali, S.S., Kate, A.: On learning algorithm selection for classification. Appl. Soft Comput. 6, 119–138 (2006)

    Article  Google Scholar 

  22. Kotsiantis, S.B., Zaharakis, I.D., Pintelas, P.E.: Machine learning: a review of classification and combining techniques. Artif. Intell. Rev. 26(3), 159–190 (2007)

    Google Scholar 

  23. Phyu, T.N.: Survey of classification techniques in data mining. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, pp. 18–20 (2009)

    Google Scholar 

  24. Cleary, J.G., Trigg, LE.: K*: an instance-based learner using an entropic distance measure. In: ICML, pp. 108–114 (1995)

    Google Scholar 

  25. Wu, C.H., Su, W.H., Ho, Y.W.: A study on GPS GDOP approximation using support-vector machines. IEEE Trans. Instrum. Measur. 60, 137–145 (2011)

    Google Scholar 

  26. http://weka.sourceforge.net/doc.dev/weka/classifiers/meta/package-summary.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nada Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmed, N., Abraham, A. (2015). Modeling Cloud Computing Risk Assessment Using Ensemble Methods. In: Abraham, A., Muda, A., Choo, YH. (eds) Pattern Analysis, Intelligent Security and the Internet of Things. Advances in Intelligent Systems and Computing, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-17398-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17398-6_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17397-9

  • Online ISBN: 978-3-319-17398-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics