Skip to main content

Modeling Cloud Computing Risk Assessment Using Machine Learning

  • Conference paper
Afro-European Conference for Industrial Advancement

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 334))

Abstract

Cloud computing emerged in recent years as the most significant developments in modern computing. However, there are several risks involved in using a cloud environment. To make the decision of migrating to cloud services there is a great need to assess the various risks involved. The main target of risk assessment is to define appropriate controls for reducing or eliminating those risks. We conducted a survey and formulated different associated risk factors to simulate the data from the experiments. We applied different feature selection algorithms such as Best-First, and random search algorithms methods to reduce the attributes to 3, 4, and 9 attributes, which enabled us to achieve better accuracy. Further, seven function approximation algorithms, namely Isotonic Regression, Randomizable Filter Classifier, Kstar, Extra Tree, IBK, multilayered perceptron, and SMOreg were selected after experimenting with more than thirty different algorithms. The experimental results reveal that feature reduction and prediction algorithms is very efficient and can achieve high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Paquette, S.J., Wilson, P.T., Susan, C.: Identifying the security risks associated with gov-ernmental use of cloud computing. Government Information Quarterly 27, 245–253 (2010)

    Article  Google Scholar 

  2. Brender, N., Markov, I.: Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management 33, 726–733 (2013)

    Article  Google Scholar 

  3. Avram, M.: Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective. Procedia Technology 12, 529–534 (2014)

    Article  Google Scholar 

  4. Carroll, M., van der Merwe, A., Kotze, P.: Secure cloud computing: Benefits, risks and controls. In: 2011 Information Security South Africa (ISSA), pp. 1–9 (2011)

    Google Scholar 

  5. Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15, 2852–2856 (2011)

    Article  Google Scholar 

  6. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1–11 (2011)

    Article  Google Scholar 

  7. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems 28, 583–592 (2012)

    Article  Google Scholar 

  8. Chandran, S.A., Mridula: Cloud Computing: Analyzing the risks involved in cloud computing environments. In: Proceedings of Natural Sciences and Engineering, pp. 2–4 (2010)

    Google Scholar 

  9. Phyu, T.N.: Survey of classification techniques in data mining. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, pp. 18–20 (2009)

    Google Scholar 

  10. Kantardzic, M.: Data mining: concepts, models, methods, and algorithms. John Wiley & Sons (2011)

    Google Scholar 

  11. Chauhan, H.K., Pundir, V., Pilli, S., Emmanuel, S.: A Comparative Study of Classification Techniques for Intrusion Detection. In: 2013 International Symposium on Computational and Business Intelligence (ISCBI), pp. 40–43 (2013)

    Google Scholar 

  12. Liu, H.Y., Lei: Toward integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering 17, 491–502 (2005)

    Article  Google Scholar 

  13. Jain, A.Z., Douglas: Feature selection: Evaluation, application, and small sample performance. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 153–158 (1997)

    Article  Google Scholar 

  14. Serpico, S.B.B., Lorenzo: A new search algorithm for feature selection in hyperspectral remote sensing images. IEEE Transactions on Geoscience and Remote Sensing 39, 1360–1367 (2001)

    Article  Google Scholar 

  15. Ali, S.S., Kate, A.: On learning algorithm selection for classification. Applied Soft Computing 6, 119–138 (2006)

    Article  Google Scholar 

  16. Han, J.K., Micheline: Data Mining, Southeast Asia Edition: Concepts and Techniques. Morgan kaufmann (2006)

    Google Scholar 

  17. Désir, C.P., Heutte, C., Salaun, L., Thiberville, M., Luc: Classification of endomicroscopic images of the lung based on random subwindows and extra-trees. IEEE Transactions on Biomedical Engineering 59, 2677–2683 (2012)

    Article  Google Scholar 

  18. Witten, I.H.F., Trigg, E., Hall, L.E., Holmes, M.A., Cunningham, G., Jo, S.: Weka: Practical machine learning tools and techniques with Java implementations (1999)

    Google Scholar 

  19. Shevade, S.K.K., Bhattacharyya, S.S., Murthy, C., Krishna, K.R.: Improvements to the SMO algorithm for SVM regression. IEEE Transactions on Neural Networks 11, 1188–1193 (2000)

    Article  Google Scholar 

  20. Karagiannopoulos, M., Anyfantis, D., Kotsiantis, S.B., Pintelas, P.E.: Feature selection for regression problems. In: Proceedings of HERCMA 2007 (2007)

    Google Scholar 

  21. Kotsiantis, S.B., Zaharakis, I.D., Pintelas, P.E.: Supervised machine learning: A review of classification techniques (2007)

    Google Scholar 

  22. Cleary, J.G.T., Leonard, E.: K^*: An Instance-based Learner Using an Entropic Distance Measure. In: ICML, pp. 108–114 (1995)

    Google Scholar 

  23. Wu, C.-H., Su, W.-H., Ho, Y.-W.: A study on GPS GDOP approximation using support-vector machines. IEEE Transactions on Instrumentation and Measurement 60, 137–145 (2011)

    Article  Google Scholar 

  24. http://weka.sourceforge.net/doc.dev/weka/classifiers/meta/package-summary.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nada Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmed, N., Abraham, A. (2015). Modeling Cloud Computing Risk Assessment Using Machine Learning. In: Abraham, A., Krömer, P., Snasel, V. (eds) Afro-European Conference for Industrial Advancement. Advances in Intelligent Systems and Computing, vol 334. Springer, Cham. https://doi.org/10.1007/978-3-319-13572-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13572-4_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13571-7

  • Online ISBN: 978-3-319-13572-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics