Abstract
Cloud computing emerged in recent years as the most significant developments in modern computing. However, there are several risks involved in using a cloud environment. To make the decision of migrating to cloud services there is a great need to assess the various risks involved. The main target of risk assessment is to define appropriate controls for reducing or eliminating those risks. We conducted a survey and formulated different associated risk factors to simulate the data from the experiments. We applied different feature selection algorithms such as Best-First, and random search algorithms methods to reduce the attributes to 3, 4, and 9 attributes, which enabled us to achieve better accuracy. Further, seven function approximation algorithms, namely Isotonic Regression, Randomizable Filter Classifier, Kstar, Extra Tree, IBK, multilayered perceptron, and SMOreg were selected after experimenting with more than thirty different algorithms. The experimental results reveal that feature reduction and prediction algorithms is very efficient and can achieve high accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Paquette, S.J., Wilson, P.T., Susan, C.: Identifying the security risks associated with gov-ernmental use of cloud computing. Government Information Quarterly 27, 245–253 (2010)
Brender, N., Markov, I.: Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management 33, 726–733 (2013)
Avram, M.: Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective. Procedia Technology 12, 529–534 (2014)
Carroll, M., van der Merwe, A., Kotze, P.: Secure cloud computing: Benefits, risks and controls. In: 2011 Information Security South Africa (ISSA), pp. 1–9 (2011)
Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15, 2852–2856 (2011)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1–11 (2011)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems 28, 583–592 (2012)
Chandran, S.A., Mridula: Cloud Computing: Analyzing the risks involved in cloud computing environments. In: Proceedings of Natural Sciences and Engineering, pp. 2–4 (2010)
Phyu, T.N.: Survey of classification techniques in data mining. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, pp. 18–20 (2009)
Kantardzic, M.: Data mining: concepts, models, methods, and algorithms. John Wiley & Sons (2011)
Chauhan, H.K., Pundir, V., Pilli, S., Emmanuel, S.: A Comparative Study of Classification Techniques for Intrusion Detection. In: 2013 International Symposium on Computational and Business Intelligence (ISCBI), pp. 40–43 (2013)
Liu, H.Y., Lei: Toward integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering 17, 491–502 (2005)
Jain, A.Z., Douglas: Feature selection: Evaluation, application, and small sample performance. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 153–158 (1997)
Serpico, S.B.B., Lorenzo: A new search algorithm for feature selection in hyperspectral remote sensing images. IEEE Transactions on Geoscience and Remote Sensing 39, 1360–1367 (2001)
Ali, S.S., Kate, A.: On learning algorithm selection for classification. Applied Soft Computing 6, 119–138 (2006)
Han, J.K., Micheline: Data Mining, Southeast Asia Edition: Concepts and Techniques. Morgan kaufmann (2006)
Désir, C.P., Heutte, C., Salaun, L., Thiberville, M., Luc: Classification of endomicroscopic images of the lung based on random subwindows and extra-trees. IEEE Transactions on Biomedical Engineering 59, 2677–2683 (2012)
Witten, I.H.F., Trigg, E., Hall, L.E., Holmes, M.A., Cunningham, G., Jo, S.: Weka: Practical machine learning tools and techniques with Java implementations (1999)
Shevade, S.K.K., Bhattacharyya, S.S., Murthy, C., Krishna, K.R.: Improvements to the SMO algorithm for SVM regression. IEEE Transactions on Neural Networks 11, 1188–1193 (2000)
Karagiannopoulos, M., Anyfantis, D., Kotsiantis, S.B., Pintelas, P.E.: Feature selection for regression problems. In: Proceedings of HERCMA 2007 (2007)
Kotsiantis, S.B., Zaharakis, I.D., Pintelas, P.E.: Supervised machine learning: A review of classification techniques (2007)
Cleary, J.G.T., Leonard, E.: K^*: An Instance-based Learner Using an Entropic Distance Measure. In: ICML, pp. 108–114 (1995)
Wu, C.-H., Su, W.-H., Ho, Y.-W.: A study on GPS GDOP approximation using support-vector machines. IEEE Transactions on Instrumentation and Measurement 60, 137–145 (2011)
http://weka.sourceforge.net/doc.dev/weka/classifiers/meta/package-summary.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ahmed, N., Abraham, A. (2015). Modeling Cloud Computing Risk Assessment Using Machine Learning. In: Abraham, A., Krömer, P., Snasel, V. (eds) Afro-European Conference for Industrial Advancement. Advances in Intelligent Systems and Computing, vol 334. Springer, Cham. https://doi.org/10.1007/978-3-319-13572-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-13572-4_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13571-7
Online ISBN: 978-3-319-13572-4
eBook Packages: EngineeringEngineering (R0)