[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Machine Learning–Based Identity and Access Management for Cloud Security

  • Chapter
  • First Online:
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities

Abstract

Cloud computing has the potential to offer an abundance of computing resources on demand due to its high scalability, which eliminates the need for providers to plan far in advance for hardware provisioning. Security remains a significant challenge in promoting cloud computing, but artificial intelligence (AI) can improve cloud services by enhancing security features. The privacy issue arises from the multiple data storage locations and available cloud services. Identity management services are crucial in establishing secure and efficient relationships in the cloud and cross-cloud environments by authenticating users based on their identity properties and past interactions. To incorporate AI, cloud security must be improved to provide an effective solution for data storage. We suggest AI-enabled cloud services security in this proposed architecture to protect cloud service users. Our model uses AI to identify users’ identities and restricts malicious access to cloud services, and it was trained based on CloudSim-generated datasets. Quality of services (QoS) was used to measure the architecture’s efficiency, and the results showed that the proposed architecture was effective and fruitful for users. The results effectively show the improvements in network throughput under congestion control with the proposed approach compared with existing state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 99.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmad, S., Khan, S., Jamil, F., Qayyum, F., Ali, A., Kim, D.: Design of a general complex problem-solving architecture based on task management and predictive optimization. Int. J. Distrib. Sensor Netw. 18(6), 15501329221107868 (2022)

    Article  Google Scholar 

  2. Razaque, A., Frej, M., Alotaibi, B., Alotaibi, M.: Privacy preservation Models for Third-Party Auditor over Cloud Computing: a Survey (2021)

    Google Scholar 

  3. Werner, J., Westphall, C.M., Westphall, C.B.J.C.N.: Cloud identity management: a survey on privacy strategies. Comput. Netw. 122, 29–42 (2017)

    Article  Google Scholar 

  4. Ali, A., et al.: An efficient dynamic-decision based task scheduler for task offloading optimization and energy management in mobile cloud computing. Sensors. 21(13), 4527 (2021)

    Article  Google Scholar 

  5. Ali, A., Iqbal, M.M.J.I.A.: A cost and energy efficient task scheduling technique to offload microservices based applications in mobile cloud computing. IEEE Access. 10, 46633–46651 (2022)

    Article  Google Scholar 

  6. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187–198 (2009)

    Google Scholar 

  7. Haji, L.M., Ahmad, O.M., Zeebaree, S., Dino, H.I., Zebari, R.R., Shukur, H.M.J.: Impact of cloud computing and internet of things on the future internet. Technol. Rep. Kansai Univ. 62(5), 2179–2190 (2020)

    Google Scholar 

  8. Naidu, P.R., Guruprasad, N., Gowda, V.D.: A high-availability and integrity layer for cloud storage, cloud computing security: from single to multi-clouds. J. Phys. Conf. Ser. 1921(1), 012072 (2021)

    Article  Google Scholar 

  9. Torok, G., Day, M.R., Hartman-Baker, R.J., Snavely, C.: Iris: allocation banking and identity and access management for the exascale era. In: SC20: International Conference for High Performance Computing, Networking, Storage and Analysis, pp. 1–11. IEEE (2020)

    Google Scholar 

  10. Pöhn, D., Hommel, W.: Proven and modern approaches to identity management. In: Advances in Cybersecurity Management, pp. 421–443. Springer (2021)

    Chapter  Google Scholar 

  11. Diaz-Piraquive, F.N., Ortiz-Ruiz, E., González-Aragón, J.J., Avila-Bermeo, H.H., Parada-Jaimes, W.D.: Knowledge management applied in the comparative study of the IRETE intrusion methodology to access to the computer systems. In: International Conference on Knowledge Management in Organizations, pp. 354–365. Springer (2021)

    Google Scholar 

  12. Ali, A., Jamil, F., Whangbo, T., Ahmad, S.: AI-Enabled Cybernetic Analytics of Security Models for Smart Serious Games-Based Mobile Operating Systems

    Google Scholar 

  13. Ali, A., et al.: VABLOCK: a blockchain-based secure communication in V2V network using icn network support technology. Microprocess. Microsyst. 93, 104569 (2022)

    Article  Google Scholar 

  14. Zhang, Z., et al.: Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif. Intell. Rev. 55(2), 1029–1053 (2022)

    Article  Google Scholar 

  15. Singh, P., Singh, N., Luxmi, P.R., Saxena, A.: Artificial intelligence for smart data storage in cloud-based IoT. In: Transforming Management with AI, Big-Data, and IoT, pp. 1–15. Springer (2022)

    Google Scholar 

  16. Ahmad, S., Mehfuz, S., Beg, J.: Empirical analysis of security enabled quantum computing for cloud environment. In: Quantum and Blockchain for Modern Computing Systems: Vision and Advancements, pp. 103–125. Springer (2022)

    Chapter  Google Scholar 

  17. N. J. S. C. Moustafa and Society: A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain. Cities Soc. 72, 102994 (2021)

    Article  Google Scholar 

  18. Abd El-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, A.J.I.A.: Secure quantum steganography protocol for fog cloud internet of things. IEEE Access. 6, 10332–10340 (2018)

    Article  Google Scholar 

  19. Tabrizchi, H., Rafsanjani, M.K.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493–9532 (2020)

    Article  Google Scholar 

  20. Li, Y., Kumar, R., Lasecki, W.S., Hilliges, O.: Artificial intelligence for HCI: A modern approach. In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–8 (2020)

    Google Scholar 

  21. Abd-El-Atty, B., Iliyasu, A.M., Alaskar, H., El-Latif, A., Ahmed, A.J.S.: A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors. 20(11), 3108 (2020)

    Article  Google Scholar 

  22. Andrew, S., Watson, S., Oh, T., Tigwell, G.W.: A review of literature on accessibility and authentication techniques. In: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, pp. 1–4 (2020)

    Google Scholar 

  23. Jagadamba, G., Sheeba, R., Brinda, K., Rohini, K., Pratik, S.: Adaptive e-learning authentication and monitoring. In: 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp. 277–283. IEEE (2020)

    Google Scholar 

  24. Rizvi, S., Mitchell, J., Razaque, A., Rizvi, M.R., Williams, I.J.: A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers. J. Cloud Comput. 9(1), 1–17 (2020)

    Article  Google Scholar 

  25. Alakbarov, R.G.: Challenges of mobile devices’ resources and in communication channels and their solutions. Int. J. Comp. Netw. Inf. Secur. 13(1), 39–46 (2021)

    Google Scholar 

  26. Fellah, H., Mezioud, C., Batouche, M.C.: Mobile cloud computing: architecture, advantages and security issues. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security, pp. 1–9 (2020)

    Google Scholar 

  27. Butt, U.A., Amin, R., Mehmood, M., Aldabbas, H., Alharbi, M.T., Albaqami, N.: Cloud security threats and solutions: A survey. Wirel. Pers. Commun. 128(1), 387–413 (2023)

    Google Scholar 

  28. Abd El-Latif, A.A., et al.: Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys. A Stat. Mech. Appl. 541, 123687 (2020)

    Article  MathSciNet  Google Scholar 

  29. Alibrahemi, D.A.M.: Block RADG Cipher Automata in Cloud Computing Networks. Ministry of Higher Education (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jamil, H., Ali, A., Ammi, M., Kirichek, R., Muthanna, M.S.A., Jamil, F. (2024). Machine Learning–Based Identity and Access Management for Cloud Security. In: Abd El-Latif, A.A., Tawalbeh, L., Maleh, Y., Gupta, B.B. (eds) Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities . EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-51097-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51097-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51096-0

  • Online ISBN: 978-3-031-51097-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics