Modeling Cloud Computing Risk Assessment Using Machine Learning

作者: Nada Ahmed , Ajith Abraham

DOI: 10.1007/978-3-319-13572-4_26

关键词: Cloud computingData miningFunction approximationComputer scienceMachine learningRandom searchStatistical classificationFeature selectionPerceptronCloud testingClassifier (UML)Artificial intelligence

摘要: Cloud computing emerged in recent years as the most significant developments modern computing. However, there are several risks involved using a cloud environment. To make decision of migrating to services is great need assess various involved. The main target risk assessment define appropriate controls for reducing or eliminating those risks. We conducted survey and formulated different associated factors simulate data from experiments. applied feature selection algorithms such Best-First, random search methods reduce attributes 3, 4, 9 attributes, which enabled us achieve better accuracy. Further, seven function approximation algorithms, namely Isotonic Regression, Randomizable Filter Classifier, Kstar, Extra Tree, IBK, multilayered perceptron, SMOreg were selected after experimenting with more than thirty algorithms. experimental results reveal that reduction prediction very efficient can high

参考文章(24)
Leonard E. Trigg, Mark A. Hall, Ian H. Witten, Eibe Frank, Sally Jo Cunningham, Geoffrey Holmes, Weka: Practical machine learning tools and techniques with Java implementations ,(1999)
John G. Cleary, Leonard E. Trigg, K*: An Instance-based Learner Using an Entropic Distance Measure Machine Learning Proceedings 1995. pp. 108- 114 ,(1995) , 10.1016/B978-1-55860-377-6.50022-0
Sotiris B. Kotsiantis, Supervised Machine Learning: A Review of Classification Techniques Informatica (lithuanian Academy of Sciences). ,vol. 31, pp. 249- 268 ,(2007)
Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments Procedia Engineering. ,vol. 15, pp. 2852- 2856 ,(2011) , 10.1016/J.PROENG.2011.08.537
Chih-Hung Wu, Wei-Han Su, Ya-Wei Ho, A Study on GPS GDOP Approximation Using Support-Vector Machines IEEE Transactions on Instrumentation and Measurement. ,vol. 60, pp. 137- 145 ,(2011) , 10.1109/TIM.2010.2049228
Mariana Carroll, Alta van der Merwe, Paula Kotze, Secure cloud computing: Benefits, risks and controls information security for south africa. pp. 1- 9 ,(2011) , 10.1109/ISSA.2011.6027519
Dimitrios Zissis, Dimitrios Lekkas, Addressing cloud computing security issues Future Generation Computer Systems. ,vol. 28, pp. 583- 592 ,(2012) , 10.1016/J.FUTURE.2010.12.006
Scott Paquette, Paul T. Jaeger, Susan C. Wilson, Identifying the security risks associated with governmental use of cloud computing Government Information Quarterly. ,vol. 27, pp. 245- 253 ,(2010) , 10.1016/J.GIQ.2010.01.002
Chesner Desir, Caroline Petitjean, Laurent Heutte, Mathieu Salaun, Luc Thiberville, Classification of Endomicroscopic Images of the Lung Based on Random Subwindows and Extra-Trees IEEE Transactions on Biomedical Engineering. ,vol. 59, pp. 2677- 2683 ,(2012) , 10.1109/TBME.2012.2204747