Document Type : Research Article
Author
University of Engineering and Technology, Lahore, Pakistan.
Abstract
Keywords
Main Subjects
[1] | HY Kim and KH Han and SS Shin. {A Model for Self-Authentication Based on Decentralized Identifier}. Journal of Convergence for Information Technology. 11: 66-74, 2021. [DOI ] |
[2] | Youngjun Song and Sunghyuck Hong. {BUILD A SECURE SMART CITY BY USING BLOCKCHAIN AND DIGITAL TWIN}. International Journal of Advanced Science and Convergence. 3: 9-13, 2021. [DOI ] |
[3] | Keping Yu and Long Lin and Mamoun Alazab and Tan Liang. {Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System}. IEEE Transactions on Intelligent Transportation Systems. 1-11, 2020. [DOI ] |
[4] | Umesh Kumar Singh and Abhishek Sharma. {Cloud Computing Security Framework Based on Shared Responsibility Models}. Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0. 17, 2021. |
[5] | Jeevith Hegde and Børge Rokseth. {Applications of machine learning methods for engineering risk assessment – A review}. Elsevier- Safety Science. 2019. [DOI ] |
[6] | Daniel S. Berman and Anna L. Buczak and Jeffrey S. Chavis and Cherita L. Corbett. {A survey of deep learning methods for cyber security}. MDPI. 2019. [DOI ] |
[7] | Varsha, Amit Wadhwa, Swati Gupta. {Study of Security Issues in Cloud Computing}. International Journal of Computer Science and Mobile Computing. 4: 230 – 234, 2015. |
[8] | Abhishek Sharma and Umesh Kumar Singh. {Modelling of smart risk assessment approach for cloud computing environment using AI \& supervised machine learning algorithms}. Global Transitions Proceedings. 2022. [DOI ] |
[9] | {RETRACTED ARTICLE: An optimised homomorphic CRT-RSA algorithm for secure and efficient communication}. Springer-Personal and Ubiquitous Computing. 27: 1405–1418, 2021. [DOI ] |
[10] | Arfa Arslaan Ikram and Abdul Rehman Javed and Muhammad Rizwan and Rabia Abid. {Mobile Cloud Computing Framework for Securing Data}. 44th International Conference on Telecommunications and Signal Processing (TSP)IEEE . 2021. [DOI ] |
[11] | Maryam Shabbir and Ayesha Shabbir and Celestine Iwendi and Abdul Rehman Javed. {Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing}. IEEE. 9: 8820 - 8834, 2021. [DOI ] |
[12] | Tian Xia and Hironori Washizaki and Yoshiaki Fukazawa and Haruhiko Kaiya. {CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development}. International Journal of Systems and Software Security and Protection. 12: 2021. [DOI ] |
[13] | Reza Montasari and Alireza Daneshkhah and Hamid Jahankhani and Amin Hosseinian-Far . {Cloud Computing Security: Hardware-Based Attacks and Countermeasures}. Digital Forensic Investigation of Internet of Things (IoT) Devices . 155–167, 2020. |
[14] | Marco Antonio Sotelo Monge and Jorge Maestre Vidal and . {Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge}. Elsevier. 125: 869-890, 2021. [DOI ] |
[15] | Rahul Kumar and Kamalakanta Sethi and Nishant Prajapati and Rashmi Ranjan Rout;. {Machine Learning based Malware Detection in Cloud Environment using Clustering Approach}. IEEE. 2020. [DOI ] |
[16] | Dharitri Tripathy and Rudrarajsinh Gohil and Talal Halabi. {Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning}. IEEE. 2020. [DOI ] |
[17] | Umer Ahmed Butt and Rashid Amin and Hamza Aldabbas and Senthilkumar Mohan and Bader Alouffi and Ali Ahmadian . {Cloud-based email phishing attack using machine and deep learning algorithm}. Springer. 9: 3043–3070, 2022. [DOI ] |
[18] | Abdullah Ajmal and Sundas Ibrar and Rashid Amin. {Cloud computing platform: Performance analysis of prominent cryptographic algorithms}. Wiley. 34: 2022. [DOI ] |
[19] | Xiaoshuang Sun; Yu Wang; Zengkai Shi. {Insider Threat Detection Using An Unsupervised Learning Method: COPOD}. IEEE. 2021. [DOI ] |
[20] | Gelli Ravikumar and Manimaran Govindarasu. {Anomaly Detection and Mitigation for Wide-Area Damping Control using Machine Learning}. IEEE. 1 - 1, 2020. [DOI ] |
[21] | Sahil Garg and Kuljeet Kaur and Neeraj Kumar and Joel J. P. C. Rodrigues. {Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective}. IEEE. 21: 566 - 578, 2019. [DOI ] |
[22] | Sangpyo Kim and Jongmin Kim and Michael Jaemin Kim and Wonkyung Jung and John Kim and Minsoo Rhu and Jung Ho Ahn. {BTS: an accelerator for bootstrappable fully homomorphic encryption}. ACM. 711 - 725, 2022. [DOI ] |
[23] | Prabhat Kumar and Randhir Kumar and Gautam Srivastava and Govind P. Gupta. {PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities}. IEEE. 8: 2326 - 2341, 2021. [DOI ] |
[24] | Jianxin Zhao and Richard Mortier and Jon Crowcroft and Liang Wang. {Privacy-Preserving Machine Learning Based Data Analytics on Edge Devices}. ACM. 341 - 346, 2018. [DOI ] |
[25] | Mahdi Rabbani and Yong Li Wang and Reza Khoshkangini and Hamed Jelodar and Ruxin Zhao and Peng Hu. {A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing}. Elsevier. 151: 2020. [DOI ] |
[26] | A. Nazreen Banu and K. Ram Kumar. {Cloud-Based Machine Learning Techniques With Intrusion Detection System}. IEEE. 2023. [DOI ] |
[27] | Yu Liu a, Zhibo Pang and Magnus Karlsson and Shaofang Gong . {Anomaly detection based on machine learning in IoT-based vertical plant wall for indoor climate control}. Elsevier. 183: 2020. [DOI ] |
[28] | Kelton A.P. da Costa and João P. Papa and Celso O. Lisboa and Roberto Munoz and Victor Hugo and de Albuquerque. {Internet of Things: A survey on machine learning-based intrusion detection approaches}. Elsevier- Computer Networks. 151: 147-157, 2019. [DOI ] |
[29] | Jianguo Chen; Kenli Li; Philip S. Yu. Privacy-Preserving Deep Learning Model for Decentralized VANETs Using Fully Homomorphic Encryption and Blockchain{}. IEEE Transactions on Intelligent Transportation Systems . 23: 11633 - 11642, 2021. [DOI ] |
[30] | Rajesh Bose; Srabanti Chakraborty; Sandip Roy. {Explaining the Workings Principle of Cloud-based Multi-factor Authentication Architecture on Banking Sectors}. IEEE. 2019. [DOI ] |
[31] | Ahmed El Ouadrhiri; Ahmed Abdelhadi. {Differential Privacy for Deep and Federated Learning: A Survey}. IEEE. 10: 22359 - 22380, 2022. [DOI ] |
[32] | Mohammed Nasser Al-Mhiqani and Rabiah Ahmad and Z. Zainal Abidin and Warusia Yassin and Aslinda Hassan and Karrar Hameed Abdulkareem and Nabeel Salih Ali and Zahri Yunos. {A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations}. MDPI. 10: 2020. [DOI ] |
[33] | Youliang Tian; Ta Li; Jinbo Xiong; Md Zakirul Alam Bhuiyan; Jianfeng Ma; Chan. {A Blockchain-Based Machine Learning Framework for Edge Services in IIoT}. IEEE. 18: 1918 - 1929, 2021. [DOI ] |
[34] | Abdul Salam Mohammad a, Manas Ranjan Pradhan b. {Machine learning with big data analytics for cloud security}. Elsevier. 96: 2021. [DOI ] |
[35] | Omar A. Alzubi and Jafar A. Alzubi and Moutaz Alazab and Adnan Alrabea and Albara Awajan and Issa Qiqieh. {Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment}. MDPI. 11: 2022. [DOI ] |
[36] | Z Guo and Y Shen and AK Bashir and M Imran and N Kumar and D Zhang, K Yu. {Robust spammer detection using collaborative neural network in Internet-of-Things applications}. IEEE Internet of Things Journal. 8: 9549 - 9558, 2021. [DOI ] |
[37] | Duc-Nghia Tran and Tu N. Nguyen and Phung Cong Phi Khanh and Duc-Tan Tran and . {An IoT-Based Design Using Accelerometers in Animal Behavior Recognition Systems}. IEEE Sensors Journal. 22: 17515 - 17528, 2022. [DOI ] |
[38] | Fucai Luo and Haiyan Wang and Al-Kuwari Saif and Weihong Han. {Multi-key Fully Homomorphic Encryption without CRS from RLWE}. Elsevier-Computer Standards \& Interfaces. 86: 2023. [DOI ] |
[39] | Rashad Mahmood Saqib and Adnan Shahid Khan and Yasir Javed and Shakil Ahmad and Kashif Nisar and Irshad A. Abbasi and Muhammad Reazul Haque and Azlina Ahmadi Julaihi. {Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security}. Tech Science Press. 32: 2021. [DOI ] |
[40] | Aqsa Mohiyuddin and Abdul Rehman Javed and Chinmay Chakraborty and Muhammad Rizwan and Maryam Shabbir and Jamel Nebhen . {Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System}. International Journal of Fuzzy Systems. 24: 1203–1215, 2022. [DOI ] |
[41] | Umer Ahmed Butt and Muhammad Mehmood and Syed Bilal Hussain Shah and Rashid Amin and M. Waqas Shaukat and Syed Mohsan Raza and Doug Young Suh and Md. Jalil Piran. {A review of machine learning algorithms for cloud computing security}. MDPI. 2020. [DOI ] |
[42] | Semin Kim, Hyung-Jin Mun and Sunghyuck Hong. {Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal}. MDPI. 12: 2022. [DOI ] |
[43] | Mudegol Nandinee. {Hybrid Encryption using Symmetric Block and Stream Cipher}. International Journal Of Engineering And Management Research. 13: 35-39, 2023. [DOI ] |
[44] | Abhishek Sharma and Umesh Kumar Singh and Kamal Upreti and Dharmendra Singh Yadav. {An investigation of security risk \& taxonomy of Cloud Computing environment}. 2nd International Conference on Smart Electronics and Communication (ICOSEC). 2021. [DOI ] |
[45] | G. Padmavathi; D. Shanmugapriya; S. Asha. {A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods}. IEEE. 2022. [DOI ] |
[46] | Simon Duque Anton and Suneetha Kanoor and Daniel Fraunholz and Hans Dieter Schotten. {Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set}. ACM. 1-9, 2018. [DOI ] |
[47] | Muhammad Imran Tariq and Nisar Ahmed Memon and Shakeel Ahmed and Shahzadi Tayyaba and Muhammad Tahir Mushtaq and Natash Ali Mian and Muhammad Imran and Muhammad W. Ashraf. {A Review of Deep Learning Security and Privacy Defensive Techniques}. Wiley. 2020. [DOI ] |
[48] | Mahmoud Abdelsalam; Ram Krishnan; Yufei Huang; Ravi Sandhu. {Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks}. IEEE. 2018. [DOI ] |
[49] | Folasade Mercy Okikiola; Abiodun Muyideen Mustapha; Adeniyi Foluso Akinsola. {A New Framework for Detecting Insider Attacks in Cloud-Based E-Health Care System}. IEEE. 2020. [DOI ] |
[50] | Naghmeh Moradpoor Sheykhkanloo, Adam Hall. {Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset}. International Journal of Cyber Warfare and Terrorism (IJCWT) . 26, 2020. [DOI ] |
[51] | Waqas Ahmad and Aamir Rasool and Abdul Rehman Javed and Thar Baker and Zunera Jalil. {Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey}. MDPI. 2021. [DOI ] |
[52] | Duc C. Le; Nur Zincir-Heywood; Malcolm I. Heywood. {Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning}. IEEE. 17: 30 - 44, 2020. [DOI ] |
[53] | Rakan A. Alsowail, Taher Al-Shehari. {Techniques and countermeasures for preventing insider threats}. PeerJ Computer Science. 2022. [DOI ] |
[54] | Omar G. Abood, Shawkat K. Guirguis. {A Survey on Cryptography Algorithms}. International Journal of Scientific and Research Publications. 8: 2018. [DOI ] |
[55] | Binita Thakkar, Dr. Blessy Thankachan. {A Survey for Comparative Analysis of various Cryptographic Algorithms used to Secure Data on Cloud}. International Journal of Engineering Research \& Technology (IJERT). 9: 2020. |