banner

A coherent salp swarm optimization based deep reinforced neuralnet work algorithm for securing the mobile cloud systems

Osamah Ibrahim Khalaf, D. Anand, Ghaida Muttashar Abdulsahib, G. Rajesh Chandra

Abstract


Protecting the mobile cloud computing system from the cyber-threats is the most crucial and demanding problems in recent days. Due to the rapid growth of internet technology, it is more essential to ensure secure the mobile cloud systems against the network intrusions. In the existing works, various intrusion detection system (IDS) frameworks have been developed for mobile cloud security, which are mainly focusing on utilizing the optimization and classification algorithms for designing the security frameworks. Still, some of the challenges associated to the existing works are complex to understand the system model, educed convergence rate, inability to handle complex datasets, and high time cost. Therefore, this research work motivates to design and develop a computationally efficient IDS framework for improving the mobile cloud systems security. Here, an intrinsic collateral normalization (InCoN) algorithm is implemented at first for generating the quality improved datasets. Consequently, the coherent salp swarm optimization (CSSO) technique is deployed for selecting the most relevant features used for intrusion prediction and categorization. Finally, the deep reinforced neural network (DRNN) mechanism is implemented for accurately detecting the type of intrusion by properly training and testing the optimal features. During validation, the findings of the CSSO-DRNN technique are assessed and verified by utilizing various QoS parameters.


Keywords


mobile cloud computing; security; intrusion detection system (IDS); intrinsic collateral normalization (InCoN); coherent salp swarm optimization (CSSO); deep reinforced neural network (DRNN)

Full Text:

PDF

References


1. Anand D, Khalaf OI, Abdulsahib GM, et al. Identification of meningioma tumor using recurrent neural networks. Journal of Autonomous Intelligence. 2023, 7(2). doi: 10.32629/jai.v7i2.653

2. SatheeshKumar Palanisamy et al. Design of Artificial Magnetic Conductor based Stepped V-shaped Printed multiband antenna for Wireless Applications. Int. J. Advance Soft Compu. Appl, 15(3). doi: 10.15849/IJASCA.231130.07

3. Ghaida Muttashar Abdulsahib et al. A Modified Bandwidth Prediction Algorithm for Wireless Sensor Networks. Journal of Information Science and Engineering, 40(1): 177-188.

4. Al-Janabi S, Al-Shourbaji I, Shojafar M, Abdelhag M. Mobile cloud computing: Challenges and future research directions. In: Proceedings of the 10th International Conference on Developments in eSystems Engineering (DeSE); 14–16 June 2017; Paris, France. pp. 62–67.

5. Wiriaatmadja DT, Choi KW, Hossain E. Discovering mobile applications in cellular device-to-device communications: Hash function and bloom filter-based approach. IEEE Transactions on Mobile Computing 2016; 15(2): 336–349. doi: 10.1109/TMC.2015.2418767

6. Tsai JL, Lo NW. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal 2015; 9(3): 805–815. doi: 10.1109/JSYST.2014.2322973

7. Chu CH, Wang P, Wang D, He D. Anonymous two-factor authentication of distributed systems: Attainments are beyond certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 2015; 12(4): 428–442. doi: 10.1109/TDSC.2014.2355850

8. Xingsi Xue et al. Soft computing approach on estimating the lateral confinement coefficient of CFRP veiled circular columns. Alexandria Engineering Journal, 81: 599-619. doi: 10.1016/j.aej.2023.09.053

9. Lei L, Sengupta S, Pattanaik T, Gao J. MCloudDB: A mobile cloud database service framework. In: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering; 30 March–3 April 2015; San Francisco, USA. pp. 6–15.

10. Alqahtani HS, Kouadri-Mostefaou G. Multi-clouds mobile computing for the secure storage of data. In: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing; 8–11 December 2014; London, United Kingdom. pp. 495–496.

11. Imgraben J, Engelbrecht A, Choo KKR. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour & Information Technology 2014; 33(12): 1347–1360. doi: 10.1080/0144929X.2014.934286

12. Almenares F, Sanchez R, Marin A, et al. Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Transactions on Consumer Electronics 2012; 58(1): 95–103. doi: 10.1109/TCE.2012.6170060

13. Xiang Y, Chonka A, Huang X, et al. A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 2011; 22(8): 1390–1397. doi: 10.1109/TPDS.2010.206

14. Hwang MS, Li LH, Lin LC. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Network 2001; 12(6): 1498–1504. doi: 10.1109/72.963786

15. Li LH, Hwang MS. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46(1): 28–30.

16. Yang S, Kwon Y, Cho Y, et al. Fast dynamic execution offloading for efficient mobile cloud computing. In: Proceedings of the International Conference on Pervasive Computing and Communications (PerCom); 18–22 March 2013; San Diego, USA.

17. Jararweh Y, Doulat A, AlQudah O, et al. The future of mobile cloud computing: Integrating cloudlets and mobile edge computing. In: Proceedings of the 23rd International Conference on Telecommunications (ICT); 16–18 May 2016; Thessaloniki, Greece.

18. Xue X, Palanisamy S, et al. A Novel partial sequence technique based Chaotic biogeography optimization for PAPR reduction in eneralized frequency division multiplexing waveform. Heliyon 2023; 9(9). doi: 10.1016/j.heliyon.2023.e19451

19. Al-Hamami AH, AL-Juneidi JY. Secure mobile cloud computing based-on fingerprint. World of Computer Science and Information Technology Journal (WCSIT) 2015; 5(2): 23–27.

20. Jia W, Zhu H, Caoyx Z, et al. SDSM: A secure data service mechanism in mobile cloud computing. In: Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 10–15 April 2011.

21. Kumar R, Rajalakshmi S. Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems. In: Proceedings of the International Conference on Computer Sciences and Applications; 14–15 December 2013; Washington, USA.

22. Qureshi SS, Ahmad T, Rafique K, Islam S. Mobile cloud computing as future for mobile applications-implementation methods and challenging issues. In: Proceedings of the International Conference on Cloud Computing and Intelligence Systems; 15–17 September 2011; Beijing, China.

23. Armel ASR, Thavavel V. Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider. In: Proceedings of the Fifth International Conference on Advanced Computing (ICoAC); 18–20 December 2013; Chennai, India.

24. Abolfazli S, Sanaei Z, Shiraz M, Gani A. MOMCC: Market-oriented architecture for Mobile Cloud Computing based on Service Oriented Architecture. In: Proceedings of the International Conference on Communications in China Workshops (ICCC); 15–17 August 2012; Beijing, China.

25. Anne VPK, Rao JV, Kurra RR. Enforcing the security within mobile devices using clouds and its infrastructure. In: Proceedings of the CSI Sixth International Conference on Software Engineering (CONSEG); 5–7 September 2012; Indore, India.

26. Oshamah Ibrahim Khalaf,Ashokkumar. S.R,S.Dhanasekaran,Ghaida Muttashar Abdulsahib and Premkumar. A DECISION SCIENCE APPROACH USING HYBRID EEG FEATURE EXTRACTION AND GAN-BASED EMOTION CLASSIFICATION. Advances in Decision Sciences, 2023,Vol 27.https://doi.org/10.47654/v27y2023i1p172-191. Pages 172-191 .

27. Ragini, Mehrotra P, Venkatesan S. An efficient model for privacy and security in mobile cloud computing. In: Proceedings of the International Conference on Recent Trends in Information Technology; 10–12 April 2014; Chennai, India.

28. Dai Q, Yang H, Yao Q, Chen Y. An improved security service scheme in mobile cloud environment. In: Proceedings of the 2nd International Conference on Cloud Computing and Intelligence Systems; 30 October–1 November 2012; Hangzhou, China.

29. S. Sadesh, O. I. Khalaf, M. Shorfuzzaman, et al. Automatic clustering of user behaviour profiles for web recommendation system. Intelligent Automation & Soft Computing 2023; 35(3): 3365–3384. doi: 10.32604/iasc.2023.030751

30. Cremene M, Borda M, Boudaoud K. Popa D. A security framework for mobile cloud applications. In: Proceedings of the 11th RoEduNet International Conference (RoEduNet);17–19 January 2013; Sinaia, Romania.

31. Sajid, M., Kumar Sagar, A., Singh, J., Khalaf, O.I., & Prasad, M. (Eds.). (2023). Intelligent Techniques for Cyber-Physical Systems (1st ed.). CRC Press; 2023. doi: 10.1201/9781003438588

32. Zhou G, Tian W, Buyya R. Deep reinforcement learning-based methods for resource scheduling in cloud computing: A review and future directions. Available online: https://arxiv.org/pdf/2105.04086.pdf (accessed on 21 August 2023).

33. Anand D, Arulselvi G, Balaji GN, Chandra GR. A deep convolutional extreme machine learning classification method to detect bone cancer from histopathological images. International Journal of Intelligent Systems and Applications in Engineering 2022; 10(4): 39–47.

34. Anand D, Arulselvi G, Balaji GN. Detection of tumor affected part from histopathological bone images using morphological classification and recurrent convoluted neural networks. Journal of Pharmaceutical Negative Results 2022; 13(9): 4992–5008. doi: 10.47750/pnr.2022.13.S09.617

35. Anand D, Arulselvi G, Balaji GN. An assessment on bone cancer detection using various techniques in image processing. In: Editor Deepak BBVL, Editor Parhi D, Editor Biswal B, et al. (editors). Applications of Computational Methods in Manufacturing and Product Design. Springer; 2022.

36. Xue X, Poonia M, Abdulsahib GM, et al. On cohesive fuzzy sets, operations and properties with applications in electromagnetic signals and solar activities. Symmetry 2023; 15(3): 595. doi: 10.3390/sym15030595

37. Dash S, Parida P, Sahu G, et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications. In: Handbook of Research on Quantum Computing for Smart Environments. IGI Global; 2023.

38. Xue X, Marappan R, Raju SK, et al. Modelling and analysis of hybrid transformation for lossless big medical image compression. Bioengineering 2023; 10(3): 333. doi: 10.3390/bioengineering10030333

39. Xue X, Chinnaperumal S, Abdulsahib GM, et al. Design and analysis of a deep learning ensemble framework model for the detection of COVID-19 and pneumonia using large-scale CT scan and x-ray image datasets. Bioengineering 2023; 10(3): 363. doi: 10.3390/bioengineering10030363

40. Xue X, Shanmugam R, Palanisamy S, et al. A hybrid cross layer with harris-hawk-optimization-based efficient routing for wireless sensor networks. Symmetry 2023; 15(2): 438. doi: 10.3390/sym15020438




DOI: https://doi.org/10.32629/jai.v7i3.654

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Osamah Ibrahim Khalaf, D. Anand, Ghaida Muttashar Abdulsahib, G. Rajesh Chandra

License URL: https://creativecommons.org/licenses/by-nc/4.0/