Strengthening cloud data protection based on a novel cyber security framework
Main Article Content
Abstract
Cybersecurity involves protecting computer networks, systems, and data from unauthorized access and disruptions using advanced technologies. The purpose of this research is to establish a novel cyber security framework for strengthening cloud data protection. In this paper, we propose a novel Dung Beetle optimization-redefined Intelligent Random Forest (DB-IRF) for accurate detection of intrusions in a cloud environment. We obtained a dataset that includes cloud system logs and network traffic data, including normal and malicious activities, to train our proposed model. We utilized z-score normalization to pre-process the gathered raw data. Our suggested model enhances classification accuracy by integrating DB optimization with the IRF algorithm. It optimizes feature importance weights during training and improves the model's ability to detect intrusions in cloud environments accurately. The proposed detection model is implemented in Python software. In the findings assessment phase, we effectively assessed the performance of our proposed DB-IRF in detecting earthquake incidents across multiple evaluation metrics such as Accuracy (97.5%), Precision (97.96%), F1 Score (98.48%) and Recall (97.85%). We also conducted a comparison analysis with other conventional methodologies. Our experimental results demonstrate the capability and reliability of the recommended framework.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] Mughaid, I. Obeidat, L. Abualigah, S. Alzubi, M. S. Daoud, and H. Migdady, “Intelligent cybersecurity approach for data protection in cloud computing based internet of things,” Int. J. Inf. Secur., pp. 1–15, 2024, doi: 10.1007/s10207-024-00832-0.
[2] S. Qi, Y. Lu, W. Wei, and X. Chen, “Efficient data access control with fine-grained data protection in cloud-assisted IIoT,” IEEE Internet Things J., vol. 8, no. 4, pp. 2886–2899, 2020, doi: 10.1109/JIOT.2020.3020979.
[3] S. Yalamati, “Data Privacy, Compliance, and Security in Cloud Computing for Finance,” in Practical Applications of Data Processing, Algorithms, and Modeling, IGI Global, 2024, pp. 127–144, doi: 10.4018/979-8-3693-2909-2.ch010.
[4] S. Chenthara, K. Ahmed, H. Wang, and F. Whittaker, “Security and privacy-preserving challenges of e-health solutions in cloud computing,” IEEE Access, vol. 7, pp. 74361–74382, 2019, doi: 10.1109/ACCESS.2019.2919982.
[5] L. Ogiela and M. R. Ogiela, “Cognitive security paradigm for cloud computing applications,” Concurrency Computat.: Pract. Exper., vol. 32, no. 8, p. e5316, 2020, doi: 10.1002/cpe.5316.
[6] Z. He, T. Zhang, and R. B. Lee, “Attacking and protecting data privacy in edge–cloud collaborative inference systems,” IEEE Internet Things J., vol. 8, no. 12, pp. 9706–9716, 2020, doi: 10.1109/JIOT.2020.3022358.
[7] S. Vinoth, H. L. Vemula, B. Haralayya, P. Mamgain, M. F. Hasan, and M. Naved, “Application of cloud computing in banking and e-commerce and related security threats,” Mater. Today Proc., vol. 51, pp. 2172–2175, 2022, doi: 10.1016/j.matpr.2021.11.121.
[8] S. Shakya, “An efficient security framework for data migration in a cloud computing environment,” J. Artif. Intell., vol. 1, no. 01, pp. 45–53, 2019, doi: 10.36548/jaicn.2019.1.006.
[9] D. W. Chadwick et al., “A cloud-edge based data security architecture for sharing and analysing cyber threat information,” Future Gener. Comput. Syst., vol. 102, pp. 710–722, 2020, doi: 10.1016/j.future.2019.06.026.
[10] H. Qiu, H. Noura, M. Qiu, Z. Ming, and G. Memmi, “A user-centric data protection method for cloud storage based on invertible DWT,” IEEE Trans. Cloud Comput., vol. 9, no. 4, pp. 1293–1304, 2019, doi: 10.1109/TCC.2019.2911679.
[11] P. Wei, D. Wang, Y. Zhao, S. K. S. Tyagi, and N. Kumar, “Blockchain data-based cloud data integrity protection mechanism,” Future Gener. Comput. Syst., vol. 102, pp. 902–911, 2020, doi: 10.1016/j.future.2019.09.028.
[12] C. Yang et al., “AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud,” IEEE Access, vol. 8, pp. 70604–70615, 2020, doi: 10.1109/ACCESS.2020.2985762.
[13] A. M. Sauber et al., “A new secure model for data protection over cloud computing,” Comput. Intell. Neurosci., vol. 2021, pp. 1–11, 2021, doi: 10.1155/2021/8113253.
[14] J. C. Liu, C. H. Lin, and K. Y. Lee, “Cloud-based personal data protection system and its performance evaluation,” J. Internet Technol., vol. 20, no. 6, pp. 1721–1727, 2019.
[15] S. J. N. Kumar, S. Ravimaran, and M. M. Alam, “An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing,” Comput. Model. Eng. Sci., vol. 125, no. 2, pp. 671–697, 2020, doi: 10.32604/cmes.2020.09361.
[16] “KDD99 Dataset,” Kaggle, [Online]. Available: https://www.kaggle.com/datasets/toobajamal/kdd99-dataset/data.
[17] X. Ma and X. Cheng, “Detection and analysis of network intrusion data set based on KNN algorithm,” World Sci. Res. J., vol. 7, no. 6, pp. 118–123, 2021, doi: 10.6911/WSRJ.202106_7(6).0015.
[18] N. Karmous, M. O. E. Aoueileyine, M. Abdelkader, and N. Youssef, “IoT real-time attacks classification framework using machine learning,” in Proc. 2022 IEEE 9th Int. Conf. Commun. Netw. (ComNet), 2022, pp. 1–5, doi: 10.1109/ComNet55492.2022.9998441.
[19] R. Kaushik, V. Singh, and R. Kumar, “Multiclass SVM based network intrusion detection with attribute selection using infinite feature selection technique,” J. Discrete Math. Sci. Cryptogr., vol. 24, no. 8, pp. 2137–2153, 2021, doi: 10.1080/09720529.2021.2009189.
[20] S. F. Jabbar, N. S. Mohsin, B. Al-Attar, and I. I. Al-Barazanchi, “Proposed framework for semantic segmentation of aerial hyperspectral images using deep learning and SVM approach,” Fusion: Pract. Appl., vol. 14, no. 2, 2024.
[21] S. F. Jabbar, N. S. Mohsin, J. F. Tawfeq, P. S. JosephNg, and A. L. Khalaf, “A novel data offloading scheme for QoS optimization in 5G based internet of medical things,” Bull. Electr. Eng. Inform., vol. 12, no. 5, pp. 3124–3133, 2023.
[22] S. Q. Salih, A. L. Khalaf, N. S. Mohsin, and S. F. Jabbar, “An optimized deep learning model for optical character recognition applications,” Int. J. Electr. Comput. Eng., vol. 13, no. 3, pp. 3010–3018, 2023.
[23] A. M. Taha, S. F. Jabbar, and A. H. Alwan, “Sentiment retrieval of health records using NLP-based algorithm,” unpublished.
[24] S. F. Jabbar, “Automated stand-alone surgical safety evaluation for laparoscopic cholecystectomy (LC) using convolutional neural network and constrained local models (CNN-CLM),” J. Robot. Control, vol. 3, no. 6, pp. 817–826, 2022.
[25] D. H. Rasheed, “Advancing energy efficiency with smart grids and IoT-based solutions for a sustainable future,” ESTIDAMAA, pp. 37–43, 2024.
[26] I. Ibraheem, A. Barazanchi, and D. H. Rasheed, “The role of the Iraqi national data center in advancing digital transformation and data sovereignty,” SHIFRA, vol. 2024, pp. 88–96, 2024.
[27] I. Ibraheem, A. Barazanchi, and D. H. Rasheed, “The role of green technologies in mitigating carbon footprints in industrial sectors,” ESTIDAMAA, vol. 2024, pp. 31–36, 2024.
[28] F. S. Al-Mukhtar, Z. A. Jaaz, and A. H. Hamad, “Reliable fuzzy-based multi-path routing protocol based on whale optimization algorithm to improve QoS in 5G networks for IoMT applications,” Int. J. Interact. Mobile Technol., vol. 17, no. 6, 2023.