A Predictive Model for Cloud Computing Security in Banking Sector Using Levenberg Marquardt Back Propagation with Cuckoo Search
International Journal of Computer Science and Engineering |
© 2020 by SSRG - IJCSE Journal |
Volume 7 Issue 2 |
Year of Publication : 2020 |
Authors : Elliot, S J & Anireh, V.I.E, Nwiabu, N.D |
How to Cite?
Elliot, S J & Anireh, V.I.E, Nwiabu, N.D, "A Predictive Model for Cloud Computing Security in Banking Sector Using Levenberg Marquardt Back Propagation with Cuckoo Search," SSRG International Journal of Computer Science and Engineering , vol. 7, no. 2, pp. 42-47, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I2P105
Abstract:
This study presents a predictive model for cloud computing security in the banking sector using Levenberg Marquardt Back Propagation algorithm trained with cuckoo search for fast and improved convergence speed. Object-oriented design methodology was used. The Levenberg Marquardt Back Propagation has been used to determine the training performance of an ANN, which is evaluated by computing the means square error of the system and that was the mean of the square of the difference between the target matrix and the input matrix. Cuckoo Search has been used to determine the weights of Neural Network. The signature feature vectors are input to the ANN; these features extracted from signature image were obtained via image processing. System was implemented in Matlab. Signature verification system based on the trained network was developed and tested with 160 signatures which consist of 90 genuine signatures,50 forgery signatures and 20 irregular signatures. The performance has been evaluated with False Rejection Rate of 0% and False Acceptance Rate of 8%.
Keywords:
Cloud Computing, Security, Artificial Neural Network, Levenberg Marquardt, BackPropagation, Cuckoo Search
References:
[1] Al-anzi, F., Yadav, S. and Soni, J. (2014).Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance. In International Conference on Data Mining and Intelligent Computing (ICDMIC), 1–6.
[2] Alemu, M. and Omer, A. (2014).Cloud Computing Conceptual Security Framework for Banking Industry.Journal of Emerging Trends in Computing and Information Sciences, 5(12), 2079-8407.
[3] Biswas, M. A. R., Robinson, M. D. and Fumo, N. (2016). Prediction of residential building energy consumption: a neural network approach. 117, 84–92.
[4] Chifu, V. R., Pop,C. B., Salomie, I., Suia, D. S. and Niculici, A. N. (2012).“Optimizingthe Semantic Web Service Composition Process Using Cuckoo Search.
[5] Claessens, J., Dem, V., Cock, D., Preneel, B. and Vandewalle, J. (2002). On the Security of Today's On-line Electronic Banking Systems.Computers and Security 21(3), 253-265.
[6] Elzamly, A., Hussin, B., Abu-Naser, S. S., Shibutani, T. and Doheir, M. (2017).Predicting Critical Cloud Computing Security Issues using Artificial Neural Network (ANNs) Algorithms in Banking Organizations.International Journal of Information Technology and Electrical Engineering, 6(2), 2306.
[7] Ghobaei-Arani, M., Rahmanian, A., Aslanpour, M. and Dashti, S. (2017). CSAWSC: Cuckoo Search Algorithm for Web Service Composition in Cloud Environments. Soft Computer.
[8] Mba, L., Meukam, P. and Kemajou, A. (2016).Application of artificial neural network for predicting hourly indoor air temperature and relative humidity in modern building in humid region.EnergyBuild, 121, 32–42.
[9] Modak, M. and Walke, A. (2013). Issues Faced by Banking Sector in The World of Cloud based Computing to Achieve High Performance: A Survey. International Journal of Advances in Computer Science and Cloud Computing, 1(1), 2321-4058.
[10] Mukhopadhyay, S., Tang, C., Huang, J., Yu, M. and Palakal, M. (2002).A comparative study of genetic sequence classification algorithms. Neural networks for signal processing. In Proceedings of the 12th IEEE workshop, 57–66.
[11] Pfleeger, C. P. (1997) Security in Computing. Prentice Hall, 2(5)..
[12] Yang, X. S. and Karamanoglu, M. (2013). Swarm Intelligence and Bio-Inspired Computation: An Overview. Elsevier, 243-255.