Enhanced Deep Learning-Based Security Model for Data in Cloud

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 3
Year of Publication : 2025
Authors : Gantela Prabhakar, Bobba Basaveswara Rao
pdf
How to Cite?

Gantela Prabhakar, Bobba Basaveswara Rao, "Enhanced Deep Learning-Based Security Model for Data in Cloud," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 3, pp. 88-100, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I3P108

Abstract:

Nowadays, numerous cloud services are available for companies of all sizes and types. It can be used for virtual workstations, analysis, backup, and even software development. However, this ease of use is accompanied by security risks. The technology's limitations make information security a major concern for cloud computing. A comprehensive set of technical solutions, policies, and procedures for safeguarding cloud-based systems or applications, as well as user access and data rights, are known as cloud security. Data availability, integrity, and confidentiality are fundamental concepts in information security. For companies of all sizes and types, a variety of cloud services are now available. By sorting the jobs in each data set and choosing the ones with the highest scores, choose only the most pertinent ones. The proposed Convolutional Neural Network (CNN)-BI-LSTM's accuracy was tested, trained on, and validated using the CICDDoS2019 dataset, which had a 94.52% accuracy rate. A Kalman neural network with back-propagation has been utilized to detect Distribution Denial of Service (DDoS) in IoT networks compatible with 5G. The recall rating for this model was the highest (0.9749). The highest accuracy score, 0.954, was achieved by IDS based on convolutional neural networks. Finally, combine a model that more precisely and effectively detects and categorizes DDoS assaults in a multi-control SDN with an entropy-based deep learning approach. According to the experiment's findings, Recurrent Neural Networks (RNN) had an accuracy of 98.6%, Multi-Layer Perceptron (MLP) had 98.3%, Gated Recurrent Unit (GRU) had 96.4%, and LSTM had 99.42%. Among other suggested models, the Long Short-Term Memory (LSTM) demonstrated great accuracy. To address these problems and offer a defense against sophisticated threats, an innovative deep-learning methodology was developed. Many of these issues can be resolved using new ideas and methods in cyber security, such as speech recognition, behavioral anomaly detection, malware, botnet detection, and DDoS detection. We introduce a secure and fair distributed deep learning architecture that solves the problems mentioned above and improves data security in the cloud.

Keywords:

Convolutional Neural Network, Distributed Denial of Service, Multi-Layer Perceptron, Long Short-Term Memory, Back-propagation.

References:

[1] Abdul Basit et al., “Dynamic Event-Triggered Approach for Distributed State and Parameter Estimation over Networks Subjected to Deception Attacks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 9, pp. 373-385, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Lan Yao, and Xia Huang, “Memory-Based Adaptive Event-Triggered Secure Control of Markovian Jumping Neural Networks Suffering from Deception Attacks,” Science China Technological Sciences, vol. 66, pp. 468-480, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] N. Ramana, and E. Hari Krishna, “Intrusion Detection System Fog Security Model for the Smart Cities and Urban Sensing,” Journal of Sensors, IoT & Health Sciences (JSIHS,ISSN: 2584-2560), vol. 1, no. 1, pp. 51-63, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] FIPS vs FedRAMP Compliance and Requirements, WolfSSL, 2024. [Online]. Available: https://www.wolfssl.com/fips-vs-fedramp-compliance-and-requirements/?utm_source=rss&utm_medium=rss&utm_campaign=fips-vs-fedramp-compliance-and-requirements&gad_source=1&gclid=EAIaIQobChMIx_egkOf5iwMVldAWBR2pMisrEAAYASAAEgIGTPD_BwE/
[5] EU Cloud Code of Conduct, Version 2.11, 2020. [Online]. Available: https://www.edpb.europa.eu/system/files/2024-02/eucloudcoc.pdf
[6] Jon Brodkin, Gartner: Seven Cloud-Computing Security Risks, Infoworld, 2008. [Online]. Available: https://www.infoworld.com/article/2174508/gartner-seven-cloud-computing-security-risks.html/
[7] Hanoch Levy, Eli Brosh, and Gil Zussman, Attack Resilient Resource Placement in Cloud Computing System and Power Grid, ICRC –Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University, 2023. [Online]. Available: https://en-cyber.tau.ac.il/research/Resilient-Resource/
[8] AKM Ahasan Habib et al., “False Data Injection Attack in Smart Grid Cyber Physical System: Issues, Challenges, and Future Direction,” Computers and Electrical Engineering, vol. 107, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mohammad Kamrul Hasan et al., “Smart Grid Communication Networks for Electric Vehicles Empowering Distributed Energy Generation: Constraints, Challenges, and Recommendations,” Energies, vol. 16, no. 3, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Meenakshi Mittal, Krishan Kumar, and Sunny Behal, “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review,” Soft Computing, vol. 27, pp. 13039-13075, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Mayadah A. Mohsin, and Ali H. Hamad, “Implementation of Entropy-Based DDoS Attack Detection Method in Different SDN Topologies,” American Scientific Research Journal for Engineering, Technology, and Sciences, vol. 86, no. 1, pp. 63-76, 2022.
[Google Scholar] [Publisher Link]
[12] Ankit Agarwal, Rajiv Singh, and Manju Khari, “Detection of DDOS Attack Using IDS Mechanism: A Review,” 2022 1st International Conference on Informatics, Noida, India, pp. 36-46, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Anshuman Singh, and Brij B. Gupta, “Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions,” International Journal on Semantic Web and Information Systems, vol. 18, no. 1, pp. 1-43, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] S. Vijayarani Mohan, and S. Sharmila Sathyanathan, “Research in Cloud Computing-An Overview,” International Journal of Distributed and Cloud Computing, vol. 3, no. 1, pp. 1-11, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ankit Agrawal et al., “Autoencoder for Design of Mitigation Model for DDOS Attacks via M-DBNN,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, pp. 1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Fatemeh Khoda Parast et al., “Cloud Computing Security: A Survey of Service-Based Models,” Computers & Security, vol. 114, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Tao Wang, Yaokai Feng, and Kouichi Sakurai, “Improving the Two-Stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding,” 2021 15th International Conference on Ubiquitous Information Management and Communication, Seoul, Korea (South), pp. 1-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Shanshan Yu et al., “A Cooperative DDoS Attack Detection Scheme Based on Entropy and Ensemble Learning in SDN,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, pp. 1-21, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Omer Elsier Tayfour, and Muhammad Nadzir Marsono, “Collaborative Detection and Mitigation of DDoS in Software-Defined Networks,” The Journal of Supercomputing, vol. 77, no. 11, pp. 13166-13190, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Suhail Ahmad, and Ajaz Hussain Mir, “Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers,” Journal of Network and Systems Management, vol. 29, pp. 1-59, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Yuanyuan Wei et al., “AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification,” IEEE Access, vol. 9, pp. 146810-146821, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] James Dzisi Gadze et al., “An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers,” Technologies, vol. 9, no. 1, pp. 1-22, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Ankit Agarwal, Manju Khari, and Rajiv Singh, “Detection of DDOS Attack Using Deep Learning Model in Cloud Storage Application,” Wireless Personal Communications, vol. 127, pp. 419-439, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Nisha Ahuja et al., “Automated DDOS Attack Detection in Software Defined Networking,” Journal of Network and Computer Applications, vol. 187, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Haomin Wang, and Wei Li, “DDosTC: A Transformer-Based Network Attack Detection Hybrid Mechanism in SDN,” Sensors, vol. 21, no. 15, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]