Open Access iconOpen Access

ARTICLE

crossmark

Metaheuristics with Machine Learning Enabled Information Security on Cloud Environment

Haya Mesfer Alshahrani1, Faisal S. Alsubaei2, Taiseer Abdalla Elfadil Eisa3, Mohamed K. Nour4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Ishfaq Yaseen5

1 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, 11671, Saudi Arabia
2 Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, 21959, Saudi Arabia
3 Department of Information Systems-Girls Section, King Khalid University, Mahayil, 62529, Saudi Arabia
4 Department of Computer Science, College of Computing and Information System, Umm Al-Qura University, Saudi Arabia
5 Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia

* Corresponding Author: Manar Ahmed Hamza. Email: email

Computers, Materials & Continua 2022, 73(1), 1557-1570. https://doi.org/10.32604/cmc.2022.027135

Abstract

The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment. Cloud computing (CC) is used for storing as well as processing data. Therefore, security becomes important as the CC handles massive quantity of outsourced, and unprotected sensitive data for public access. This study introduces a novel chaotic chimp optimization with machine learning enabled information security (CCOML-IS) technique on cloud environment. The proposed CCOML-IS technique aims to accomplish maximum security in the CC environment by the identification of intrusions or anomalies in the network. The proposed CCOML-IS technique primarily normalizes the networking data by the use of data conversion and min-max normalization. Followed by, the CCOML-IS technique derives a feature selection technique using chaotic chimp optimization algorithm (CCOA). In addition, kernel ridge regression (KRR) classifier is used for the detection of security issues in the network. The design of CCOA technique assists in choosing optimal features and thereby boost the classification performance. A wide set of experimentations were carried out on benchmark datasets and the results are assessed under several measures. The comparison study reported the enhanced outcomes of the CCOML-IS technique over the recent approaches interms of several measures.

Keywords


Cite This Article

H. Mesfer Alshahrani, F. S. Alsubaei, T. Abdalla Elfadil Eisa, M. K. Nour, M. Ahmed Hamza et al., "Metaheuristics with machine learning enabled information security on cloud environment," Computers, Materials & Continua, vol. 73, no.1, pp. 1557–1570, 2022. https://doi.org/10.32604/cmc.2022.027135



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 947

    View

  • 499

    Download

  • 0

    Like

Share Link