A Novel Hybrid Security Framework (HSF) with Vshield Based Firewall to Secure Cloud Computing Environment

Main Article Content

J. Jeya Praise
N. Muthukumaran
R. Joshua Samuel Raj

Abstract

Cloud Computing is an emerging technology that provides an enormous amount of computing resources which includes networks, servers and storages which are accessed through the internet. In addition it allows useful provisioning of the resources based on the user’s demands. A crucial aspect of cloud computing infrastructure is to provide secure and reliable services.  The main challenge lies in the security issues is to reduce the impact of third party attacks in the cloud computing environment. Hence a novel Hybrid Security Framework(HSF) based on Reinforcement Learning (RL) Methodology with Vshield Firewall is proposed for securing the cloud environment.  The RL method is used for deep packet inspection and VShiled based firewall is established to deny the attacks which are malicious when authenticating the signature of incoming packets. The bipartite pattern matching approach is integrated with the RL method to verify the signatures for obtaining the decisions quickly.  The simulation results shows that the hybrid security framework is effective when compared with the existing methods by considering response time, resource utilization and denial of malicious attacks.  This indicates that our proposed framework achieves not only better security but also attains better efficiency in cloud computing environment.

Article Details

How to Cite
Praise, J. J. ., Muthukumaran, N. ., & Raj, R. J. S. . (2023). A Novel Hybrid Security Framework (HSF) with Vshield Based Firewall to Secure Cloud Computing Environment. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10s), 423–430. https://doi.org/10.17762/ijritcc.v11i10s.7650
Section
Articles

References

D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, International Conference on Computer Science and Electronics Engineering, 2012.

Alhomdy, S., Thabit, F., Abdulrazzak, F.H., Haldorai, A., Jagtap, S. The role of cloud computing technology: A savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications (2021) International Journal of Intelligent Networks, 2, pp. 166-174.

A. R. Khakpour and A. X. Liu, “First step toward cloud-based firewalling,” Reliable Distributed Systems, 31st Symposium on. IEEE, 2012, pp. 41–50.

Barret E, Howley E, Duggan J (2013) “Applying reinforcement learning toward automating resource allocation and application scalability in the cloud” Concurrency Computation and Pract Exp 25(12):1656–1674.

J. Jeya Praise, R. Joshua Samuel Raj and J.V. Bibal Benifa, “Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure”, Wireless Personal Communcations 115, Pages: 993-1018, 2020. https://doi.org/10.1007/s11277-020-07608-4.

G. Liyanage and S. Fernando, “Firewall model for cloud computing,” IEEE 8th International Conference on Industrial and Information Systems, Peradeniya, 2013.

M. G. Gouda and A. X. Liu, “Structured firewall design”, ComputerNetworks, vol. 51, no. 4, pp. 1106–1120, 2007.

B. H. Bloom, “Space/time trade-offs in hash coding with allowableerrors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970.

Balakrishnan, M., Nalina, M., Ramya, K., Senthilsriram, K. Cloud Computing based Data Validation and Migration in ETL using Talend (2022) 6th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2022 - Proceedings, pp. 1349-1355.

L. Melis, H. J. Asghar, E. De Cristofano, and M. A. Kaafar, “Privateprocessing of outsourced network functions: Feasibility and constructions.”

J. Shi, Y. Zhang, and S. Zhong, “Privacy-preserving network functionalityoutsourcing,” arXiv preprint arXiv:1502.00389, 2015

H. Kurdi, M. Enazi and A. Al Faries, ”Evaluating Firewall Models forHybrid Clouds,” in Modelling Symposium (EMS), 2013 European,Manchester, 2013.

Ankush Veer Reddy Vee,”Usage of OPNET IT tool to Simulate andTest the Security of Cloud under varying Firewall conditions,”Faculty of The School of Engineering & ComputingSciences, Texas A&M University-Corpus Christi, Corpus Christi, TX, 2012.

S. Y. Ameen and S. W. Nourildean, ”Firewall and VPN Investigationon Cloud Computing Performance,” International Journal of ComputerScience & Engineering Survey, vol. 5, no. 2, pp. 15-25, 2014.

Sukhmeet Singh, Nitin Sharma. (2023). Image Based Analysis for Bone Marrow Cancer Detection using Soft Computing Techniques: A Review. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 602–610. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2737

S. Na, J. Park, E. Huh, “Personal Cloud Computing SecurityFramework,” 2010 IEEE Asia-Pacific Services ComputingConference.

Z. Brakerski and G. N. Rothblum, “Obfuscating conjunctions,” inAdvances in Cryptology–CRYPTO 2013. Springer, 2013, pp. 416–434.

J.-S. Coron, T. Lepoint, and M. Tibouchi, “Practical multilinear mapsover the integers,” in Advances in Cryptology–CRYPTO 2013. Springer,2013, pp. 476–493.

J. H. Cheon, K. Han, C. Lee, H. Ryu, and D. Stehl´e, “Cryptanalysisof the multilinear map over the integers,” in Advances in Cryptology–EUROCRYPT 2015. Springer, 2015, pp. 3–12.

Matti Virtanen, Jan de Vries, Thomas Müller, Daniel Müller, Giovanni Rossi. Machine Learning for Intelligent Feedback Generation in Online Courses . Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/188

Karthika. A, Muthukumaran. N, Joshua Samuel Raj. R, ‘An Ads-Csab Approach for Economic Denial of Sustainability Attacks in Cloud Storage’, International Journal of Scientific & Technology Research, Vol. 9, Issue. 04, pp. 2575-2578, April 2020.

M. Komu, M. Sethi, R. Mallavarapu, H. Oirola and R. Khan, ” SecureNetworking for Virtual Machines in the Cloud,” 2012 IEEEInternational Conference on Cluster Computing Workshops.

Alex X. Liu, and Fei Chen, EEEPrivacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Network, IEEE Transactions on Parallel And Distributed Systems, VOL. 22, NO. 5, (2011)

Maleeha Najam, Usman Younis, Raihan ur Rasool, “Speculative parallel pattern matching using stride-k DFA for deep packet inspection”, Journal of Network and Computer Applications, Volume 54, Pages 78-87.

Yingpei Zeng, and Shanqing Guo, “Deep Packet Inspection with Delayed Signature Matching in Network Auditing”, https://doi.org/10.1007/978-3-030-01950-15.

Andrew Hernandez, Stephen Wright, Yosef Ben-David, Rodrigo Costa, David Botha. Risk Assessment and Management with Machine Learning in Decision Science. Kuwait Journal of Machine Learning, 2(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/196

Xiuwen Sun, Hao Li, Dan Zhao, Xingxing Lu, Kaiyu Hou, Chengchen Hu, “COIN: A fast packet inspection method over compressed traffic”, Journal of Network and Computer Applications, https://doi.org/10.1016/j.jnca.2018.12.008.

Alexey Lukashin, Leonid Laboshin, Vladimir Zaborovsky, and Vladimir Mulukha, Distributed Packet Trace Processing Method for Information Security Analysis, LNCS 8638, pp. 535–543, 2014.

Similar Articles

You may also start an advanced similarity search for this article.