Abstract

Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users. CC recently has emerged as a set of public and private datacenters that offers the client a single platform across the Internet. Edge computing is an evolving computing paradigm that brings computation and information storage nearer to the end-users to improve response times and spare transmission capacity. Mobile CC (MCC) uses distributed computing to convey applications to cell phones. However, CC and edge computing have security challenges, including vulnerability for clients and association acknowledgment, that delay the rapid adoption of computing models. Machine learning (ML) is the investigation of computer algorithms that improve naturally through experience. In this review paper, we present an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms. We review different ML algorithms that are used to overcome the cloud security issues including supervised, unsupervised, semi-supervised, and reinforcement learning. Then, we compare the performance of each technique based on their features, advantages, and disadvantages. Moreover, we enlist future research directions to secure CC models.

Highlights

  • Cloud Computing (CC) has recently arisen as a new framework for facilitating and delivering services over the Internet [1]

  • The purpose of this paper is to present an analysis of the legal issues and security threats in distributed computing using Machine learning (ML) algorithms

  • The task utilized a dataset vector to partition them into positive and negative type, and the results demonstrate that the RBF-work Support Vector Machine (SVM) strategy performs most effectively in this mission

Read more

Summary

Introduction

Cloud Computing (CC) has recently arisen as a new framework for facilitating and delivering services over the Internet [1]. The common financial restrictions and growing computational cost require storage, analysis, and presentation of data that have imposed critical modifications for the present day cloud model [2,3]. CC is the on-demand accessibility of end-users’ resources, especially information storage and processing power, without a direct special organization by the client. Distributed computing offers public and private data to the client on a single platform across the Internet [4]. CC is an on-demand accessibility of end users’ resources, information storage and processing power, without an immediate one-of-a-kind association with the client [26]. Longer periods of huge capital interests in programming and information technology (IT) foundations are obsolete for any effort to manage using the circulated processing model for procurement organizations [34]. Customers who become tied up with enrolling organizations who have avoided cloud can significantly decrease the IT organization uses for their affiliations, and access sensibly sorted out and flexible endeavor level figuring organizations, all the method [35]

Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call