Invalid cloud providers' identification using support vector machine

##plugins.themes.academic_pro.article.main##

Seyedeh Zeynab Mohammadi
Nima Jafari Navimipour

Abstract

Cloud computing is a relatively new technology by the creation of which, companies and organizations transmit their services to cloud domains in order to do their tasks. With the companies and service provider organizations, profiteers seem not to neglect these areas and with different approaches try to do threats on users’ information and data security. Hence, it is necessary to adopt an approach relying on cloud providers to distinguish valid from invalid cloud provider. Recognizing valid and invalid cloud providers can be issued as a classifying subject. In this paper, a support vector machine (SVM) algorithm is used in order to classify cloud providers. The features of SVM are good generalization, ability to classify input pattern, optimal general pattern, and learning capability. The proposed method converts data to learning vector each of which has a corresponding output value and the ability to find the optimal amount in the non-linear and linear atmosphere. In this research, a data set of 1018 samples was used to classify cloud providers each of which has 10 features of cloud providers. To evaluate the performance of the proposed approach, 80 percent of data set is randomly considered as a training set and 20 percentage as a test set. The results demonstrated that the proposed approach is efficient as compared to the meta-heuristic algorithms.

##plugins.themes.academic_pro.article.details##

How to Cite
Mohammadi, S. Z. ., & Navimipour, N. J. . (2017). Invalid cloud providers’ identification using support vector machine. International Journal of Next-Generation Computing, 8(1), 82–98. https://doi.org/10.47164/ijngc.v8i1.122

References

  1. Aghdam, Samad Mohammad, Navimipour, Nima Jafari 2016. Opinion leaders selection in the social networks based on trust relationships propagation. Karbala International Journal of Modern Science Vol.2, No.2. pp.88-97.
  2. Ahmad, Mohammad Oqai, Khan, Rafiqul Zaman 2015. The Cloud Computing: A Systematic Review. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) Vol.3, No.5.
  3. Almishal, Abdulelah, Youssef, Ahmed E 2014. Cloud Service Providers: A Comparative Study. International Journal of Computer Applications & Information Technology Vol.5,.
  4. Aznoli, Fariba, Navimipour, Nima Jafari 2017. Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions. Journal of Network and Computer Applications Vol.77,. pp. 73-86.
  5. Chiregi, Matin Navimipour, Nima Jafari 2016. A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the e ect of troll entities. Computers in Human Behavior Vol.60,. pp. 280-292.
  6. Chowhan, Seema Sunil, Shirwaikar, Shailaja Kumar, Ajay 2016. Predictive Modeling of Service Level Agreement Parameters for Cloud Services. International Journal of NextGeneration Computing Vol.7, No.2. pp.115-129.
  7. Filali, Fatima Zohra, Yagoubi, Belabbes 2015. Global trust: A trust model for cloud service selection. International Journal of Computer Network and Information Security Vol.7, No.5.
  8. Gholami, Atoosa, Arani, Mostafa Ghobaei 2015. A trust model based on quality of service in cloud computing environment. International Journal of Database Theory and Application Vol.8, No.5. PP.161-170.
  9. Islam, Tariqul, Manivannan, D Zeadally, Sherali 2016. A classi cation and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput Vol.7, No.1.
  10. Jain, Siddharth, Kumar, Rakesh Anamika, Sunil Kumar Jangir 2014. A comparative study for cloud computing platform on open source software. ABHIYANTRIKI: An International Journal of Engineering & Technology (AIJET) Vol.1, No.2. pp28-35.
  11. Jiang, Tao et al 2015. Towards secure and reliable cloud storage against data re-outsourcing. Future Generation Computer Systems Vol.52, pp.86-94.
  12. Keshanchi, Bahman Navimipour, Nima Jafari 2016. Priority-Based Task Scheduling in the Cloud Systems Using a Memetic Algorithm. Journal of Circuits, Systems and Computers Vol.25, No. 10.
  13. Keshanchi, Bahman Souri, Alireza Navimipour, Nima Jafari 2017. An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: Formal veri cation, simulation, and statistical testing. Journal of Systems and Software Vol.124, pp.1-21.
  14. Mahendiran, A et al 2012. Implementation of K-means clustering in cloud computing environment. Research Journal of Applied Sciences, Engineering and Technology Vol.4, No. 10 pp. 1391-1394.
  15. Mahjoub, Meriam et al 2011. A comparative study of the current cloud computing technologies and o ers. Network Cloud Computing and Applications (NCCA), 2011 First International Symposium on pp.131-134.
  16. Mahjoub, Meriam et al 2015. Requirements Capture and Comparative Analysis of Cloud Security Techniques. International Journal of Grid and Distributed Computing Vol.8, No. 2 pp.285-308.
  17. Miao, Meixia Jiang, Tao You, Ilsun 2015. Payment-based incentive mechanism for secure cloud deduplication. International Journal of Information Management Vol.35, No. 3 pp.379-386.
  18. Milani, Alireza Sadeghi Navimipour, Nima Jafari 2016. Load balancing mechanisms and techniques in the cloud environments: systematic literature review and future trends. Journal of Network and Computer Applications Vol.71, pp.86-98.
  19. Navimipour, Nima Jafari 2015. Task scheduling in the cloud environments based on an artificial bee colony algorithm. Proceedings of the Paper Presented at the International Conference on Image Processing, Production and Computer Science, Istanbul (Turkey).
  20. Navimipour, Nima Jafari 2015. A formal approach for the speci cation and veri cation of a trustworthy human resource discovery mechanism in the expert cloud. Expert Systems with Applications Vol.42, No 15 pp.6112-6131.
  21. Navimipour, Nima Jafari Milani, Farnaz Sharifi 2015. Task scheduling in the cloud computing based on the cuckoo search algorithm. International Journal of Modeling and Optimization Vol.5, No 1.
  22. Pichan, Ameer Lazarescu, Mihai Soh, Sie Teng 2015. Cloud forensics: Technical challenges, solutions and comparative analysis. Digital Investigation Vol.13, pp.38-57.
  23. Rao, R Velumadhava Selvamani, K 2015. Data security challenges and its solutions in cloud computing. Procedia Computer Science Vol.48, pp.204-209.
  24. Shahi, Tej Bahadur Ghimire, Dadhi Ram 2014. Comparison of BP and SVM on SLA based Masquerader Detection in Cloud. International Journal of Computer Applications Vol.91, No 14.
  25. Sun, Le Dong, Hai Hussain, Farookh Khadeer Hussain, Omar Khadeer Chang, Elizabeth 2014. Cloud service selection: State-of-the-art and future research directions. Journal of Network and Computer Applications Vol.45, pp.134-150.
  26. Navimipour, Nima Jafari Vakili, Asrin 2017. Comprehensive and systematic review of the service composition mechanisms in the cloud environments. Journal of Network and Computer Applications.
  27. Wen, Xiaolong Gu, Genqiang Li, Qingchun Gao, Yun Zhang, Xuejie 2012. Comparison of open-source cloud management platforms: OpenStack and OpenNebula. Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on pp.2457-2461.