Proficient Machine Learning Techniques for a Secured Cloud Environment

  • Chandrababu M
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many different checks, rules, processes, and technologies work together to keep cloud-based applications and infrastructure safe and secure against cyberattacks. Data security, customer privacy, regulatory enforcement, and device and user authentication regulations are all protected by these safety measures. Insecure Access Points, DDoS Attacks, Data Breach and Data Loss are the most pressing issues in cloud security. In the cloud computing context, researchers looked at several methods for detecting intrusions. Cloud security best practises such as host & middleware security, infrastructure and virtualization security, and application system & data security make up the bulk of these approaches, which are based on more traditional means of detecting abuse and anomalies. Machine Learning-based strategies for securing cloud infrastructure are the topic of this work, and ongoing research comprises research issues. There are a number of unresolved issues that will be addressed in the future.

Cite

CITATION STYLE

APA

Chandrababu, M., & Moorthy, Dr. S. K. K. (2022). Proficient Machine Learning Techniques for a Secured Cloud Environment. International Journal of Engineering and Advanced Technology, 11(6), 74–81. https://doi.org/10.35940/ijeat.f3730.0811622

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free