Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central hardware access. Many of the challenges associated with cloud computing can be specified as network load, security intrusion, authentication, biometric identification, and information leakage. Numerous algorithms have been proposed and evaluated to solve those challenges. Among those, bio-inspired algorithms such as Evolutionary, Swarm, Immune, and Neural algorithms are the most prominent ones which are developed based on nature's ecosystems. Bio-inspired algorithms' adaptability allows many researchers and practitioners to utilize them to solve many security-related cloud computing issues. This paper aims to explore previous research, recent studies, challenges, and scope for further analysis of cloud security. Therefore, this study provides an overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges, such as Identity and Authentication, Access Control Systems, Protocol and Network Security, Trust Management, Intrusion Detection, Virtualization, and Forensic.
CITATION STYLE
Ahsan, M. M., Gupta, K. D., Nag, A. K., Poudyal, S., Kouzani, A. Z., & Mahmud, M. A. P. (2020). Applications and evaluations of bio-inspired approaches in cloud security: A review. IEEE Access. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2020.3027841
Mendeley helps you to discover research relevant for your work.