Cargando…

Computer cyberspace security mechanism supported by cloud computing

To improve the cybersecurity of Cloud Computing (CC) system. This paper proposes a Network Anomaly Detection (NAD) model based on the Fuzzy-C-Means (FCM) clustering algorithm. Secondly, the Cybersecurity Assessment Model (CAM) based on Grey Relational Grade (GRG) is creatively constructed. Finally,...

Descripción completa

Detalles Bibliográficos
Autor principal: Fu, ZeYuan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9543945/
https://www.ncbi.nlm.nih.gov/pubmed/36206264
http://dx.doi.org/10.1371/journal.pone.0271546
_version_ 1784804489932308480
author Fu, ZeYuan
author_facet Fu, ZeYuan
author_sort Fu, ZeYuan
collection PubMed
description To improve the cybersecurity of Cloud Computing (CC) system. This paper proposes a Network Anomaly Detection (NAD) model based on the Fuzzy-C-Means (FCM) clustering algorithm. Secondly, the Cybersecurity Assessment Model (CAM) based on Grey Relational Grade (GRG) is creatively constructed. Finally, combined with Rivest Shamir Adleman (RSA) algorithm, this work proposes a CC network-oriented data encryption technology, selects different data sets for different models, and tests each model through design experiments. The results show that the average Correct Detection Rate (CDR) of the NAD model for different types of abnormal data is 93.33%. The average False Positive Rate (FPR) and the average Unreported Rate (UR) are 6.65% and 16.27%, respectively. Thus, the NAD model can ensure a high detection accuracy in the case of sufficient data. Meanwhile, the cybersecurity situation prediction by the CAM is in good agreement with the actual situation. The error between the average value of cybersecurity situation prediction and the actual value is only 0.82%, and the prediction accuracy is high. The RSA algorithm can control the average encryption time for very large text, about 12s. The decryption time is slightly longer but within a reasonable range. For different-size text, the encryption time is maintained within 0.5s. This work aims to provide important technical support for anomaly detection, overall security situation analysis, and data transmission security protection of CC systems to improve their cybersecurity.
format Online
Article
Text
id pubmed-9543945
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-95439452022-10-08 Computer cyberspace security mechanism supported by cloud computing Fu, ZeYuan PLoS One Research Article To improve the cybersecurity of Cloud Computing (CC) system. This paper proposes a Network Anomaly Detection (NAD) model based on the Fuzzy-C-Means (FCM) clustering algorithm. Secondly, the Cybersecurity Assessment Model (CAM) based on Grey Relational Grade (GRG) is creatively constructed. Finally, combined with Rivest Shamir Adleman (RSA) algorithm, this work proposes a CC network-oriented data encryption technology, selects different data sets for different models, and tests each model through design experiments. The results show that the average Correct Detection Rate (CDR) of the NAD model for different types of abnormal data is 93.33%. The average False Positive Rate (FPR) and the average Unreported Rate (UR) are 6.65% and 16.27%, respectively. Thus, the NAD model can ensure a high detection accuracy in the case of sufficient data. Meanwhile, the cybersecurity situation prediction by the CAM is in good agreement with the actual situation. The error between the average value of cybersecurity situation prediction and the actual value is only 0.82%, and the prediction accuracy is high. The RSA algorithm can control the average encryption time for very large text, about 12s. The decryption time is slightly longer but within a reasonable range. For different-size text, the encryption time is maintained within 0.5s. This work aims to provide important technical support for anomaly detection, overall security situation analysis, and data transmission security protection of CC systems to improve their cybersecurity. Public Library of Science 2022-10-07 /pmc/articles/PMC9543945/ /pubmed/36206264 http://dx.doi.org/10.1371/journal.pone.0271546 Text en © 2022 ZeYuan Fu https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Fu, ZeYuan
Computer cyberspace security mechanism supported by cloud computing
title Computer cyberspace security mechanism supported by cloud computing
title_full Computer cyberspace security mechanism supported by cloud computing
title_fullStr Computer cyberspace security mechanism supported by cloud computing
title_full_unstemmed Computer cyberspace security mechanism supported by cloud computing
title_short Computer cyberspace security mechanism supported by cloud computing
title_sort computer cyberspace security mechanism supported by cloud computing
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9543945/
https://www.ncbi.nlm.nih.gov/pubmed/36206264
http://dx.doi.org/10.1371/journal.pone.0271546
work_keys_str_mv AT fuzeyuan computercyberspacesecuritymechanismsupportedbycloudcomputing