Cargando…

Deep learning approach to security enforcement in cloud workflow orchestration

Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by a workflow deployed on the cloud need to be protected, and communication of such data across multiple stakeholders should also be secured. In general,...

Descripción completa

Detalles Bibliográficos
Autores principales: El-Kassabi, Hadeel T., Serhani, Mohamed Adel, Masud, Mohammad M., Shuaib, Khaled, Khalil, Khaled
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9848712/
https://www.ncbi.nlm.nih.gov/pubmed/36691661
http://dx.doi.org/10.1186/s13677-022-00387-2
_version_ 1784871774019649536
author El-Kassabi, Hadeel T.
Serhani, Mohamed Adel
Masud, Mohammad M.
Shuaib, Khaled
Khalil, Khaled
author_facet El-Kassabi, Hadeel T.
Serhani, Mohamed Adel
Masud, Mohammad M.
Shuaib, Khaled
Khalil, Khaled
author_sort El-Kassabi, Hadeel T.
collection PubMed
description Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by a workflow deployed on the cloud need to be protected, and communication of such data across multiple stakeholders should also be secured. In general, security threats in cloud environments have been studied extensively. Such threats include data breaches, data loss, denial of service, service rejection, and malicious insiders generated from issues such as multi-tenancy, loss of control over data and trust. Supporting the security of a cloud workflow deployed and executed over a dynamic environment, across different platforms, involving different stakeholders, and dynamic data is a difficult task and is the sole responsibility of cloud providers. Therefore, in this paper, we propose an architecture and a formal model for security enforcement in cloud workflow orchestration. The proposed architecture emphasizes monitoring cloud resources, workflow tasks, and the data to detect and predict anomalies in cloud workflow orchestration using a multi-modal approach that combines deep learning, one class classification, and clustering. It also features an adaptation scheme to cope with anomalies and mitigate their effect on the workflow cloud performance. Our prediction model captures unsupervised static and dynamic features as well as reduces the data dimensionality, which leads to better characterization of various cloud workflow tasks, and thus provides better prediction of potential attacks. We conduct a set of experiments to evaluate the proposed anomaly detection, prediction, and adaptation schemes using a real COVID-19 dataset of patient health records. The results of the training and prediction experiments show high anomaly prediction accuracy in terms of precision, recall, and F1 scores. Other experimental results maintained a high execution performance of the cloud workflow after applying adaptation strategy to respond to some detected anomalies. The experiments demonstrate how the proposed architecture prevents unnecessary wastage of resources due to anomaly detection and prediction.
format Online
Article
Text
id pubmed-9848712
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-98487122023-01-19 Deep learning approach to security enforcement in cloud workflow orchestration El-Kassabi, Hadeel T. Serhani, Mohamed Adel Masud, Mohammad M. Shuaib, Khaled Khalil, Khaled J Cloud Comput (Heidelb) Research Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by a workflow deployed on the cloud need to be protected, and communication of such data across multiple stakeholders should also be secured. In general, security threats in cloud environments have been studied extensively. Such threats include data breaches, data loss, denial of service, service rejection, and malicious insiders generated from issues such as multi-tenancy, loss of control over data and trust. Supporting the security of a cloud workflow deployed and executed over a dynamic environment, across different platforms, involving different stakeholders, and dynamic data is a difficult task and is the sole responsibility of cloud providers. Therefore, in this paper, we propose an architecture and a formal model for security enforcement in cloud workflow orchestration. The proposed architecture emphasizes monitoring cloud resources, workflow tasks, and the data to detect and predict anomalies in cloud workflow orchestration using a multi-modal approach that combines deep learning, one class classification, and clustering. It also features an adaptation scheme to cope with anomalies and mitigate their effect on the workflow cloud performance. Our prediction model captures unsupervised static and dynamic features as well as reduces the data dimensionality, which leads to better characterization of various cloud workflow tasks, and thus provides better prediction of potential attacks. We conduct a set of experiments to evaluate the proposed anomaly detection, prediction, and adaptation schemes using a real COVID-19 dataset of patient health records. The results of the training and prediction experiments show high anomaly prediction accuracy in terms of precision, recall, and F1 scores. Other experimental results maintained a high execution performance of the cloud workflow after applying adaptation strategy to respond to some detected anomalies. The experiments demonstrate how the proposed architecture prevents unnecessary wastage of resources due to anomaly detection and prediction. Springer Berlin Heidelberg 2023-01-18 2023 /pmc/articles/PMC9848712/ /pubmed/36691661 http://dx.doi.org/10.1186/s13677-022-00387-2 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
El-Kassabi, Hadeel T.
Serhani, Mohamed Adel
Masud, Mohammad M.
Shuaib, Khaled
Khalil, Khaled
Deep learning approach to security enforcement in cloud workflow orchestration
title Deep learning approach to security enforcement in cloud workflow orchestration
title_full Deep learning approach to security enforcement in cloud workflow orchestration
title_fullStr Deep learning approach to security enforcement in cloud workflow orchestration
title_full_unstemmed Deep learning approach to security enforcement in cloud workflow orchestration
title_short Deep learning approach to security enforcement in cloud workflow orchestration
title_sort deep learning approach to security enforcement in cloud workflow orchestration
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9848712/
https://www.ncbi.nlm.nih.gov/pubmed/36691661
http://dx.doi.org/10.1186/s13677-022-00387-2
work_keys_str_mv AT elkassabihadeelt deeplearningapproachtosecurityenforcementincloudworkfloworchestration
AT serhanimohamedadel deeplearningapproachtosecurityenforcementincloudworkfloworchestration
AT masudmohammadm deeplearningapproachtosecurityenforcementincloudworkfloworchestration
AT shuaibkhaled deeplearningapproachtosecurityenforcementincloudworkfloworchestration
AT khalilkhaled deeplearningapproachtosecurityenforcementincloudworkfloworchestration