Enhancing Machine Learning Model Security in Private Cloud Environments through Cryptographic Techniques
Keywords:
Machine learning, Cloud Computing, Cryptography Algorithms, ClassifierAbstract
Cloud-based systems frequently encounter more serious security issues, especially when trying to secure stored information from harm. We present a model that acts as a barrier between users and cloud services, making use of modern techniques in machine learning for enhanced protection. Such a model is able to stop network attacks, identify different types of data and safeguard users’ information by applying various encryption algorithms based on its relevance. The Random Forest and Decision Tree methods are very accurate at identifying attacks with a score of over 98% and Logistic Regression also reaches or surpasses 98%. Important classified data in the cloud is secured using methods such as Twofish, Blowfish and the Advanced Encryption Standard (AES).
References
Jabbar, A. A., & Bhaya, W. S. (2023). Security of private cloud using machine learning and cryptography. Bulletin of Electrical Engineering and Informatics, 12(1), 561-569.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review. International Journal of Computer Networks & Information Security, 6, 20.
Masetic, Z., Hajdarevic, K., & Dogru, N. (2017). Cloud computing threats classification model based on the detection feasibility of machine learning algorithms. 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 1314–1318. doi: 10.23919/MIPRO.2017.7973626.
He, Z., Zhang, T., & Lee, R. B. (2017). Machine Learning Based DDoS Attack Detection from Source Side in Cloud. Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2017), 114–120. doi: 10.1109/CSCloud.2017.58.
Mahmood, A. L. G. S. (2017). Data Security Protection in Cloud Computing by using Encryption. Kirkuk University Journal/Scientific Studies, 12(4), 849–1992.
Sakr, M. M., Tawfeeq, M. A., & El-Sisi, A. B. (2019). Network Intrusion Detection System based PSO- SVM for Cloud Computing. International Journal of Computer Networks & Information Security, 11(3), 22–29. doi: 10.5815/ijcnis.2019.03.04.
Shyam, G. K., & Doddi, S. (2019). Achieving Cloud Security Solutions through Machine and Non- Machine Learning Techniques: A Survey. Journal of Engineering Science and Technology Review, 12(3).
Abuhaiba, I. S. I., & Dawoud, H. M. (2017). Combining different approaches to improve Arabic text documents classification. International Journal of Intelligent Systems and Applications, 9(4), 39. doi: 10.5815/ijisa.2017.04.05.
Li, X., Yi, P., Wei, W., Jiang, Y., & Tian, L. (2021). LNNLS-KH: A Feature Selection Method for Network Intrusion Detection. Security and Communication Networks, 2021, 8830431. doi: 10.1155/2021/8830431.
Pandeeswari, N., & Kumar, G. (2016). Anomaly detection system in cloud environment using fuzzy clustering-based ANN. Mobile Networks and Applications, 21(3), 494–505. doi: 10.1007/s11036-015-0644-x.
Al-Attab, B. S., & Fadewar, H. S. (2018). Hybrid data encryption technique for data security in cloud computing. Sinhgad Institute of Management and Computer Applications, 221-224.
Anakath, A. S., Rajakumar, S., & Ambika, S. (2019). Privacy preserving multi-factor authentication using trust management. Cluster Computing, 22(5), 10817–10823. doi: 10.1007/s10586-017-1181-0.
Hong, D., Lee, J.-K., Kim, D.-C., Kwon, D., Ryu, K. H., & Lee, D.-G. (2013). LEA: A 128-bit block cipher for fast encryption on common processors. International Workshop on Information Security Applications, 3–27. doi: 10.1007/978-3-319-05149-9_1.
Delen, D., & Crossland, M. D. (2008). Seeding the survey and analysis of research literature with text mining. Expert Systems with Applications, 34(3), 1707–1720. doi: 10.1016/j.eswa.2007.01.035.
Kamel, H., & Abdullah, M. Z. (2022). Distributed denial of service attacks detection for software- defined networks based on evolutionary decision tree model. Bulletin of Electrical Engineering and Informatics, 11(4), 2322–2330. doi: 10.11591/eei.v11i4.3835.
Singh, A. K., & Saxena, D. (2022). A cryptography and machine learning-based authentication for secure data-sharing in a federated cloud services environment. Journal of Applied Security Research, 17(3), 385–412.
Altamemi, A. J., Abdulhassan, A., & Obeis, N. T. (2022). DDoS attack detection in software-defined networking controller using machine learning techniques. Bulletin of Electrical Engineering and Informatics, 11(5), 2836–2844. doi: 10.11591/eei.v11i5.4155.
Hassan, K. F., & Manaa, M. E. (2022). Detection and mitigation of DDoS attacks in the Internet of Things using a fog computing hybrid approach. Bulletin of Electrical Engineering and Informatics, 11(3), 1604–1613. doi: 10.11591/eei.v11i3.3643.
Kumar, V., Sinha, D., Das, A. K., Pandey, S. C., & Goswami, R. T. (2020). An integrated rule-based intrusion detection system: analysis on UNSW-NB15 data set and the real-time online dataset. Cluster Computing, 23(2), 1397–1418. doi: 10.1007/s10586-019-03008-x.
Vora, U., Mahato, J., Dasgupta, H., Kumar, A., & Ghosh, S. K. (2021). Machine Learning–Based Security in Cloud Database—A Survey. Machine Learning Techniques and Analysis for Cloud Security, 239–269. doi: 10.1002/9781119764113.ch12.
Uçtu, G., Alkan, M., Doğru, İ. A., & Dörterler, M. (2021). A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls. Future Generation Computer Systems, 124, 56–67. doi: 10.1016/j.future.2021.05.013.
Bhavani, D. D., Vasavi, A., & Keshava P. T. (2016). Machine Learning: A Critical Review of Classification Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 5(3), 22-28.
Narudin, F. A., et al. (2016). Evaluation of machine learning classifiers for mobile malware detection. Soft Computing, 20, 343-357.
Costa, V. G., & Pedreira, C. E. (2023). Recent advances in decision trees: An updated survey. Artificial Intelligence Review, 56(5), 4765–4800.
Belavagi, M. C., & Muniyal, B. (2016). Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Computer Science, 89, 117–123.
Ul Haq, M. N., & Kumar, N. (2021). A novel data classification-based scheme for cloud data security using various cryptographic algorithms. International Review of Applied Sciences and Engineering.
Published on: 11-12-2025
Also Available On
How to Cite
Issue
Section
License
Copyright (c) 2025 Ayesha Siddiqui, Mohd Naved Ul Haq, Mohd Nafees

This work is licensed under a Creative Commons Attribution 4.0 International License.
