237,99 €
CONVERSATIONAL ARTIFICIAL INTELLIGENCE This book reviews present state-of-the-art research related to the security of cloud computing including developments in conversational AI applications. It is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in advanced security solutions for conversational AI in the cloud platform domain by reviewing present and evolving security solutions, their limitations, and future research directions. Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots' increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1676
Veröffentlichungsjahr: 2024
Cover
Table of Contents
Series Page
Title Page
Copyright Page
Preface
1 A Glance View on Cloud Infrastructures Security and Solutions
1.1 Introduction
1.2 Methodology
1.3 Literature Review
1.4 Open Challenges
1.5 Recommendations
1.6 Conclusion
Acknowledgments
References
2 Artificial Intelligence Effectiveness for Conversational Agents in Healthcare Security
2.1 Introduction
2.2 Types of AI Relevance to Healthcare
2.3 The Future of AI in Healthcare
2.4 Ways of Artificial Intelligence that Will Impact Hearlthcare
2.5 AI Models
2.6 Compare E-Cohort Findings on Wearables and AI in Healthcare
2.7 Ethical Concerns of AI in Healthcare
2.8 Future in Healthcare
2.9 Conclusion
References
3 Conversational AI: Security Features, Applications, and Future Scope at Cloud Platform
3.1 Introduction
3.2 How Does Conversational Artificial Intelligence (AI) Work?
3.3 The Conversational AI Components
3.4 Uses of Conversational AI
3.5 Advantages of Conversational AI
3.6 Challenges with Conversational Artificial Intelligence
3.7 Risks Associated with Conversational AI
3.8 Proposed Model for Conversational AI in Cloud Platform
3.9 Conclusion
3.10 Future Work
References
4 Unsupervised BERT-Based Granular Sentiment Analysis of Literary Work
4.1 Introduction
4.2 Related Works
4.3 Text Extraction
4.4 Data Preprocessing
4.5 Sentiment Analysis on Literary Works
4.6 TF-IDF Vectorizer
4.7 Fine-Grained Sentiment Analysis on Literary Data
4.8 BERT Classifier for Unsupervised Learning
4.9 Conclusion
References
5 Extracting and Analyzing Factors to Identify the Malicious Conversational AI Bots on Twitter
5.1 Introduction
5.2 Literature Review
5.3 Methods
5.4 Results and Discussion
5.5 Conclusion and Future Direction
References
6 Evolution and Adoption of Conversational Artificial Intelligence in the Banking Industry
6.1 Introduction
6.2 Significance of Artificial Intelligence
6.3 Conversational AI in the Indian Banking Industry
6.4 Conversational AI in Use in Various Companies
6.5 Conclusion
References
7 Chatbots: Meaning, History, Vulnerabilities, and Possible Defense
7.1 Understanding Chatbots
7.2 History of Chatbots
7.3 Vulnerabilities and Security Concerns of Chatbots
7.4 Possible Defense Strategies
7.5 Conclusion
References
8 Conversational Chatbot-Based Security Threats for Business and Educational Platforms and Their Counter Measures
8.1 Introduction
8.2 Chatbot Applications in Education, Business Management, and Health Sector
8.3 Security and Privacy in Chatbot
8.4 Related Work
8.5 Methodology
8.6 Results and Discussion
8.7 Conclusion
References
9 Identification of User Preference Using Human–Computer Interaction Technologies and Design of Customized Reporting for Business Analytics Using Ranking Consistency Index
9.1 Introduction
9.2 Literature Review
9.3 Design of Metric for Ranking Consistency Index
9.4 Experimentation
9.5 Results and Discussion
9.6 Conclusion
References
10 Machine Learning for Automatic Speech Recognition
10.1 Introduction
10.2 Related Work
10.3 Methodology
10.4 Results
10.5 Conclusion
References
11 Conversational Artificial Intelligence at Industrial Internet of Things
11.1 Introduction
11.2 Technology Components Used in Conversational AI
11.3 Benefits of Conversational AI
11.4 How to Create Conversational AI?
11.5 Conversational Platforms and Internet of Things: Relevance and Benefits
11.6 Internet of Things Status for Industry
11.7 Scope of IIoT in Future
11.8 Work of IIoT with Additional New Innovations
11.9 Conclusion
References
12 Performance Analysis of Cloud Hypervisor Using Network Package Workloads in Virtualization
12.1 Introduction
12.2 A Related Study on Energy Efficiency
12.3 Motivation
12.4 Experiment Methodology and Setup
12.5 Results and Discussion
12.6 Conclusion
References
13 Evaluation of Chabot Text Classification Using Machine Learning
13.1 Introduction
13.2 Literature Survey
13.3 Methodology
13.4 Results
13.5 Conclusion
References
14 Enhanced Security in Chatbot
14.1 Introduction
14.2 Architecture of Chatbots
14.3 Working of Chatbots
14.4 Background
14.5 Literature Survey
14.6 Proposed System
14.7 Analysis of the Work
14.8 Future Work
14.9 Conclusion
References
15 Heart Disease Prediction Using Ensemble Feature Selection Method and Machine Learning Classification Algorithms
15.1 Introduction
15.2 Review of Literature
15.3 Proposed Methodology
15.4 Experimental Results
15.5 Conclusion
References
16 Conversational AI: Dialoguing Most Humanly With Non-Humans
16.1 Introduction
16.2 History
16.3 Chatbot vs. Conversational AI
16.4 Dialogue Systems
16.5 Human Computer Interaction
16.6 Artificial Intelligence
16.7 Components of Conversational AI
16.8 Frameworks, Models, and Architectures
16.9 Conclusion
References
17 Counterfeit Pharmaceutical Drug Identification
17.1 Introduction
17.2 Materials and Methods
17.3 Results and Discussion
17.4 Conclusion
References
18 Advanced Security Solutions for Conversational AI
18.1 Introduction
18.2 Background
18.3 Components of Conversational AI
18.4 Challenges with Conversational AI
18.5 Conclusion
References
19 Security Threats and Security Testing for Chatbots
19.1 Introduction
19.2 Related Work
19.3 Vulnerability Assessment Tools
19.4 Penetration Testing
19.5 Vulnerabilities in Chatbot
19.6 Conclusion
References
20 ChatBot-Based Next-Generation Intrusion Detection System
20.1 Introduction
20.2 Literature Survey
20.3 Methodology
20.4 Result Analysis
20.5 Conclusion
References
21 Conversational Chatbot With Object Recognition Using Deep Learning and Machine Learning
21.1 Introduction
21.2 Literature Survey
21.3 Methodology
21.4 Results and Discussion
21.5 Conclusion
References
22 Automatic Speech Recognition Design Modeling
22.1 Introduction
22.2 Literature Survey
22.3 Methodology
22.4 Experimental Result Analysis
22.5 Conclusion
References
23 The Future of Modern Transportation for Smart Cities Using Trackless Tram Networks
23.1 Introduction
23.2 Proposed System Architecture
23.3 Working Process of the TRAM-RSU Framework
23.4 Experimental Analysis
23.5 Summary
References
24 Evaluating the Performance of Conversational AI Tools: A Comparative Analysis
24.1 Introduction
24.2 Literature Review
24.3 Methodology
24.4 Result
24.5 Discussion
24.6 Conclusion
References
25 Conversational AI Applications in Ed-Tech Industry: An Analysis of Its Impact and Potential in Education
25.1 Introduction
25.2 Conversational AI in Ed-Tech Overview
25.3 Methodology
25.4 Conclusion, Limitation, and Future Work
References
26 Conversational AI: Introduction to Chatbot’s Security Risks, Their Probable Solutions, and the Best Practices to Follow
26.1 Introduction
26.2 Related Work
26.3 History and Evolution of Chatbots
26.4 Components & Concepts that Make Conversational AI Possible
26.5 Working of Conversational AI
26.6 Reasons Behind why Companies are Using Chatbot
26.7 Plans for the Future Development of Conversational AI
26.8 Security Risks of Conversational AI’s Chatbot
26.9 Probable Solutions to the Security Vulnerabilities
26.10 Privacy Laws for the Security of Conversational AI and Chatbot
26.11 Chatbot and GDPR
26.12 Best Practices to Follow to Ensure Chatbot Security
26.13 Conclusion
Acknowledgment
References
27 Recent Trends in Pattern Recognition, Challenges and Opportunities
27.1 Introduction
27.2 Optical Character Recognition
27.3 Various Sectors of Pattern Recognition
27.4 Applications of Natural Language Processing
27.5 Conclusion
References
28 A Review of Renewable Energy Efficiency Technologies Toward Conversational AI
28.1 Introduction
28.2 Renewable Energy
28.3 Energy Technologies
28.4 Conversational AI
28.5 Conclusion
References
29 Messaging Apps Vulnerability Assessment Using Conversational AI
29.1 Introduction
29.2 Penetration Test
29.3 Mobile App Security
29.4 Discovered Vulnerabilities in Mobile Applications
29.5 Mitigation Strategies Against Cross-Site Scripting and SQL Attacks
29.6 Mobile Application Security Framework
29.7 Conclusion
References
30 Conversational AI Threat Identification at Industrial Internet of Things
30.1 Introduction
30.2 IoT Layered Architecture
30.3 Security Issues in IoT
30.4 Literature Survey of Various Attacks on Industrial Internet of Things
30.5 Various Attacks in Industrial Internet of Things
30.6 Recent Attacks on Industrial IoT
30.7 Conclusion
References
31 Conversational AI—A State-of-the-Art Review
31.1 Introduction
31.2 Related Work
31.3 Problem Statement
31.4 Proposed Methodology
31.5 Regulatory Landscape of Conversational AI
31.6 Future Works
31.7 Conclusion
References
32 Risks for Conversational AI Security
32.1 Introduction
32.2 Related Work
32.3 History and Evolution of Conversational AI Security
32.4 Components and Concepts that Make Coversational AI Security
32.5 Working of Conversational AI Security
32.6 Risk for Conversational AI Security
32.7 Solutions for Conversational AI Security
32.8 Conclusion
Acknowledgement
References
33 Artificial Intelligence for Financial Inclusion in India
33.1 Introduction
33.2 Digitalization of Banking Sector Paving Way for AI in Financial Inclusion
33.3 Technology Acceptance Model
33.4 AI and Use of AI in Financial Inclusion
33.5 Conclusion
References
34 Revolutionizing Government Operations: The Impact of Artificial Intelligence in Public Administration
34.1 Introduction
34.2 Methodology
34.3 The Origin and Development of AI Technology and Current Methodologies in the Field
34.4 Artificial Intelligence in Indian Governance
34.5 Discharge of Government Functions
34.6 Challenges
34.7 Conclusion
References
Bibliography
35 Conversational AI and Cloud Platform: An Investigation of Security and Privacy
35.1 Introduction
35.2 Cloud Architecture
35.3 Literature Survey
35.4 Security in Conversational AI and Cloud Computing
35.5 Conclusion
References
36 Chatbot vs Intelligent Virtual Assistance (IVA)
36.1 Introduction
36.2 Related Work [13]
36.3 Problem Statement
36.4 Proposed Methodology
36.5 Regulatory Landscape
36.6 Future Works
36.7 Conclusion
References
37 Digital Forensics with Emerging Technologies: Vision and Research Potential for Future
37.1 Introduction
37.2 Background Work
37.3 Digital Twin Technology—An Era of Emerging Technology
37.4 Security
37.5 Digital Forensics Characteristics
37.6 Computer Forensics
37.7 Tool Required for Digital Forensics
37.8 Importance of Computer and Digital Forensics in Smart Era
37.9 Methods/Algorithms for Digital Forensics in Smart Era
37.10 Popular Tools Available for Digital Forensics
37.11 Popular Issues Towards Using AI–Blockchain–IoT in Digital Forensics
37.12 Future Research Opportunities Using AI-Blockchain-IoT in Digital Forensics
37.13 Limitations AI/ML–Blockchain–IoT-Based Smart Devices in Digital Forensics
37.14 Conclusion
References
38 Leveraging Natural Language Processing in Conversational AI Agents to Improve Healthcare Security
38.1 Introduction
38.2 Natural Language Process in Healthcare
38.3 Role of Conversational AI in Healthcare
38.4 NLP-Driven Security Measures
38.5 Integrating NLP With Security Framework
38.6 Conclusion
References
39 NLP-Driven Chatbots: Applications and Implications in Conversational AI
39.1 Introduction
39.2 Related Work
39.3 NLP-Driven Chatbot Technologies
39.4 Chatbot Software for Automated Systems
39.5 Conclusion
References
About the Editors
Index
Also of Interest
End User License Agreement
Chapter 2
Table 2.1 Comparing E-cohort findings on wearables and AI in healthcare.
Chapter 3
Table 3.1 Risks associated with conversational AI [10].
Table 3.2 Attacks that use distributed denial of service (DDoS).
Chapter 5
Table 5.1 Top 12 common independent features.
Chapter 6
Table 6.1 Usage of artificial intelligence in the financial industry categoriz...
Chapter 8
Table 8.1 Features selected using the CFS algorithm.
Chapter 9
Table 9.1 List of selected alternatives (users).
Table 9.2 List of criteria (financial ratios).
Table 9.3 Ranking Consistency Index Metric (M
RCI
) for normalization techniques...
Table 9.4 Normalization techniques and ranks for decision matrix of size 4*4, ...
Table 9.5 Calculation of total number of times same and different ranking prod...
Table 9.6 Ranking of alternatives with GFTOPSIS (LM-N) and GFTOPSIS (LMM-N).
Chapter 12
Table 12.1 Windows VM.
Table 12.2 Ubuntu VM.
Table 12.3 An algorithm for details on the graph algorithm.
Table 12.4 Type 1 hypervisors of cloud platform.
Chapter 14
Table 14.1 Generation of hash code.
Table 14.2 Parameters used in the work.
Chapter 15
Table 15.1 Dataset features and description.
Table 15.2 Pseudo-code for frequent feature subset selection method.
Table 15.3 Frequency count of each feature.
Table 15.4 Survey of existing and proposed models.
Chapter 16
Table 16.1 History of conversational agents.
Table 16.2 Chatbot vs conversational AI.
Table 16.3 Comparison of Rasa NLU and Rasa core.
Chapter 17
Table 17.1 Tesseract accuracy metrics.
Table 17.2 SpaCy accuracy metrics.
Table 17.3 Comparison of NER accuracy with existing models.
Chapter 23
Table 23.1 Classification types of vehicular nodes.
Table 23.2 List of notations used in the TRAM-RSU framework.
Table 23.3 List of pseudocode 1 notations.
Table 23.4 List of pseudocode 2 notations.
Table 23.5 Existing schemes.
Chapter 24
Table 24.1 Comparison of chatbots/virtual assistant/conversational agent.
Table 24.2 Feature comparison of the smart invigilation tools used in educatio...
Chapter 25
Table 25.1 Search query.
Table 25.2 Database search.
Table 25.3 Quality evaluation criteria.
Table 25.4 Selected article relevance with research question.
Table 25.5 Quality evaluation result.
Table 25.6 Details of platforms used for conversational AI.
Chapter 31
Table 31.1 Literature review of existing techniques.
Chapter 33
Table 33.1 Basic Saving Banking Deposit account (BSBD account).
Table 33.2 Top reasons banks use Artificial Intelligence.
Chapter 36
Table 36.1 Technique comparisons.
Chapter 2
Figure 2.1 Multilayered feed-forward artificial neuron network.
Figure 2.2 Azure confidential computing architecture.
Figure 2.3 Artificial Intelligence in Healthcare Market Size Report, 2030.
Chapter 3
Figure 3.1 Cloud computing architecture.
Figure 3.2 The general dialogue system’s structure.
Figure 3.3 The structure of the next-generation of virtual personal assistants...
Figure 3.4 Conversational AI in the cloud platform model.
Chapter 4
Figure 4.1 Shakespeare’s Hamlet play dataset.
Figure 4.2 Text preprocessing.
Figure 4.3 Text sentiment.
Figure 4.4 Polarity-based sentiment analysis.
Figure 4.5 TF-IDF vectorization.
Figure 4.6 Char_count positive and negative sentiment.
Figure 4.7 Literary char_count.
Figure 4.8 Violin plot of sentiment.
Figure 4.9 Literary word cloud.
Figure 4.10 Accuracy of the BERT classifier on literary work.
Chapter 5
Figure 5.1 Variable/feature description.
Figure 5.2 Experiment 1—Feature selection without outliers and extreme value t...
Figure 5.3 Experiment 2—Feature selection with outliers and extreme value trea...
Chapter 7
Figure 7.1 Example of a rule-based chatbot.
Figure 7.2 Example of an AI chatbot.
Figure 7.3 Timeline of some of the most popular chatbots.
Chapter 8
Figure 8.1 Chatbot communication flow.
Figure 8.2 Chatbot components.
Figure 8.3 Security threats.
Figure 8.4 Machine learning techniques for design of intrusion detection syste...
Figure 8.5 Accuracy of machine learning techniques for classification and pred...
Figure 8.6 Sensitivity of machine learning techniques for classification and p...
Figure 8.7 Specificity of machine learning techniques for classification and p...
Chapter 9
Figure 9.1 RCI metric for normalization techniques.
N1
Vector Normalization,
N
...
Figure 9.2 User preference on MCR with GFTOPSIS (LM-N) and GFTOPSIS (LMM-N).
Chapter 10
Figure 10.1 Deep learning in speech recognition.
Figure 10.2 Machine learning for automatic speech recognition.
Figure 10.3 Accuracy of classifiers for automatic speech recognition.
Figure 10.4 Sensitivity of classifiers for automatic speech recognition.
Figure 10.5 Specificity of classifiers for automatic speech recognition.
Figure 10.6 Precision of classifiers for automatic speech recognition.
Figure 10.7 Recall of classifiers for automatic speech recognition.
Figure 10.8 Accuracy, specificity, sensitivity, precision, and recall of class...
Chapter 12
Figure 12.1 The cloud computing stack.
Figure 12.2 Hyper-V architecture.
Figure 12.3 Cloud data center view; NAS stands for network area storage.
Figure 12.4 Completion times of varying computation-intensive workloads.
Figure 12.5 Overall comparison of VM.
Chapter 13
Figure 13.1 Block diagram of chatbot text classification.
Figure 13.2 Machine learning for chatbot text classification.
Figure 13.3 Accuracy comparison of classifiers for chatbot text classification...
Figure 13.4 Precision comparison of classifiers for chatbot text classificatio...
Figure 13.5 Recall comparison of classifiers for chatbot text classification.
Figure 13.6 F1 score comparison of classifiers for chatbot text classification...
Chapter 14
Figure 14.1 Layers of the architecture of a smart campus and its impact on the...
Figure 14.2 Conceptual framework of behavioral activation in an AI-based chatb...
Figure 14.3 System model (DM, Y-TH, & HD, 2021).
Figure 14.4 Comparison of security in both systems.
Chapter 15
Figure 15.1 Proposed model of HD prediction.
Figure 15.2 Comparison accuracy of three models.
Figure 15.3 Confusion matrix, classification report, and ROC curve.
Chapter 16
Figure 16.1 Dialogue systems.
Figure 16.2 Relation between AI, linguistics, ML, DL, NLP, NLU, and NLG.
Figure 16.3 Components of conversational AI.
Figure 16.4 HLD of intent classification in Rasa.
Figure 16.5 HLD of intent and entity identification.
Figure 16.6 HLD of Rasa architecture.
Figure 16.7 HLD of RLHF.
Chapter 17
Figure 17.1 WHO statistics of counterfeit drug selling based on categories.
Figure 17.2 Workflow diagram of proposed system for pharmaceutical drug classi...
Figure 17.3 Input back-strip image before preprocessing.
Figure 17.4 Input back-strip image after preprocessing.
Figure 17.5 NER mechanism to identify drug names.
Figure 17.6 Hashing database search mechanism.
Figure 17.7 User interface of an application.
Chapter 18
Figure 18.1 Functionality of a chatbot system.
Figure 18.2 Chatbot security specification.
Chapter 19
Figure 19.1 Accunetix scanner.
Figure 19.2 OWASP scanner.
Figure 19.3 Burpsuite vulnerability scanner.
Figure 19.4 Vulnerabilities in chatbot.
Chapter 20
Figure 20.1 Chatbot-based next generation intrusion detection system.
Figure 20.2 NSL KDD dataset distribution.
Figure 20.3 Accuracy of classifiers for chatbot IDS.
Figure 20.4 Sensitivity of classifiers for chatbot IDS.
Figure 20.5 Specificity of classifiers for chatbot IDS.
Figure 20.6 Precision of classifiers for chatbot IDS.
Figure 20.7 Recall of classifiers for chatbot IDS.
Chapter 21
Figure 21.1 Convolutional neural network.
Figure 21.2 Accuracy of classifiers for object recognition using a chatbot.
Figure 21.3 Sensitivity of classifiers for object recognition using a chatbot.
Figure 21.4 Specificity of classifiers for object recognition using a chatbot.
Figure 21.5 Precision of classifiers for object recognition using a chatbot.
Figure 21.6 Recall of classifiers for object recognition using a chatbot.
Chapter 22
Figure 22.1 Automatic speech recognition using feature selection and machine l...
Figure 22.2 Comparison of machine learning algorithm for automatic speech reco...
Chapter 23
Figure 23.1 Proposed application scenario.
Figure 23.2 Internal modules of the single TRAM-RSU framework.
Figure 23.3 Network flow sub-system.
Figure 23.4 CBM transmission for connection request.
Figure 23.5 Network connectivity level analysis.
Figure 23.6 Network load analysis.
Figure 23.7 Average server utilization.
Figure 23.8 Average processing time analysis.
Chapter 24
Figure 24.1 Methodology phases.
Figure 24.2 Types of evaluation metrics.
Figure 24.3 Comparison of the platforms used for implementing conversational A...
Figure 24.4 Conduct of a research activity.
Chapter 25
Figure 25.1 Timeline of digital education transformation.
Figure 25.2 Types of conversational AI in education.
Figure 25.3 Activity composition of teachers’ working hours.
Figure 25.4 Adoption of AI-based systems in Education [2].
Figure 25.5 Percentage of various platforms of CAI used in education domains.
Figure 25.6 Role of conversational AI in education.
Figure 25.7 Benefits of conversational AI.
Chapter 27
Figure 27.1 Pattern recognition.
Figure 27.2 Pattern recognition processing.
Figure 27.3 Applications of pattern recognition.
Chapter 29
Figure 29.1 Vulnerabilities discovered, ranked according to their degree of se...
Figure 29.2 Mobile application security framework.
Figure 29.3 Risk level in mobile applications.
Chapter 30
Figure 30.1 IoT architecture.
Chapter 31
Figure 31.1 Natural language question flow.
Figure 31.2 Natural language processing paradigm.
Figure 31.3 Chatbot processing paradigm.
Chapter 33
Figure 33.1 Source: 2021–22 Trend Report on Financial Inclusion; Bankers Insti...
Figure 33.2 Technology acceptance model (TAM).
Figure 33.3 Aadhaar E-KYC API Specification-Version 2.0; source—UIDAI-May 2016...
Chapter 35
Figure 35.1 Working of Chatbot.
Figure 35.2 Cloud computing architecture.
Figure 35.3 Cloud security report by BitGlass Agency.
Chapter 36
Figure 36.1 There is a variety of functions that you can use in a chatbot.
Figure 36.2 A rule-based chatbot working by a set of predefined rules.
Chapter 37
Figure 37.1 The taxonomy for machine learning adoption in blockchain-based sma...
Chapter 38
Figure 38.1 Applications of NLP [1, 2].
Figure 38.2 NLP process in healthcare.
Figure 38.3 Applications of conversational AI in healthcare.
Figure 38.4 Architecture of NLP-data-driven architecture.
Figure 38.5 Integration of NLP tasks.
Chapter 39
Figure 39.1 Conversational AI-based process flow for chatbots.
Figure 39.2 Architecture of a chatbot.
Figure 39.3 Chatbot framework based on conversations.
Figure 39.4 General architecture of NLP-driven chatbots.
Figure 39.5 Working process of NLP-based chatbots.
Figure 39.6 Process of chatbot software for an automated system.
Figure 39.7 Future trends of a NLP-driven chatbot software.
Cover Page
Series Page
Title Page
Copyright Page
Preface
Table of Contents
Begin Reading
About the Editors
Index
Also of Interest
WILEY END USER LICENSE AGREEMENT
ii
iii
iv
xxiii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
17
18
19
20
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
71
72
73
74
75
76
77
78
79
80
81
82
83
85
86
87
88
89
90
91
92
93
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
699
700
701
702
703
704
705
706
707
708
709
710
711
713
714
715
716
717
718
719
720
721
722
723
724
725
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
Scrivener Publishing100 Cummings Center, Suite 541JBeverly, MA 01915-6106
Publishers at ScrivenerMartin Scrivener ([email protected])Phillip Carmical ([email protected])
Edited by
Romil RawatRajesh Kumar ChakrawartiSanjaya Kumar SarangiAnand RajavatMary Sowjanya AlamandaKotagiri Srividya
and
Krishnan Sakthidasan Sankaran
This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and ScrivenerPublishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA© 2024 Scrivener Publishing LLCFor more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant-ability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 9781394200566
Cover images: Machine Learning AI: Semisatch | Dreamstime.com, AI Chess: Maxuser2 | Dreamstime.com, AI MonitoringMachineL Ekkasit919 | Dreamstime.comCover design by Kris Hackerott
The book talks about how conversational artificial intelligence (AI) models, like chatbots, may help IT departments work more efficiently by offering solutions like self-service chatbots that let users change their passwords and do other user identification procedures. The use of chatbots, or artificial conversation systems, is growing, although not all of their security issues have been resolved. The term “conversational AI” refers to a group of technologies that allow computers and other devices to create speech-and automated messaging applications. This enables human-like interaction between humans and robots. One of the many chatbots available today with speech recognition and the ability to respond to challenging inquiries is Alexa. As demand for AI assistants rises, voice recognition technologies are becoming increasingly crucial. Hackers and other harmful software are naturally drawn to chatbot technology since it is responsible for obtaining and safeguarding sensitive information. Businesses have included conversational chatbots and automatic response software on their websites and social media platforms despite the increased threat of cyberattacks. Platforms like Facebook, WhatsApp, and WeChat frequently deploy chatbots in their customer service operations. While conversational AI will probably improve company processes, hackers may also use it to reroute their cyberattacks. AI systems already possess a plethora of knowledge about people, which helps them better grasp the kinds of arguments that each individual respond to, When coupled with extraordinary human-like conversational abilities, it is a recipe for disaster. Possible results include phishing attacks, spam calls, and fraudulent endeavours. In order to serve clients via a spoken or written interface, conversational AI integrates natural language processing with conventional software such as chatbots, voice assistants, or an interactive speech recognition system. Customers are helped by conversational chatbots, which are an intriguing development since they make the customer service sector relatively self-sufficient and react to their inquiries quickly and accurately. A well-automated chatbot may drastically reduce personnel demands, but building one takes time. The importance of voice recognition systems is increasing as AI assistants like Alexa gain popularity. Thanks to advancements in artificial intelligence, chatbots in the business sphere may now communicate with clients in a sophisticated and technical way. Contrary to popular belief, the proliferation of sensitive data in these chatbots has led to grave security problems. Threats are one-off occurrences like malware or DDOS attacks.
Srinivasa Rao Gundu1, Charanarur Panem2* and J. Vijaylaxmi3
1Department of Computer Science, Government Degree College-Sitaphalmandi, Hyderabad, Telangana, India
2School of Cyber Security and Digital Forensic, National Forensic Sciences University, Goa Campus, Goa, India
3PVKK Degree & PG College, Anantapur, Andhra Pradesh, India
Clients may benefit from cutting-edge cloud computing solutions created and offered in a cost-effective way by firms. In terms of cloud computing, the most serious problem is security, which serves as a significant disincentive to individuals from embracing the technology in the first place. Making cloud computing secure, particularly when it comes to the underlying infrastructure, is essential. The domain of cloud infrastructure security has been subjected to a number of different research programs; nonetheless, certain gaps remain unresolved, and new challenges continue to emerge. This article provides an in-depth analysis of security issues that might arise at various levels of the cloud architecture hierarchy. Specifically, it focuses on the most significant infrastructure-related challenges that might have an impact on the cloud computing business model in the near future.
This chapter also discusses the several literature-based approaches to dealing with the different security challenges at each level that are now accessible. To assist in the resolution of the challenges, a list of the obstacles that have still to be conquered is presented. It has been discovered that numerous cloud characteristics such as flexibility, elasticity, and multi-tenancy create new problems at each infrastructure level after conducting an examination of the existing challenges. According to research, a variety of security threats, including lack of availability, unauthorized usage, data loss, and privacy violations, have the greatest effect across all levels of infrastructure. Multi-tenancy, in particular, has been proven to have the largest effect on infrastructure at all levels, even the most basic. The study comes to a close with a number of suggestions for further research.
Keywords: Cloud computing, secure cloud infrastructure, application security, network security, host security, data security
Models for offering cloud computing services include the ones listed below as examples:
When it comes to providing cloud services, there are three fundamental models to consider, each of which is becoming more established and common with each passing generation. For this, there are many various approaches to consider, including software as a service, platform as a service, and infrastructure as a service (to name a few). A few of these strategies include software development, platform and infrastructure as a service, and cloud computing, among others (IaaS). In contrast to these three major models [1], an SPI model is a combination of them and may be characterized as follows:
In order to get access to programs that are hosted on service provider infrastructure, users must connect to them over the Internet. This is referred to as software as a service (also known as SaaS for short) or cloud computing, depending on who you ask. These strategies assist the customers of software offered under the SaaS business model, who are typically end users who subscribe to readily available programs. The SaaS model has also been associated with a pay and use feature that would allow the end users to access software through a web browser without having to deal with the headaches of installation, maintenance, or making a significant upfront payment [2]. Some of the popular SaaS apps include Sales force, Google Apps, and Google Docs.
User awareness is an important component of SaaS security from a security viewpoint. However, the SaaS provider must hold on to a set of security conditions in order to ensure that users adhere to the essential security protocols while using the service. Things like multi-factor authentication, complicated passwords, and password retention are examples of these requirements. An additional component that SaaS providers should have in place is the adoption of security measures to secure customers’ data and to guarantee that it is available for permitted usage at all times [3].
In computing, the phrase Platform as a Service refers to a collection of software and development tools that are stored on the servers of a service provider and are available from any location on the Internet. It provides developers with a platform on which they may construct their apps without having to worry about the underlying mechanics of the service they are relying on for support. It also makes it easier to manage the software development life cycle, from planning to maintenance, in an efficient and effective way, thanks to the PaaS architecture.
The platform also makes use of programming languages such as VC++, Python, Java, etc. to allow users to construct their own apps on top of it. Many developers and programmers now depend on Platform as a Service (PaaS) firms such as WordPress, Go Daddy, and Amazon Web Services to build their websites and host their online applications. Security, according to the PaaS paradigm, is a shared responsibility that must be handled by both developers and service providers in equal measure. Example: When developing applications, developers must follow security standards and best practices to guarantee that the applications are safe and secure. A programmer, for example, must certify that the software is free of flaws and vulnerabilities [4] before exposing it to the general public.
Aspects of this process that are equally important include the detection and correction of any security flaws that attackers may exploit in order to get access to and compromise users’ data. For developers, the dependability of PaaS technology, on the other hand, is critical in order to provide a safe and secure environment for application development. For example, several programming environments, such as C++, are well-known for having poor memory management, which enables attackers to conduct a variety of assaults against their victims, including stack overflows.
A lack of sufficient authentication in some relational database management systems (RDBMSs), such as Oracle, may also be exploited by attackers. Oracle, for example, allows users who have been granted admin permissions at the operating system level to access the database without the need for a username and password [5].
A kind of cloud computing paradigm in which a cloud computing service provider keeps the resources that are only shared with contractual customers that pay a per-use charge to the cloud computing service provider is known as Infrastructure as a Service (IaaS). In particular, one of the key benefits of the Equipment as a Service model is that it removes the need for a significant initial investment in computer infrastructure such as networking devices, computer processors and storage capacity, and servers. The technology may also be used to quickly and cost-effectively increase or reduce the amount of computer resources available to a user. In this day and age, with the proliferation of cloud delivery systems, it may be challenging to determine the boundaries of one’s security responsibilities. Security is the responsibility of both cloud service providers (CSPs) and the clients that use their services. As seen in Illustration 5, the duties of cloud computing service delivery models are outlined. Cloud computing services include infrastructure as a service (IaaS) offerings such as Amazon Web Services, Cisco Meta-cloud, Microsoft Azure, and Google Compute Engine (GCE). It is important to note that customer-facing infrastructure is critical in terms of security since it acts as the first line of defense for the system’s perimeter.
In this environment, attackers may use a variety of strategies to target the infrastructure, including denial of service (DoS) attacks and malware distribution campaigns. The majority of the time, the security of a PaaS solution is the responsibility of the service provider.
Cloud Models and Architectures: An introduction determining the kind of cloud an institution should use is the first and most important stage in cloud deployment, as this will allow for a more smooth installation process to take place. During the cloud deployment process, the second and final step is known as deployment. According to the authors, institutions who have failed to execute a deployment plan have done so as a result of selecting the incorrect kind of cloud infrastructure. In order to prevent failure, organizations must first assess their data before deciding on the kind of cloud infrastructure to use. While many consumers consider security when signing up for cloud services, many do not because they have a misconception of the efficiency of the protection given by cloud services in and of itself. When it comes to keeping their data secure, many businesses that use cloud computing depend only on the security measures employed by cloud service providers. This may provide hostile actors the ability to exploit client-side vulnerabilities in order to attack the systems of one or more tenants as a result of the situation [6].
To mention a few examples, public cloud, private cloud, community cloud, and hybrid cloud are all concepts that are being explored.
Public cloud is often referred to as an external cloud in some areas, as is the case with the Amazon Web Services (AWS) public cloud. This kind of cloud is accessible to all users or large groups of users through the Internet, with cloud service providers retaining control over the environment. Customers may access any data that are made accessible on the network using this service, which is managed by the service provider. A cost-effective and scalable means of implementing information technology solutions is made feasible via the usage of public cloud computing. Because of the Internet connection, a variety of security dangers are introduced into the system, including denial-of-service (DoS) attacks, malware, ransomware, and advanced persistent threat (APT) assaults [7, 8].
Cloud inside an organization: The private cloud, also known as the internal cloud, is a kind of cloud that is used within an organization. This category’s emphasis is focused on a single user, group, or institution at the time of writing. Although the cost of private clouds is more than the cost of public clouds, they are more secure than public clouds. The fact that a private cloud is housed behind an enterprise’s firewall allows users within the organization to access it via the company’s intranet. Privatized clouds, in contrast to public cloud computing, are less secure since less money and experience is directed on the development of services and systems, much alone the protection of data in the private cloud. Consequently, some components may become vulnerable, allowing hostile actors to conduct attacks against these vulnerable components by exploiting the weaknesses of these vulnerable components [8].
The community cloud provides assistance for a variety of communities with common interests, such as missions, rules, security needs, and regulatory compliance difficulties, among other things. Depending on the circumstances, institutions or a third party may be in charge of managing it on-site or off-site. When compared to the standard cloud, the community cloud offers stronger privacy, security, and policy compliance protections. The degree of security in a community cloud environment is determined by the quantity of security awareness present in the community, as well as the importance of security to the activities of the community as a whole. The cloud storage of sensitive data from a government agency may endanger national security if the material is made available to the public, as has happened in the past. It follows as a result that security measures should be included in cloud computing environments [9].
Hybrid Cloud: Due to the diverse variety of needs that an institution has, this kind of cloud deployment is required. It combines two or more models in order to deliver cloudbased computing services (public, private, or community). Enterprises may use private clouds to store sensitive data or apps in a secure environment while hosting non-sensitive data or applications in a public cloud environment. Because of the federation of clouds with a diverse set of incompatible security measures, cloud hybridization, on the other hand, generates a host of security challenges. A consequence of this is that attackers uncover vulnerabilities in one or more clouds with the intent of getting access to the whole infrastructure.
In this research, the results were gathered through a review of the available literature. How to Plan and Organize the Review Process: The following are the three sub-phases of this phase: acquiring the research goals, establishing the research questions, and choosing the search technique to be employed in the study are all included in this phase.
The Investigation’s Goals and Objectives
The following are the key aims of the research:
The goal of this project is to provide a new taxonomy for safe cloud architecture based on the current state-of-the-art literature.
To provide an in-depth review of a wide range of issues and solutions that are used in cloud infrastructure at various degrees of complexity.
To draw attention to the disadvantages and dangers of the presently available solutions with respect to the research challenges and upcoming possibilities.
Take a look at the following questions:
Accordingly, the research explores if it is possible to answer two critical issues, which are listed below, in order to fulfill the goals.
Answer Question 1: What are some of the most well-known challenges in cloud computing architecture, as well as the proposed remedies at different levels of abstraction?
In your opinion, what is the security dangers associated with cloud that might prevent it from being more extensively used?
Various Methods of Obtaining Information
Academia’s digital resources, such as the ACM Digital Library, Arxiv, and a few more relevant international conferences, were employed to pull related works for this research from a variety of academic digital resources. It was also possible to find relevant worldwide conferences via Springer, IEEE Explore, Science Direct, ACM Digital Library, Arxiv, and a few more relevant international conferences through other sources.
It is believed that they are adequate for covering the most recent and credible literature on cloud infrastructure challenges as well current security solutions, according to the study’s authors who conducted the research. In the period between 2011 and 2020, an extensive study of the literature was conducted. For the purpose of obtaining reliable search results, this research searched large libraries using a combination of various search phrases that were generated using a reduplicate technique in order to increase the number of relevant studies found in the results (optimal results). The terms “Application Security” and “Network Security” were also among the most frequently used. These keywords were used to split the study into various categories, which allowed researchers to connect the relevant studies with the proper cloud infrastructure tiers, which comprised application, network, and host tiers as well as data and data infrastructure tiers, among others. In order to accomplish this approach, it is required to collect keywords and topics from the abstracts of the studies that emphasize the contributions of the study [10] that are relevant to the research.
Over the course of the previous decade, a number of survey studies have been published in which the security risks connected with the cloud computing environment have been explored. When it comes to cloud security, the great majority of the information that has been evaluated has made a substantial contribution to the management of these problems. One such study looked at the most often found cloud security flaws and discovered a number of them. They also offered a number of additional solutions to security challenges that arise in cloud architecture, each of which was meant to be sensitive to the personal data of individual users. Data transfer through the cloud is subject to considerable security risks, according to a research done. Participants in this survey were provided practical advice on how to deal with potential dangers over the course of the survey. The results of a study included a taxonomy and survey of cloud services, which were organized by cloud infrastructure providers and revenue.
A service taxonomy was created, which encompasses themes such as computers, networking, databases, storage, analytics, and machine learning, among other things, as well as additional topics. Regarding functionality, the computing, networking, and storage services provided by all cloud suppliers are of a high quality, and they are commonly recognized as the backbone of the cloud computing architecture.
According to a survey, cloud computing firms face a number of security issues. The cloud client, the cloud service provider, and the owner of the data stored in the cloud were all involved in this process. An investigation of various communication and storage options in the crypto cloud was also conducted as part of the project. Researchers conducting studies into the causes and consequences of different cyberattacks have access to the most up-to-date information.
Many data protection issues that may develop in a multi-tenant cloud computing system were examined and solutions were provided in a study published by the researchers. While this poll focused more on data privacy than security, the prior survey was concerned with both concerns at once.
A research gave a full definition of cloud computing, as well as the many different levels of cloud architecture that can be found in the cloud computing environment. Part of the research included a comparison of three service models (including SaaS, PaaS, and IaaS), as well as three deployment methodologies, as part of the overall research design (private, public, and community). It was determined that both private and public clouds have information security needs; thus, the writers looked into it. A few of the most urgent difficulties and restrictions related with cloud computing in terms of security were also covered during this session.
According to a study published in the journal, one of the many different types of vulnerabilities that often occur in cloud computing systems is the inability to recognize the flaws. To this research, the author’s contribution consisted in the categorization of different sorts of threats in accordance with the accessibility of cloud-based service resources. It was necessary to create this category in response to the extensive description and extent of the multiple dangers that were faced.
There are several concerns about the security of cloud computing infrastructure. Four critical levels of consideration should be taken into account while designing and executing cloud infrastructure security: the data level, the application level, the network level, and the host level (or the host itself) (or the physical location of the cloud infrastructure).
First and foremost, security refers to the protection of programs when they are using hardware and software resources in order to prevent others from gaining control of them. Among the most serious dangers at this level are distributed denial of service (DDoS) assaults on software programs, which are becoming more common.
Second, network-level security is concerned with network protection via the use of a virtual firewall, the creation of a demilitarized zone (DMZ), and data in transit protection procedures. Information about various kinds of firewalls should be monitored, collated, and preserved for future reference in order to achieve this goal.
Third, the degree of security refers to the protection that is offered for the host itself rather than for the virtual machine when a virtual server, hypervisor, or virtual machine is used in conjunction with another virtual machine. Obtaining information from system log files is required for the purpose of knowing when and where applications have been recorded in order to make these determinations. When it comes to defending cloud infrastructure, it is critical to look at the primary CIA components at each level of the organizational hierarchy. As cloud-based systems gain in popularity, the security dangers connected with their use are becoming better recognized. However, despite its many benefits, cloud computing is susceptible to a broad variety of security risks and assaults. The cloud computing infrastructure is always under assault, and attackers are constantly on the search for security flaws. The parts that follow discuss security issues that might arise at various levels of cloud architecture, as well as how to solve them.
Fourth is data-level difficulties: At this level of complexity, issues such as data breaches, data loss, data segregation, virtualization, confidentiality, integrity, and availability may all be discovered.
In terms of application-specific options, there are a plethora of options accessible.
The authors have presented an ECC-based multi-server authentication approach that is specific to the MCC context and does not need any pairing on the part of the users. While saving time and money, this method also maintains the benefits of more expensive pairing systems, such as safe mutual authentication, anonymity, and scalability, without necessitating the use of extra resources. This is shown theoretically by the formal security model, which illustrates the robustness of the method in practice.
The Open Stack platform was used as a reference by the authors in order to develop a number of models for information and resource sharing among tenants in an IaaS cloud environment, which were then evaluated. A tenant is encouraged to interact with the IT resources of other tenants in a regulated manner by using the models provided. Network access to virtual machines (VMs) must be regulated, however, in order to prevent malicious software from moving data in an uncontrolled way from the virtual machine.
According to the results, unique access control architecture for cloud computing that addresses cloud security and privacy challenges has been created. In order to construct the suggested system, the notion of dynamic trustworthiness served as its foundation. An access control system based on dynamic trustworthiness is used to, among other things, minimize the probability of undesirable behavior and ensure that only authorized users have access to cloud resources. The results reveal that the system recognizes potentially dangerous actions in order to prevent unlawful access, which would improve cloud computing security and, as a consequence, raise user confidence in the system, according to the researchers.
A hybrid access control framework, called iHAC, was presented by the authors, which allows type enforcement and role-based access control to be utilized in combination with other access control techniques. As a result, the architecture recommended is universally applicable to IaaS cloud systems and allows for the implementation of extremely flexible access control settings. An access control mechanism based on the Virtual Machine Manager (VMM) was also created, which allows the VM’s actions to be confined to the underlying resources at a finer level of detail. It has been shown in these researches that the implementation of the iHAC framework aids in the selection of real-world access control choices while imposing an acceptable performance cost on the system under examination.
In another research, it was shown that dynamic access control may be utilized to handle the many security threats that can arise in a cloud setting. Through the use of this technique, it is feasible to safeguard cloud data by taking into consideration the interrelationship between the requestor, the data that are being sought, and the action that will be taken on those data. The demands of the user were taken into account as well while offering dynamic access control. A first attempt at putting the anticipated method into action was all that was achieved as a consequence of the ultimate outcome.
Network-level solutions such as SNORT, an intrusion detection system for cloud computing, were offered by the authors under the Network-Level Solutions section as a network-level solution to prevent DoS and DDoS assaults. Such an attack floods the server with unnecessary packets, rendering it unusable for genuine users.
In order to recognize and prevent DDoS assaults, the suggested system takes use of certain criteria that have been set in advance of implementation. The authors outlined a strategy along the same lines, and they showed a mechanism for recognizing and filtering diverse DDoS assaults in cloud-based systems. When constructing this strategy, it is vital to use both the GARCH model and an artificial neural network to get the best results (ANN). When the actual value of variances is compared to a specified value of variances, Garch is used to calculate the value of variances and find any probable anomalies in real-world traffic. After values that are less than a certain threshold are eliminated, the ANN is used to categorize traffic into two categories: normal traffic and anomalous traffic. Normal traffic is defined as traffic that is less than a certain threshold.
Following the publication of a new article, users may randomly encrypt and push data blocks in a peer-to-peer network based on Blockchain by using a technique detailed in the study. In certain circumstances, the existence of several data centers and users in a distributed cloud might complicate the placement of file block copies, which can lead to performance issues. As a result, it seems that the Blockchain technique is the most favorable in terms of file security and network transmission time, respectively.