IEEE Access (Jan 2020)

Applications and Evaluations of <italic>Bio-Inspired</italic> Approaches in Cloud Security: A Review

  • Md Manjurul Ahsan,
  • Kishor Datta Gupta,
  • Abhijit Kumar Nag,
  • Subash Poudyal,
  • Abbas Z. Kouzani,
  • M. A. Parvez Mahmud

DOI
https://doi.org/10.1109/ACCESS.2020.3027841
Journal volume & issue
Vol. 8
pp. 180799 – 180814

Abstract

Read online

Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central hardware access. Many of the challenges associated with cloud computing can be specified as network load, security intrusion, authentication, biometric identification, and information leakage. Numerous algorithms have been proposed and evaluated to solve those challenges. Among those, bio-inspired algorithms such as Evolutionary, Swarm, Immune, and Neural algorithms are the most prominent ones which are developed based on nature's ecosystems. Bio-inspired algorithms' adaptability allows many researchers and practitioners to utilize them to solve many security-related cloud computing issues. This paper aims to explore previous research, recent studies, challenges, and scope for further analysis of cloud security. Therefore, this study provides an overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges, such as Identity and Authentication, Access Control Systems, Protocol and Network Security, Trust Management, Intrusion Detection, Virtualization, and Forensic.

Keywords