IEEE Access (Jan 2024)

Design of an Anomaly Detection Framework for Delay and Privacy-Aware Blockchain-Based Cloud Deployments

  • A. Venkata Nagarjun,
  • Sujatha Rajkumar

DOI
https://doi.org/10.1109/ACCESS.2024.3414998
Journal volume & issue
Vol. 12
pp. 84843 – 84862

Abstract

Read online

Cloud-based deployments face increasing threats from various types of attacks, necessitating robust anomaly detection frameworks to safeguard against potential security breaches. Existing solutions, such as RSSI, GTM, and APG, though effective to a certain extent, exhibit limitations in terms of precision, accuracy, and scalability. To address these shortcomings, this paper proposes a novel anomaly detection framework that integrates multimodal feature analysis, deep learning models, and QoS-aware sidechains to enhance the prediction accuracy of cloud attacks and optimize blockchain-based cloud installations. By maximizing feature variance across different sample types and leveraging advanced deep learning techniques, the proposed approach significantly outperforms conventional methods in terms of precision, accuracy, recall, and AUC performance. Furthermore, the framework demonstrates superior efficiency in block mining delay, energy consumption, and throughput, making it highly suitable for real-time cloud attack prediction scenarios. The proposed methodology represents a significant advancement in anomaly detection and cloud security, offering a comprehensive solution for addressing challenges in blockchain-based cloud deployments. Thus, the proposed anomaly detection framework employs both Deep Learning and Blockchain technologies. Using Recurrent Neural Networks (RNN) with Convolutional Neural Networks (CNN), the system examines system logs and identifies unusual behavior patterns associated with different attacks. Using Blockchain technology, the framework ensures the transparency and integrity of system logs, and Deep Learning models provide precise and timely anomaly detection. The decision to combine Deep Learning and Blockchain technology is justified by the merits of each technique. The distributed, immutable ledger provided by blockchain technology makes it impossible to tamper with system logs and ensures the accuracy of anomaly detection. While, deep learning models, have exceptional pattern recognition abilities and can adapt to changing attack methods, resulting in high precision, accuracy, recall, and AUC metrics. Analyses of experimental data demonstrate that the proposed framework is effective. The framework achieves impressive performance metrics, such as low delays, 98.5% precision, 99.4% accuracy, 98.3% recall, and 99.2% Area Under the Curve (AUC).

Keywords