With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
In the recent past, cancer is designated as the life threatening disease causing significant deaths across the globe. Countries are putting efforts for early stage cancer detection, and mortality prediction. Machine L...
详细信息
The fitness level method is a popular tool for analyzing the hitting time of elitist evolutionary algorithms. Its idea is to divide the search space into multiple fitness levels and estimate lower and upper bounds on ...
详细信息
WiFi channel state information (CSI)-based gesture recognition offers unique advantages, including cost-effectiveness and enhanced privacy protection, and has garnered significant attention in recent years. However, e...
详细信息
Cicadas, known for their distinctive acoustic signals, have been subjects of classification research for years. Recent researches elaborated the species composition as effect of climate change, further raising the nee...
详细信息
Lung function evaluation is important to many medical applications, but conducting pulmonary function tests is constrained by different conditions. This article presents a pioneer study of an integrated invertible dee...
详细信息
Emotions are essential to social interaction between interlocutors. It provides essential meaning to social interaction. It is important to recognise emotions along with verbal cues to fully understand the true meanin...
详细信息
The escalating prevalence of traffic congestion in Malang, which has worsened over time, has resulted in increased inconvenience and traffic-related issues. As a solution, we propose the development of an intelligent ...
详细信息
This study examines the significant influence of emotional states on individuals, recognizing that people are often confronted with numerous challenges and problems in their lives. Such challenges can give rise to fee...
详细信息
Biometric recognition is a process of validating and identifying people based on their distinct physiological or behavioral traits. Through this literature review, we strive to reduce the knowledge gap among the publi...
详细信息
暂无评论