Rama Krishna Mani Kanta Yalla, Vijaykumar Mamidala, Akhil Raj Gaius Yallamelli, Mohanarangan Veerappermal Devarajan, Thirusubramanian Ganesan, Aceng Sambas
{"title":"Insider Attack Monitoring and Secured Data Transfer Using KPCC and BiO-ELSTM in Cloud Computing","authors":"Rama Krishna Mani Kanta Yalla, Vijaykumar Mamidala, Akhil Raj Gaius Yallamelli, Mohanarangan Veerappermal Devarajan, Thirusubramanian Ganesan, Aceng Sambas","doi":"10.1002/ett.70095","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Handling of User's data effectively in the cloud has become a crucial task. Monitoring insider attacks in the cloud and securely transferring cookie files have not been concentrated in the existing works. Insider threats pose significant risks to data security in cloud environments, particularly during data transfers between public and private/hybrid clouds. Existing methodologies often fail to adequately monitor these threats and secure data, leading to vulnerabilities such as cookie attacks and data integrity issues. This paper proposes a novel framework that integrates the Cyclic permutation-based Hirose-Streebog (CH-Streebog) algorithm for secure logins and hashcode verification, alongside the KPCC method for securing cookie files. Additionally, the WS-Fuzzy method is employed for optimal virtual machine selection, and the BiO-ELSTM classifier is utilized for effective insider threat monitoring, aiming to reduce false alarm rates. The proposed framework demonstrates impressive performance metrics, achieving a precision of 98.95%, recall of 98.02%, f-measure of 98.48%, accuracy of 98.26%, and specificity of 98.78%. These results indicate a significant improvement in insider threat detection and secure data handling in cloud environments compared to existing methods.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70095","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Handling of User's data effectively in the cloud has become a crucial task. Monitoring insider attacks in the cloud and securely transferring cookie files have not been concentrated in the existing works. Insider threats pose significant risks to data security in cloud environments, particularly during data transfers between public and private/hybrid clouds. Existing methodologies often fail to adequately monitor these threats and secure data, leading to vulnerabilities such as cookie attacks and data integrity issues. This paper proposes a novel framework that integrates the Cyclic permutation-based Hirose-Streebog (CH-Streebog) algorithm for secure logins and hashcode verification, alongside the KPCC method for securing cookie files. Additionally, the WS-Fuzzy method is employed for optimal virtual machine selection, and the BiO-ELSTM classifier is utilized for effective insider threat monitoring, aiming to reduce false alarm rates. The proposed framework demonstrates impressive performance metrics, achieving a precision of 98.95%, recall of 98.02%, f-measure of 98.48%, accuracy of 98.26%, and specificity of 98.78%. These results indicate a significant improvement in insider threat detection and secure data handling in cloud environments compared to existing methods.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications