1 Affiliation : Gwinnett Technical College (GTC), Lawrenceville , GA, 30043, USA
Email : Mnasir@gwinnetttech.edu
2 Affiliation : Libyan Iron and Steel Company (LISCO), Misrata, Libya
Email : firstname.lastname@example.org
Cloud computing has become a popular paradigm for delivering computing resources and services over the internet. However, the adoption of cloud computing also brings new security challenges and risks, including data breaches, insider attacks, and unauthorized access. Therefore, it is critical to have a comprehensive information security management framework to address these challenges and ensure the security and privacy of cloud computing environments. This paper proposes a machine learning (ML) based information security management (ISM) framework for cloud computing environments that integrates best practices and standards from various domains, including cloud computing, information security, and risk management. The proposed framework includes residual recurrent network to effectively discriminate different patterns of cloud security attacks. The proposed framework emphasizes the importance of threat detection, security controls, and continuous monitoring and improvement. The framework is designed to be flexible and scalable, allowing organizations to tailor it to their specific needs and requirements.
Information Security; Information Management; Cloud Computing; Machine Learning
 Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A comprehensive survey on security in cloud computing. Procedia Computer Science, 110, 465-472.
 Mahboob, T., Zahid, M., & Ahmad, G. (2016, August). Adopting information security techniques for cloud computing—a survey. In 2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (pp. 7-11). IEEE.
 Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology, 58, 44-57.
 Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
 Song, H. H. (2020). Testing and evaluation system for cloud computing information security products. Procedia Computer Science, 166, 84-87.
 Chenthara, S., Ahmed, K., Wang, H., & Whittaker, F. (2019). Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE access, 7, 74361-74382.
 Tariq, M. I. (2019). Agent based information security framework for hybrid cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(1), 406-434.
 Ding, L., Wang, Z., Wang, X., & Wu, D. (2020). Security information transmission algorithms for IoT based on cloud computing. Computer Communications, 155, 32-39.
 Sun, X. (2018, May). Critical security issues in cloud computing: a survey. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High
Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 216-221). IEEE.
 Hussein, N. H., & Khalid, A. (2016). A survey of cloud computing security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), 52.
 Alsharif, M., & Rawat, D. B. (2021). Study of machine learning for cloud assisted iot security as a service. Sensors, 21(4), 1034.
 Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
 Alhenaki, L., Alwatban, A., Alamri, B., & Alarifi, N. (2019, May). A survey on the security of cloud computing. In 2019 2nd international conference on computer applications & information security (ICCAIS) (pp. 1-7). IEEE.
 Puthal, D., Sahoo, B. P., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In 2015 International Conference on Computational Intelligence and Networks (pp. 116-123). IEEE.
 Jakimoski, K. (2016). Security techniques for data protection in cloud computing. International Journal of Grid and Distributed Computing, 9(1), 49-56.
 Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
 Singh, A., & Malhotra, M. (2015). Security concerns at various levels of cloud computing paradigm: A review. International journal of computer networks and applications, 2(2), 41-45.
 Aljumah, A., & Ahanger, T. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET Communications, 14(7), 1185-1191.
 Tsaregorodtsev, A. V., Kravets, O. J., Choporov, O. N., & Zelenina, A. N. (2018). INFORMATION SECURITY RISK ESTIMATION FOR CLOUD INFRASTRUCTURE. International Journal on Information Technologies & Security, 10(4).
 Markandey, A., Dhamdhere, P., & Gajmal, Y. (2018, September). Data access security in cloud computing: A review. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 633-636). IEEE.
 Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2015, November). An investigation on cyber security threats and security models. In 2015 IEEE 2nd international conference on cyber security and cloud computing (pp. 307-311). IEEE.
 Zaslavskaya, O. Y., Zaslavskiy, A. A., Bolnokin, V. E., & Kravets, O. J. (2018). Features of Ensuring Information Security when Using Cloud Technologies in Educational Institutions. International Journal on Information Technologies & Security, 10(3).
 Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.
 Vacca, J. R. (Ed.). (2016). Cloud computing security: foundations and challenges. CRC press.
 Jouini, M., & Rabai, L. B. A. (2016). Comparative study of information security risk assessment models for cloud computing systems. Procedia Computer Science, 83, 1084-1089.
 Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces, 38, 72-77.
 Amin, Z., Singh, H., & Sethi, N. (2015). Review on fault tolerance techniques in cloud computing. International Journal of Computer Applications, 116(18), 11-17.
 Abdullah Ali Salamai, Evaluation and Selection of Cloud Service: A neutrosophic model, Neutrosophic and Information Fusion, Vol. 1 , No. 2 , (2023) : 16-25 (Doi : https://doi.org/10.54216/NIF.010202)
 Rahman, A. U., Khan, F. G., & Jadoon, W. (2016). Energy efficiency techniques in cloud computing. International Journal of Computer Science and Information Security (IJCSIS), 14(6).
|MLA||Manal M. Nasir ,Salim M. Hebrisha. "Information Security Management Framework for Cloud Computing Environments." Journal of Cybersecurity and Information Management, Vol. 11, No. 1, 2023 ,PP. 22-29.|
|APA||Manal M. Nasir ,Salim M. Hebrisha. (2023). Information Security Management Framework for Cloud Computing Environments. Journal of Cybersecurity and Information Management, 11 ( 1 ), 22-29.|
|Chicago||Manal M. Nasir ,Salim M. Hebrisha. "Information Security Management Framework for Cloud Computing Environments." Journal of Cybersecurity and Information Management, 11 no. 1 (2023): 22-29.|
|Harvard||Manal M. Nasir ,Salim M. Hebrisha. (2023). Information Security Management Framework for Cloud Computing Environments. Journal of Cybersecurity and Information Management, 11 ( 1 ), 22-29.|
|Vancouver||Manal M. Nasir ,Salim M. Hebrisha. Information Security Management Framework for Cloud Computing Environments. Journal of Cybersecurity and Information Management, (2023); 11 ( 1 ): 22-29.|
|IEEE||Manal M. Nasir,Salim M. Hebrisha, Information Security Management Framework for Cloud Computing Environments, Journal of Cybersecurity and Information Management, Vol. 11 , No. 1 , (2023) : 22-29 (Doi : https://doi.org/10.54216/JCIM.110102)|