JOURNAL ARTICLE

CLOUD COMPUTING INFRASTRUCTURE DATA SECURITY: AN OPTIMIZED VIRTUALIZATION MODEL

Abstract

The study suggests using an improved and robust virtualization model to apply an intelligent-based design to data security monitoring in a cloud computing infrastructure. The primary problem with cloud computing, the concurrently concerning malicious activity, makes this technology notable. When we discuss an architecture that allows for easy, on-demand network access to a shared pool of reconfigurable computing resources—such as servers, networks, storage, apps, and services—we are referring to cloud computing. This requires little administration work or communication between the service provider and customer to quickly deploy and discharge. A virtualized approach was created in this work to improve the monitoring of data security. Adopting the Structured System Analysis and Design Methodology, dataflow diagrams, use-case diagrams, sequence diagrams, and diagrams created with the Unified Modelling Language (UML) were utilized to accomplish the desired design. Robust repositories provided five hundred (500) datasets, of which thirty percent were used for training and seventy percent were used for testing. The number of adopted technologies, the number of adopted design tools, the number of adopted algorithms, and the number of tested records were all used as parameters to analyze and assess the performance of both systems. According to the performance review, the new system performed better than the old one, achieving an accuracy rate of 1.07% as opposed to the old system's 0.48% accuracy rate. The recently created model focused specifically on financial fraud and was intended to detect fake data in cloud computing infrastructure. Because financial frauds against property involve the illegal transfer of property ownership for an individual's personal use and benefit, this study could be helpful to corporate organizations, anti-corruption agencies, and researchers who have a keen interest in the subject matter. Additionally, the new system was further optimized with the use of deep neural networks and logistic regression techniques.

Keywords:
Cloud computing Computer science Virtualization Data virtualization Cloud computing security Data security Computer security Operating system Encryption

Metrics

1
Cited By
1.53
FWCI (Field Weighted Citation Impact)
0
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cloud Computing and Resource Management
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

TRANSFORMING CLOUD COMPUTING DATA SECURITY WITH AN INNOVATIVE VIRTUALIZATION MODEL

Nseobong Archibong MichaelFriday E. OnuoduE. E. Ogheneovo

Journal:   ShodhAI Journal of Artificial Intelligence Year: 2024 Vol: 1 (1)
BOOK-CHAPTER

Virtualization Security in Cloud Computing

Muhammad KazimShao Ying Zhu

Computer communications and networks Year: 2015 Pages: 51-63
JOURNAL ARTICLE

Security Analysis of Storage, Virtualization, Infrastructure and Standardization in Cloud Computing

K. E. NarayanaK. Jayashree

Journal:   Journal of Computational and Theoretical Nanoscience Year: 2020 Vol: 17 (8)Pages: 3754-3758
BOOK-CHAPTER

A Security Model for Protecting Virtualization in Cloud Computing

Saurabh SinghPradip Kumar SharmaJong Hyuk Park

Lecture notes in electrical engineering Year: 2016 Pages: 385-388
JOURNAL ARTICLE

Virtualization-level security in cloud computing

Farzad Sabahi

Year: 2011 Pages: 250-254
© 2026 ScienceGate Book Chapters — All rights reserved.