2023
DOI: 10.1186/s13677-022-00387-2
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning approach to security enforcement in cloud workflow orchestration

Abstract: Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by a workflow deployed on the cloud need to be protected, and communication of such data across multiple stakeholders should also be secured. In general, security threats in cloud environments have been studied extensively. Such threats include data breaches, data loss, denial of service, service rejection, and malicious insiders generated from issues such as multi-t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 41 publications
(49 reference statements)
0
3
0
Order By: Relevance
“…The authors of Reference 25 offer a novel feature modeling technique that improves anomaly identification for a model that considers unsupervised static and dynamic properties. Furthermore, it reduces the dimensionality of the data, allowing for better characterization of workflow processes and, as a result, prediction of assaults.…”
Section: Review Of Literaturementioning
confidence: 99%
“…The authors of Reference 25 offer a novel feature modeling technique that improves anomaly identification for a model that considers unsupervised static and dynamic properties. Furthermore, it reduces the dimensionality of the data, allowing for better characterization of workflow processes and, as a result, prediction of assaults.…”
Section: Review Of Literaturementioning
confidence: 99%
“…AI and machine learning can be employed to analyze large datasets, predict workflow patterns, and optimize resource allocation [19][20]. These techniques can identify patterns of inefficiency and provide personalized recommendations.…”
Section: ⅱ Related Workmentioning
confidence: 99%
“…Cloud Security Automation and Orchestration Automation and orchestration technologies are being used to streamline security processes, such as incident response and threat remediation [192].…”
mentioning
confidence: 99%