IDEAS home Printed from https://ideas.repec.org/a/spr/ijsaem/v15y2024i12d10.1007_s13198-024-02596-1.html
   My bibliography  Save this article

Access management based on deep reinforcement learning for effective cloud storage security

Author

Listed:
  • Srinivas Byatarayanapura Venkataswamy

    (BMS Institute of Technology & Management)

  • Kavitha Sachidanand Patil

    (Atria Institute of Technology)

  • Harish kumar Narayanaswamy

    (BMS Institute of Technology & Management)

  • Kantharaju Veerabadrappa

    (BMS Institute of Technology & Management)

Abstract

Securing sensitive data in cloud storage systems is crucial with the increasing sophistication of cyber-attacks in today’s digital ecosystem. The rising need to protect cloud storage systems from illegal access, data breaches, and new cyber threats makes the research necessary. Because of the difficulty in keeping up with the ever-changing nature of security threats and user behaviour, innovative, flexible, and dynamic ways to access management have had to be developed. The ever-changing nature of modern threats and the requirement for constant monitoring and instantaneous responses provide difficulties for cloud storage security. The present research presents Deep Reinforcement Learning-Enhanced Adaptive Access Control (DRL-AAC), which makes access control decisions that are dynamic and aware of their context using modern reinforcement learning algorithms. It has been used to design and implement a Deep Reinforcement Learning (DRL-AAC) enhanced adaptive access control system for dynamically managing cloud storage. The system should be able to make access determinations in real-time, adapting to changing security threats and user habits. DRL-AAC uses user profiling to analyze and detect abnormalities and unauthorized access based on user behaviour patterns. DRL-AAC has wide-ranging potential uses, from consumer to enterprise to government cloud storage. Because of its intelligence and flexibility, it may be used to protect data in various settings. This research provides a comprehensive simulation analysis to prove the efficiency of DRL-AAC. The experimental findings demonstrate that the suggested DRL-AAC model increases the computational intensity analysis ratio of 96.2%, level of data privacy of 97.8%, adaptability ratio of 95.9%, resource allocation efficiency of 97.5% efficiency, scalability ratio of 98.8% compared to other existing models. The purpose of the research is to demonstrate the efficacy of DRL-AAC in doing its intended task of detecting and neutralizing potential security risks with as few false positives and negatives as possible. The paper aspires to verify DRL-AAC as a ground-breaking approach to bolstering cloud storage security. It can potentially improve cloud storage security by responding in real-time to new threats and user habits, protecting sensitive information on the cloud. The proposed work is evaluated by investigating its computational intensity, data privacy, adaptability, resource efficiency, and scalability.

Suggested Citation

  • Srinivas Byatarayanapura Venkataswamy & Kavitha Sachidanand Patil & Harish kumar Narayanaswamy & Kantharaju Veerabadrappa, 2024. "Access management based on deep reinforcement learning for effective cloud storage security," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 15(12), pages 5756-5775, December.
  • Handle: RePEc:spr:ijsaem:v:15:y:2024:i:12:d:10.1007_s13198-024-02596-1
    DOI: 10.1007/s13198-024-02596-1
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s13198-024-02596-1
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s13198-024-02596-1?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:15:y:2024:i:12:d:10.1007_s13198-024-02596-1. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.