A Deep Learning-Driven Framework for Detecting Anomalous Data Breaches in Distributed Cloud Storage Infrastructures

Authors

  • Srinivas Potluri Director EGS Global Services. Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V5I3P109

Keywords:

Distributed Cloud Storage, Anomaly Detection, Data Breach, Deep Learning, CNN, LSTM, Autoencoder, Cybersecurity, Real-Time Monitoring

Abstract

The emergence of cloud storage systems and infrastructures has necessitated some new issues associated with data integrity, security and privacy management. The distributed cloud settings, being resilient and scalable, are especially prone to various types of cyberattacks, including anomalous data loss. Intuitive intelligence in providing real-time security detectors plays a pivotal role since traditional security mechanisms do not meet this aspect in most cases because of the dynamic and decentralized aspects of such infrastructures. This paper suggests a sound deep learning based system to identify an unusual data breach efficiently in the distributed cloud storage facilities. Our framework uses a hybrid of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and Autoencoders in order to analyze huge volumes of log data and metadata, which is produced by the cloud systems. We provide an overview of the whole detection system architecture, with pre-processing pipelines, anomaly scoring modules, and real-time alerting modules. A large-scale experiment was done on publicly available datasets and our own generated datasets, which represent cloud data breach scenarios. The proposed model achieved a detection accuracy of 98.7% and a false positive rate of 1.2%, outperforming the current state-of-the-art methods. Moreover, the structure is scalable, flexible and capable of being combined with diverse cloud service providers. This paper describes the proposed system in terms of its theoretical basis, implementation methods, and empirical assessment

References

[1] Debar, H., Dacier, M., & Wespi, A. (2000). A revised taxonomy for intrusion-detection systems. Annals of Telecommunications, 55(7-8), 361-378.

[2] Sun, P., Liu, P., Li, Q., Liu, C., Lu, X., Hao, R., & Chen, J. (2020). DL‐IDS: Extracting Features Using CNN‐LSTM Hybrid Network for Intrusion Detection System. Security and communication networks, 2020(1), 8890306.

[3] Maklachkova, V. V., Dokuchaev, V. A., & Statev, V. Y. (2020, October). Risk identification in the exploitation of a geographically distributed cloud infrastructure for storing personal data. In 2020 International Conference on Engineering Management of Communication and Technology (EMCTECH) (pp. 1-6). IEEE.

[4] Barona, R., & Anita, E. M. (2017, April). A survey on data breach challenges in cloud computing security: Issues and threats. In 2017, International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-8). IEEE.

[5] Kovalenko, E. (2020). Advancements in Cloud-Based Infrastructure for Scalable Data Storage: Challenges and Future Directions in Distributed Systems. International Journal of AI, Big Data, Computational and Management Studies, 1(1), 12-20.

[6] Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.

[7] Caballero-Anthony, M. (2016). Non-traditional security concept, issues, and implications on security governance. Georgetown Journal of Asian Affairs.

[8] Nassif, A. B., Talib, M. A., Nasir, Q., Albadani, H., & Dakalbab, F. M. (2021). Machine learning for cloud security: a systematic review. IEEE Access, 9, 20717-20735.

[9] Bhamare, D., Salman, T., Samaka, M., Erbad, A., & Jain, R. (2016, December). Feasibility of supervised machine learning for cloud security. In 2016 International Conference on Information Science and Security (ICISS) (pp. 1-5). IEEE.

[10] Subramanian, E. K., & Tamilselvan, L. (2019). A focus on future cloud: machine learning-based cloud security. Service Oriented Computing and Applications, 13(3), 237-249.

[11] Butt, U. A., Mehmood, M., Shah, S. B. H., Amin, R., Shaukat, M. W., Raza, S. M., ... & Piran, M. J. (2020). A review of machine learning algorithms for cloud computing security. Electronics, 9(9), 1379.

[12] Qayyum, A., Ijaz, A., Usama, M., Iqbal, W., Qadir, J., Elkhatib, Y., & Al-Fuqaha, A. (2020). Securing machine learning in the cloud: A systematic review of cloud machine learning security. Frontiers in Big Data, 3, 587139.

[13] Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., & Robles-Kelly, A. (2019, December). Deep learning-based intrusion detection for IoT networks. In 2019 IEEE 24th Pacific Rim International Symposium on dependable computing (PRDC) (pp. 256-25609). IEEE.

[14] Marwan, M., Kartit, A., & Ouahmane, H. (2018). Security enhancement in healthcare cloud using machine learning. Procedia Computer Science, 127, 388-397.

[15] Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., & Gan, D. (2017). Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access, 6, 3491-3508.

[16] Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A. Y., & Ranjan, R. (2019). A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Transactions on Network and Service Management, 16(3), 924-935.

[17] Meryem, A., & Ouahidi, B. E. (2020). A hybrid intrusion detection system using machine learning. Network Security, 2020(5), 8-19.

[18] Zekrifa, D. M. S. (2014). Hybrid Intrusion Detection System. Theses, School of Information Technology & Mathematical Sciences.

[19] Sun, Y., Wang, X., & Tang, X. (2013). Hybrid deep learning for face verification. In Proceedings of the IEEE International Conference on Computer Vision (pp. 1489-1496).

[20] Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors, 19(9), 1977.

Published

2024-10-30

Issue

Section

Articles

How to Cite

1.
Potluri S. A Deep Learning-Driven Framework for Detecting Anomalous Data Breaches in Distributed Cloud Storage Infrastructures. IJAIDSML [Internet]. 2024 Oct. 30 [cited 2025 Dec. 7];5(3):80-7. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/195