COOPEVO-CLOUDSEC METHOD FOR OPTIMIZING COMPUTING RESOURCES OF CLOUD SYSTEMS TO IMPROVE SECURITY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1077

Keywords:

cloud computing, resource allocation, cybersecurity, game theory, cooperative games, coalition games, evolutionary optimization, NSGA-II, dynamic risk, multi-criteria optimization.

Abstract

The CoopEvo-CloudSec method represents an innovative cooperative evolutionary approach to optimizing the allocation of computing resources in cloud systems in order to improve the level of information security. This method integrates elements of game theory, multi-criteria optimization and dynamic risk analysis, allowing the formation of coalitions between protective components such as virtual machines, containers, firewalls and network policies. The basis is a variable risk profile λ(t), which is updated in real time based on data streams from security event management (SIEM), threat detection (EDR) and telemetry monitoring systems. This provides an adaptive response to cyber threats such as DDoS attacks, data leaks or anomalous activity, minimizing vulnerabilities without excessive resource consumption. The architecture of the method is based on the principles of modularity, interoperability, reliability and security. The central component – CoopEvo-CloudSec Engine (CEEngine) – implements NSGA-II or NSGA-III evolutionary algorithms to generate a set of Pareto-optimal solutions, taking into account the criteria: risk level, performance, latency, cost and energy consumption. The Telemetry Collector module accumulates metrics from Prometheus or OpenTelemetry, the Risk Analyzer evaluates and normalizes threats to form λ(t), the Policy Adapter adapts recommendations to orchestrators such as Kubernetes or OpenStack, and Audit & Explainability provides transparency through the capture of quality metrics (HV, IGD, Spacing). The data flow involves a continuous cycle: from SIEM event capture to policy application, with a runtime decision loop for iterative optimization, including selection, crossover, mutation and coalition correction. The discussion of the results indicates advantages in dynamic environments with high load variability, but notes limitations: sensitivity to telemetry noise (accuracy drop by 10%) and the need for computational resources. The method outperforms static planners, providing flexibility for sectors: finance (compliance), IoT (energy consumption), science (performance). Parameter configurations allow adaptation, with NSGA-III for high-dimensional problems.

Downloads

Download data is not yet available.

References

Sreeramulu, M. D. (2024). Optimizing Cloud Computing Networks in Information Security Controls using COPRAS Method. Comput. Sci. Eng. Technol., 1(2), 42–54. https://doi.org/10.46632/cset/1/2/6

Tsyrkaniuk, D. (2025). A Model for the Distribution of Computational Tasks in Cloud Infrastructure Incorporating Performance, Cost, and Security Considerations. Cybersecur. Edu. Sci. Tech., 4(28), 619–632. https://doi.org/10.28925/2663-4023.2025.28.836

Tsyrkaniuk, D. (2025). Advanced Hybrid Model with Risk-based and Cooperative Cloud Security Strategies. Cybersecur. Edu. Sci. Tech., 1(29), 909–929. https://doi.org/10.28925/2663-4023.2025.29.970

Petrovska, I., & Kuchuk, H. (2023). Adaptive Resource Allocation Method for Data Processing and Security in Cloud Environment. Adv. Inf. Syst., 7(3), 67–73. https://doi.org/10.20998/2522-9052.2023.3.10

Chen, Y.-F., Lin, F. Y.-S., Tai, K.-Y., Hsiao, C.-H., Wang, W.-H., Tsai, M.-C., & Sun, T.-L. (2025). A Near-Optimal Resource Allocation Strategy for Minimizing the Worse-Case Impact of Malicious Attacks on Cloud Networks. J. Cloud Comput., 14(1). https://doi.org/10.1186/s13677-025-00749-6

Chen, Y., Feng, E., & Ling, Z. (2024). Secure Resource Allocation Optimization in Cloud Computing Using Deep Reinforcement Learning. J. Adv. Comput. Syst., 4(11), 15–29. https://doi.org/10.69987/jacs.2024.41102

Jiao, Y. (2025). Research on Architecture Optimization and Security Design of university Cloud Service Platform. J. Comput. Method. Sci. Eng. https://doi.org/10.1177/14727978251352132

Bal, P. K., Mohapatra, S. K., Das, T. K., Srinivasan, K., & Hu, Y.-C. (2022). A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques. Sensors, 22(3), 1242. https://doi.org/10.3390/s22031242

Selvan, T., Siva Shankar, S., Sri Nandhini Kowsalya, S., Ravuri, P., Kumar Nayak, D., Gurnadha Gupta, K., & Sharath, M. N. (2024). Modernizing Cloud Computing Systems with Integrating Machine Learning for Multi-Objective Optimization in Terms of Planning and Security. MATEC Web of Conf., 392, 01155. https://doi.org/10.1051/matecconf/202439201155

Tsyrkaniuk, D., & Sokolov, V. (2024). Methodology for Investigating Information Security Incidents. Cybersecur. Edu. Sci. Tech., 2(26), 140–154. https://doi.org/10.28925/2663-4023.2024.26.675

Kristiani, E., Yang, C.-T., Huang, C.-Y., Wang, Y.-T., & Ko, P.-C. (2020). The Implementation of a Cloud-Edge Computing Architecture using OpenStack and Kubernetes for Air Quality Monitoring Application. Mob. Netw. Appl., 26(3), 1070–1092. https://doi.org/10.1007/s11036-020-01620-5

Kristiani, E., Yang, C.-T., Wang, Y.-T., & Huang, C.-Y. (2018). Implementation of an Edge Computing Architecture using Openstack and Kubernetes. In Int. Conf. on Information Science and Applications (pp. 675–685). Springer. https://doi.org/10.1007/978-981-13-1056-0_66

Downloads


Abstract views: 4

Published

2025-12-16

How to Cite

Tsyrkaniuk, D. (2025). COOPEVO-CLOUDSEC METHOD FOR OPTIMIZING COMPUTING RESOURCES OF CLOUD SYSTEMS TO IMPROVE SECURITY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 872–887. https://doi.org/10.28925/2663-4023.2025.31.1077