MULTI-CRITERIA OPTIMIZATION METHOD FOR CLOUD COMPUTING SECURITY BASED ON A MODIFIED NSGA-II ALGORITHM
DOI:
https://doi.org/10.28925/2663-4023.2025.30.983Keywords:
cloud computing, resource allocation, cybersecurity, game theory, cooperative games, coalition games, evolutionary optimization, NSGA-II, dynamic risk, multi-criteria optimization.Abstract
This article is devoted to the development and analysis of an extended hybrid model for cloud security that integrates evolutionary optimization, game theory, and cooperative strategies with dynamic risk considerations. The proposed CoopEvo-CloudSec method is based on a modification of the NSGA-II algorithm that takes into account four key criteria: security level, task processing time, resource cost, and coalitional benefit from joint protection. The goal of the study is to create an effective mechanism for distributing computing resources in cloud systems that would optimize performance and security under variable risks. For this purpose, a hybrid approach is used that combines theoretical attacker-defender models with evolutionary algorithms and cooperative strategies based on the Shapley value to assess the contribution of each node to the coalition of defenders. The computational experiment was conducted in the PyCharm environment using synthetic and real datasets. The experimental results demonstrate the superiority of the proposed model over the basic NSGA-II and other options. In particular, the CoopEvo-CloudSec method achieves a better balance between quality metrics, such as normalized hypervolume (1.0145), evenness of solution distribution and diversity (Diversity >1.2), with a moderate execution time (70–80 s). Comparative analysis on radar diagrams, boxplots and parallel coordinates confirms the ability of the model to generate Pareto-optimal solutions adapted to different threat scenarios, including dynamic changes in the risk indicator λ(t). Statistical tests (ANOVA and Tukey) prove the significance of the differences, with a coefficient of variation of 14.07% for stability. The method has practical importance for cloud service providers, as it facilitates the implementation of Zero Trust architectures and hybrid cryptographic schemes (e.g. AES+ECC). Overall, the study offers an innovative tool for risk management in cloud environments that meets modern cybersecurity challenges and contributes to the development of hybrid systems.
Downloads
References
Li, Y., Yao, L., Fu, Z., Wang, H., & Liang, W. (2025). Collaborative Defense System for Security Policies in Cloud-Edge Scenarios based on Virtualization. In 2025 10th Int. Conf. on Cloud Computing and Big Data Analytics (ICCCBDA) (pp. 288–292). IEEE. https://doi.org/10.1109/icccbda64898.2025.11030532
Tsyrkaniuk, D. (2025). A Model for the Distribution of Computational Tasks in Cloud Infrastructure Incorporating Performance, Cost, and Security Considerations. Cybersecur. Edu. Sci. Tech., 4(28), 619–632. https://doi.org/10.28925/2663-4023.2025.28.836
Tsyrkaniuk, D. (2025). Advanced Hybrid Model with Risk-based and Cooperative Cloud Security Strategies. Cybersecur. Edu. Sci. Tech., 1(29), 909–929. https://doi.org/10.28925/2663-4023.2025.29.970
Nekkanty, S. (2025). Enterprise Cloud Security: Implementing Defense-in-Depth Strategies in Multi-Cloud Environments. J. Inf. Syst. Eng. Manag., 10(61s), 336–344. https://doi.org/10.52783/jisem.v10i61s.13367
Oladosu, S., Ike, C., Adepoju, P., Afolabi, A., Ige, A., & Amoo, O. (2021). Advancing Cloud Networking Security Models: Conceptualizing a Unified Framework for Hybrid Cloud and On-Premise Integrations. Magna Sci. Adv. Res. Rev., 3(1), 079–090. https://doi.org/10.30574/msarr.2021.3.1.0076
Polinati, A. (2025). Hybrid Cloud Security: Balancing Performance, Cost, and Compliance in Multi-Cloud Deployments. arXiv. https://doi.org/10.48550/arxiv.2506.00426
Danang, D., Siswanto, E., & Setiawan, N. (2025). Hybrid Zero Trust Container based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment. Int. J. Comput. Tech. Sci., 2(3), 41–49. https://doi.org/10.62951/ijcts.v2i3.291
Kumar, P. (2025). Securing Data Privacy in Multi-Cloud and Hybrid Cloud Environments: Advanced Threat Modeling and Mitigation Strategies. J. Emerg. Tech. Innov. Res., 12(5). https://doi.org/10.56975/jetir.v12i5.563399
Rajesh, V., & Adapa, K. (2025). Securing Multi-Cloud Architectures: A Framework for Advanced Cybersecurity Strategies in Hybrid Environments. Int. Res. J. Modern. Eng. Tech. Sci. https://doi.org/10.56726/irjmets66791
Khan, S. (2025). Enhancing Cloud Data Security using a Hybrid Cryptographic Model: A Combination of Advanced Encryption Standard and Elliptic Curve Cryptography. J. Inf. Syst. Eng. Manag., 10(34s), 01–13. https://doi.org/10.52783/jisem.v10i34s.5770
Akbar, M., Waseem, M. M., Mehanoor, S. H., & Barmavatu, P. (2024). Blockchain-based Cyber-Security Trust Model with Multi-Risk Protection Scheme for Secure Data Transmission in Cloud Computing. Cluster Comput., 27(7), 9091–9105. https://doi.org/10.1007/s10586-024-04481-9
V A, N. (2025). Integrating Blockchain and Quantum Cryptography in Hybrid Security Models for Cloud Systems. Int. J. Res. Appl. Sci. Eng. Tech., 13(4), 4608–4615. https://doi.org/10.22214/ijraset.2025.69333
Steinert, T., Kuschewski, M., & Leis, V. (2026). Cloudspecs: Cloud Hardware Evolution Through the Looking Glass. [Preprint].
Garg, Mr. Y., & Gupta, Ms. B. (2023). Performance Analysis and Comparison of the Micro Virtual Machines Provided by the Top Cloud Vendors. Int. J. Res. Publ. Rev., 04(02), 1326–1333. https://doi.org/10.55248/gengpi.2023.4229
Sajjad, M., Arshad, A., & Khan, A. S. (2018). Performance Evaluation of Cloud Computing Resources. Int. J. Adv. Comput. Sci. Appl., 9(8). https://doi.org/10.14569/
ijacsa.2018.090824
Mason, K., Duggan, M., Barrett, E., Duggan, J., & Howley, E. (2018). Predicting Host CPU Utilization in the Cloud using Evolutionary Neural Networks. Futur. Gener. Comput. Syst., 86, 162–173. https://doi.org/10.1016/j.future.2018.03.040
Malawski, M., Gajek, A., Zima, A., Balis, B., & Figiela, K. (2020). Serverless Execution of Scientific Workflows: Experiments with Hyperflow, AWS Lambda and Google Cloud Functions. Futur. Gener. Comput. Syst., 110, 502–514. https://doi.org/10.1016/j.future.2017.10.029
Chowdhury, S. (2025). Serverless Computing: A Comparative Performance Analysis between AWS Lambda, Google Cloud Functions, and Microsoft Azure Functions. https://www.doria.fi/handle/10024/190693
Ali, M. A. B. (2023). Serverless Computing for Big Data Analytics: Performance and Cost Analysis of AWS Lambda and Google Cloud Functions. J. Data Mining, Knowl. Discov. Decis. Support Syst., 13(2), 1–11.
Baskar, R., Niranjanamurthy, M., Vinoth, N., Chitra, D., & Pushparaj, M. R. R. (2025). Enhancing Microservice Scalability with Serverless Architectures: An Analysis of AWS Lambda and Google Cloud Functions. In 2025 Int. Conf. on Emerging Technologies in Engineering Applications (ICETEA) (pp. 1–6). IEEE. https://doi.org/10.1109/icetea64585.2025.11099699
Tchernykh, A., Schwiegelsohn, U., Talbi, E. G., & Babenko, M. (2019). Towards Understanding Uncertainty in Cloud Computing with Risks of Confidentiality, Integrity, and Availability. J. Comput. Sci., 36, 100581. https://doi.org/10.1016/j.jocs.2016.11.011
Bhushan, K., & Gupta, B. B. (2017). Security Challenges in Cloud Computing: State-of-Art. Int. J. Big Data Intell., 4(2), 81–107. https://doi.org/10.1504/ijbdi.2017.083116
Iosup, A., Yigitbasi, N., & Epema, D. (2011). On the Performance Variability of Production Cloud Services. In 2011 11th IEEE/ACM Int. Symposium on Cluster, Cloud and Grid Computing (pp. 104–113). IEEE. https://doi.org/10.1109/ccgrid.2011.22
Sun, Y., Lin, F., & Xu, H. (2018). Multi-Objective Optimization of Resource Scheduling in Fog Computing using an Improved NSGA-II. Wirel. Pers. Commun., 102, 1369–1385. https://doi.org/10.1007/s11277-017-5200-5
Chołodowicz, E., & Orłowski, P. (2017). Comparison of SPEA2 and NSGA-II Applied to Automatic Inventory Control System using Hypervolume Indicator. Stud. Inf. Control, 26(1), 67–74. https://doi.org/10.24846/v26i1y201708
Ramesh, S., Kannan, S., & Baskar, S. (2012). Application of Modified NSGA-II Algorithm to Multi-Objective Reactive Power Planning. Appl. Soft Comput., 12(2), 741–753. https://doi.org/10.1016/j.asoc.2011.09.015
Faigle, U., & Kern, W. (1992). The Shapley Value for Cooperative Games under Precedence Constraints. Int. J. Game Theor., 21, 249–266.
Teymourifar, A., Rodrigues, A. M., & Ferreira, J. S. (2020). A Comparison between NSGA-II and NSGA-III to Solve Multi-Objective Sectorization Problems based on Statistical Parameter Tuning. In 2020 24th Int. Conf. on Circuits, Systems, Communications and Computers (CSCC) (pp. 64–74). IEEE. https://doi.org/10.1109/cscc49995.2020.00020
Driscoll, W. C. (1996). Robustness of the ANOVA and Tukey-Kramer Statistical Tests. Comput. Ind. Eng., 31(1–2), 265–268. https://doi.org/10.1016/0360-8352(96)00127-1
Saxena, D., Gupta, I., Kumar, J., Singh, A. K., & Wen, X. (2021). A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center. IEEE Syst. J., 16(2), 3163–3174. https://doi.org/10.1109/jsyst.2021.3092521
Han, J., Zang, W., Liu, L., Chen, S., & Yu, M. (2018). Risk-Aware Multi-Objective Optimized Virtual Machine Placement in the Cloud. J. Comput. Secur., 26(5), 707–730. https://doi.org/10.3233/jcs-171104
Wilczyński, A., & Jakóbik, A. (2017). Using Polymatrix Extensive Stackelberg Games in Security-Aware Resource Allocation and Task Scheduling in Computational Clouds. J. Telecommun. Inf. Technol., 1, 71–80. https://doi.org/10.26636/jtit.2017.1.653
Ait Temghart, A., Marwan, M., & Baslam, M. (2023). Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing. Secur. Commun. Netw., 2023(1), 1–13. https://doi.org/10.1155/2023/2811038
Xu, X., & Yu, H. (2014). A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing. Math. Probl. Eng., 2014(1), 915878. https://doi.org/10.1155/2014/915878
Mangalagowri, R., & Venkataraman, R. (2023). Randomized MILP framework for Securing Virtual Machines from Malware Attacks. Intell. Autom. Soft Comput., 35(2), 1565–1580. https://doi.org/10.32604/iasc.2023.026360
Gill, S. S., & Buyya, R. (2018). SECURE: Self-Protection Approach in Cloud Resource Management. IEEE Cloud Comput., 5(1), 60–72. https://doi.org/10.1109/mcc.2018.011791715
Petrovska, I. Y. (2023). Methods of Resource Allocation in Computer Systems when Providing Cloud Infrastructure Services. Dissertation for the Degree of Doctor of Philosophy. Kharkiv.
Petrovska, I. Y., Kuchuk, N. G., Panchenko, V. I., & Filonenko, A. M. (2019). Uniform Resource Allocation of Computer Systems with Hyperconverged Infrastructure. Control. Nav. Commun. Syst., 2(54), 119–122. https://doi.org/10.26906/SUNZ.2019.2.119
Petrovska, I. Y., Kolomiytsev O. V., & Ali, A. F. (2021). Method for Calculating the Buffer Memory Size of a Self-Healing Segment of a Telecommunication Network. Control. Nav. Commun. Syst., 2(64), 144–147. https://doi.org/10.26906/SUNZ.2021.2.144
Petrovska, I., & Kuchuk, H. (2022). Static Allocation Method in a Cloud Environment with a Service Model IAAS. Adv. Inf. Syst., 6(3), 99–105. https://doi.org/10.20998/2522-9052.2022.3.13
Petrovska, I. Yu., Kuchuk, G. A. (2022). Allocation of Computing Resources in Cloud Systems. Control. Nav. Commun. Syst., 2(68), 75–78.
Petrovska, I, Kuchuk Heorhii. (2023). Adaptive Resource Allocation Method for Data Processing and Security in Cloud Environment. Adv. Inf. Syst., 7(3), 67–73. https://doi.org/10.20998/2522-9052.2023.3.10
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Діана Цирканюк

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.