Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Jun 24:15:103461.
doi: 10.1016/j.mex.2025.103461. eCollection 2025 Dec.

Achieving cloud resource optimization with trust-based access control: A novel ML strategy for enhanced performance

Affiliations

Achieving cloud resource optimization with trust-based access control: A novel ML strategy for enhanced performance

Bala Subramanian C et al. MethodsX. .

Abstract

Cloud computing continues to rise, increasing the demand for more intelligent, rapid, and secure resource management. This paper presents AdaPCA-a novel method that integrates the adaptive capabilities of AdaBoost with the dimensionality-reduction efficacy of PCA. What is the objective? Enhance trust-based access control and resource allocation decisions while maintaining a minimal computational burden. High-dimensional trust data frequently hampers systems; however, AdaPCA mitigates this issue by identifying essential aspects and enhancing learning efficacy concurrently. To evaluate its performance, we conducted a series of simulations comparing it with established methods such as Decision Trees, Random Forests, and Gradient Boosting. We assessed execution time, resource use, latency, and trust accuracy. Results show that AdaPCA achieved a trust score prediction accuracy of 99.8 %, a resource utilization efficiency of 95 %, and reduced allocation time to 140 ms, outperforming the benchmark models across all evaluated parameters. AdaPCA had superior performance overall-expedited decision-making, optimized resource utilization, reduced latency, and the highest accuracy in trust evaluation among the evaluated models. AdaPCA is not merely another model; it represents a significant advancement towards more intelligent and safe cloud systems designed for the future.•Introduces AdaPCA, a novel hybrid approach that integrates AdaBoost with PCA to optimize cloud resource allocation and improve trust-based access control.•Outperforms conventional techniques such as Decision Tree, Random Forest, and Gradient Boosting by attaining superior trust accuracy, expedited execution, enhanced resource utilization, and reduced latency.•Presents an intelligent, scalable, and adaptable architecture for secure and efficient management of cloud resources, substantiated by extensive simulation experiments.

Keywords: AdaBoost; AdaBoost with Principal Component Analysis; Cloud computing; Dimensionality reduction; Machine learning; Principal Component Analysis; Resource optimization; Trust assessment; Trust-based access control.

PubMed Disclaimer

Conflict of interest statement

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Figures

Image, graphical abstract
Graphical abstract
Fig 1:
Fig. 1
AdaPCA framework.
Fig 2:
Fig. 2
Trust Score Prediction Accuracy.
Fig 3:
Fig. 3
Resource Utilization Efficiency.
Fig 4:
Fig. 4
Resource Allocation Time.
Fig 5:
Fig. 5
Execution Time.
Fig 6:
Fig. 6
Performance Metrics Comparison.
Fig 7:
Fig. 7
Confusion Matrix.

References

    1. Alhomdy S., Thabit F., Abdulrazzak F.H., Haldorai A., Jagtap S. The role of cloud computing technology: a savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications. Int. J. Intell. Networks. 2021;2:166–174. doi: 10.1016/J.IJIN.2021.08.001. - DOI
    1. Nair M.M., Tyagi A.K. AI, IoT, blockchain, and cloud computing: the necessity of the future. Distrib. Comput. Blockchain Archit. Technol. Appl. 2023:189–206. doi: 10.1016/B978-0-323-96146-2.00001-2. - DOI
    1. Wang M., Zhang Q. Optimized data storage algorithm of IoT based on cloud computing in distributed system. Comput. Commun. 2020;157:124–131. doi: 10.1016/J.COMCOM.2020.04.023. - DOI
    1. Shukla D.K.R., Dwivedi V.K.R., Trivedi M.C. Encryption algorithm in cloud computing. Mater. Today Proc. 2021;37:1869–1875. doi: 10.1016/J.MATPR.2020.07.452. - DOI
    1. Alshammari S.T., Albeshri A., Alsubhi K. Building a trust model system to avoid cloud services reputation attacks. Egypt. Informatics J. 2021;22:493–503. doi: 10.1016/J.EIJ.2021.04.001. - DOI

LinkOut - more resources