Robustness of the Storage in Cloud Data Centers Based on Simple Swarm Optimization Algorithm

Storing extensive data in cloud environments affects service quality, transmission speed, and access to information in systems, which is becoming a growing challenge. In storage improvement, reducing various costs and reducing the shortest path in the storage of distributed cloud data centers are among the important issues in the field of cloud computing. In this paper, particle swarm optimization (PSO) algorithm and learning automaton (LA) are used to minimize the cost of a data center, which includes communication, data transfer, and storage and optimization of communication between data centers. To improve storage in distributed data centers, a newmodel called LAPSO is proposed by combining LA and PSO, in which LA improves particle control by searching for particle speed and position. In this method, LA moves each particle in the direction where it has the best individual and group experiences. In multipeak problems, it does not fall into local optimums. Results of the experiments are shown on the dataset of spatial information and cadastre of country lands, which includes 13 data centers. )e proposed method evaluates and improves the optimal position parameters, minimum route cost, distance, data transfer cost, storage cost, data communication cost, load balance, and access performance better than other methods.


Introduction
With the increasing growth of cloud computing and the ability to use data storage centers and computing servers in cloud computing, nowadays, many applications require infrastructure to store and process data outside the client and systems. Data storage on cloud storage centers has advantages in cloud computing, which include increased data storage and processing capacity and increased reliability since data center servers store multiple versions of data as backups. However, due to the volume of data, the optimal solution for storing this information is one of the important issues in this field [1]. In some articles in the field of storage improvement in data centers, due to the lack of a multiobjective search model, the parameters of data transfer cost, data communication, distance between data centers, location, and so on are optimized separately. is makes the relationship between the parameters in the search space to be ignored, and multiobjective models do not optimize the search models. But in this method, in addition to optimizing the search model, the relationship between the parameters is considered. Research in this field has generally discussed the issue of improving cloud storage in the distributed data center in order to minimize costs and the shortest route, since each resource has its own data center and stores the data in another data center to ensure safety and security. Strategies for finding the minimum distance between data centers and minimizing the cost of creation, storage, transfer, and communication between data centers can be very effective in optimizing data storage in distributed cloud data centers. Recent progress in various areas such as networking, information, and communication technologies has greatly boosted the potential capabilities of cloud computing. Cloud computing is a promising computing paradigm that facilitates the delivery of IT infrastructure, platforms, and applications of any kind to consumers as services over the Internet. Although cloud computing systems nowadays provide better ways to accomplish the job requests in terms of responsiveness and scalability under various workloads, scheduling the jobs or tasks in cloud environment is still complex in nature due to the dynamicity of resources and on-demand user application requirements [2]. Optimization algorithms are very popular swarm intelligence (SI) optimization algorithms in recent years and have been used in many fields such as machine learning, engineering, and environment modelling [3].
ey have the advantages of simplicity, flexibility, derivation independency, and escaping from local optimum. Metaheuristic algorithms create randomly initialized population and improve the population during iterations to search for global optimum in the search space. e typical search process of optimization algorithm can be divided into two phases: exploration and exploitation [3,4]. In the exploration phase, search agents investigate the search space as widely as possible to obtain the promising region, while in the exploitation phase, search is carried out in the local region obtained by exploration phase to find the global optimum solution. It is very important for an algorithm to strike a proper balance between exploration and exploitation in order to avoid local optimum and find global optimum solution quickly. Some of the most popular metaheuristic algorithms are genetic algorithm (GA), particle swarm optimization (PSO), artificial fish swarm algorithm (AFSA), and grey wolf optimization (GWO) [4]. Whale optimization algorithm (WOA) is a new metaheuristic optimization algorithm which was proposed by Seyedali Mirjalili and Andrew Lewis in 2016. WOA mimics the hunting behavior of humpback whales called bubble-net feeding method. Humpback whales prefer to hunt school of krill or small fishes close to the surface by creating distinctive bubbles along a circle or "9-shaped path" [4,5]. Some studies have proposed to improve the performance of basic WOA and apply it into different fields [5][6][7]. CWOA which was proposed in [8] blends WOA with chaos theory and applies CWOA to solving transient stability constrained OPF problem. e authors in [9] proposed another CWOA to improve the diversity and egocentricity of search agents and apply the proposed CWOA to optimizing the Elman neural network. LWOA was proposed in [3] to improve the performance of WOA based on Levy flight trajectory and was applied to solving infinite impulse response model identification. To improve the exploration and exploitation abilities as well as reducing the possibility of falling into local optimum of WOA, we optimize WOA in three aspects and apply the improved WOA to the multiresource allocation problem. e main contributions of this work are described as follows: (i) Introducing nonlinearly changed convergence factor to preferably adjust the exploration and exploitation processes of WOA. e linearly changed convergence factor limits the exploration and exploitation abilities of WOA, which can be improved by using nonlinearly changed convergence factor. (ii) Adding a new inertia weight factor to adjust the influence of current best search agent on the movements of other search agents. Consequently, the exploration and exploitation abilities and convergence speed of WOA are greatly improved. (iii) Conducting random variation of current best search agent during the exploitation process. In the exploitation process of WOA, all the search agents move towards the best search agent which may be a local optimum. To reduce the possibility of falling into local optimum, we conduct a certain number of variations during each iteration of the exploitation process. (iv) Testing IWOA with 29 benchmark functions and comparing it with other well-known metaheuristic algorithms. Four types of benchmark functions are employed to test the performance of algorithms from different perspectives, including exploration ability, exploitation ability, ability to escape from local minima, and convergence speed.
(v) Applying IWOA to the multiresource allocation problem to evaluate the ability of solving the engineering problem. Multiresource allocation is a general engineering problem, and various kinds of metaheuristics have been proposed to solve it. IWOA and the well-known metaheuristics are benchmarked with the system utility model to evaluate the performance of solving the multiresource problem.
In the proposed method, to improve storage in data centers, a new model called LAPSO is proposed, which combines LA and PSO. is method improves the performance of the multiobjective PSO algorithm. In the proposed model, the LA is used to regulate the behavior of the particles and, in each step, determines whether the particles continue in their current route or follow the best particles found so far. In this model, the task of establishing a balance between global search and local search is assigned to the median coefficient, which is performed by the LA. Using LA has two main advantages: first, the existing knowledge can be employed to determine the process of moderate weight changes, and second, this process can be corrected by obtaining feedback from the algorithm implementation. In the objective function, the multiobjective PSO algorithm calculates the best particles by minimizing the optimal position parameters, minimum route cost, distance, data transfer cost, storage cost, data communication cost, load balance, access, and year. e advantages of the proposed method are as follows: (i) In the PSO algorithm, due to the use of LA, each particle tries to move in the direction at which it has the best individual and group experiences. In the case of multipeak problems, it is updated and prevented from falling into local optimums. (ii) Better access to the shortest distance among the distributed data centers with minimal communication costs between data centers, data transfer, storage, and data center construction using the provided LAPSO model.
(iii) To improve storage, this new LAPSO model is presented to improve performance in the PSO multipurpose algorithm, which is the PSO objective function. It minimizes the cost of creating the data center as well as storing, transferring, and communicating between data centers. Due to its multipurpose nature, the standard PSO algorithm does not offer a solution to leave this local optimum. But the LA prevents the model from falling into the local optimum. (iv) Our proposed model aims to distribute data loading to different cloud servers without creating overhead and long delays. e rest of this paper is organized as follows. Section 2 outlines the basic WOA. Section 3 presents the improved WOA (IWOA). Experimental results and performance analysis of the proposed IWOA are provided in Section 4. Section 5 applies the proposed IWOA to solving the multiresource allocation problem. Finally, in Section 6, conclusions and possible future works are given [10].
ere are two fundamental limitations with the safe frameworks: first, the scope of companies that can be certified as a part of the program is very limited. Companies that have an interest in ineligible cloud computing include banks, telecommunication carriers, and nonprofit organizations. Second, there are extenuated conflicting legislative concerns. e scope of the safe frameworks is quite limited; this is an agreement between three jurisdictions only. Although a step in the right direction, the complicated legal environment of numerous regulating bodies and legislations still point to per-jurisdiction data centers as an attractive alternative.

Previous Works
In recent articles in the field of data storage in the cloud, various actions have been performed to reduce costs as well as increase the shortest path and distance by methods such as fuzzy, game theory, and evolutionary algorithms [11]. In the computational science, PSO is a computational method that optimizes a problem by iteratively trying to improve a candidate solution with regard to a given measure of quality. In 1995, Eberhart and Kennedy first introduced the PSO algorithm as an uncertain search method for functional optimization.
is algorithm is inspired by the mass movement of birds looking for food [1]. With the advent of cloud computing and big data, many companies are increasingly storing and retrieving their data on the cloud due to the increasing scale of data and the performance provided by cloud storage services. Data recovery duration is specifically important for cloud users. However, current data management systems have not yet been optimized to minimize this duration. Some researchers have tried to add noise to particle motions in the PSO standard algorithm, causing more varied motions to solve local optimization problems [12,13]. Some other solutions to solving local optimization problems combine the PSO algorithm with other algorithms such as GA and gradient annealing algorithm [14,15]. LA is a machine that can perform a variety of operations. Each action selected is evaluated by a potential environment; the evaluation result is given to the LA in the form of a positive or negative signal and the response is automatically used to select the next action. In this way, it tends to choose the action that receives the most rewards from the environment. In other words, the LA performs an action that receives the most rewards from the environment. LA has been used to improve the learning ability of many algorithms, including neural networks [16,17], genetic algorithms [18,19], and the mass movement of binary particles [20]. In [20], the binary PSO model was presented based on the LA. In this method, an LA is used in each particle dimension. Each of these learning automata has two operations, i.e., 0 and 1, and acts as the mastermind of the particle, controlling and directing its motion in the state space limited to 0 and 1. is model has better results than the standard binary model [21] in solving sample problems. e previous work for better observation is summarized in Table 1.

Particle Swarm Optimization Algorithm.
In the PSO algorithm, a group of particles is created randomly which tries to find the optimal solution by updating the generations. In each step, each particle is updated using the two best values. e first is the best position ever reached by a particle known as p best . e best position ever obtained by the population of particles is represented by g best . After finding the best values, the velocity and location of each particle are updated using the following equations: e right side of (1) consists of three parts: the first part is the current velocity of the particle, and the second and third parts are responsible for changing the velocity of the particle and rotating it towards the best individual experience and the best group experience. If the first part is neglected in this equation, then the velocity of the particles is determined only according to the current position, the best particle experience, and the best group experience. In this way, the best particle remains in place and the others move toward that particle. In fact, the mass movement of particles ignoring the first part of (1) is a process during which the search space gradually shrinks and local search is formed around the best Security and Communication Networks 3 particle. Conversely, if only the first part of (1) is considered, the particles take their normal path to reach the perimeter wall and perform some sort of global search. In the model introduced in 1997 by standard algorithm providers [21], the position of each particle in each dimension is determined by one of the two values, i.e., 0 or 1. In this way, the particle moves in a space limited to 0 and 1, and the particle velocity in each dimension is equal to the probability that the position of the particle is one in that dimension. e speed update is still performed according to (1). en, firstly, the velocity obtained in each dimension is transferred to the interval [1,0] using the sigmoid function; then, the new position of the particle in each dimension is calculated according to equation (3), where (rand) is a random value in the range [1,0]. Also, different block diagrams for implementing RDA are shown in Algorithm 1.

Learning Automaton Algorithm.
LA is a factor designed to be placed in a possible and uncertain environment where the machine can perform a number of finite operations. Each LA has a vector of probabilities that shows how likely each action is performed. In each operation performed by automata, the sum of the vector derivatives is equal and each of the selected operations is evaluated by a possible environment. e evaluation result is given to automata in the form of a positive or negative signal, and the automata are influenced by this response while choosing the next action. e goal for automata is to choose the best practice among all the practices. e best practice is to maximize the chances of receiving a reward from the environment [22]. Figure 1 shows the relationship between LA and the environment. e environment can be represented by E≡{α, β, c} ternary, in which a � {a1, a2, . . ., am} is the set of inputs, β � {β1, β2,. . ., βm} is the set of outputs, and C � {C1, C2,. . ., Cm} is the sum of the penalty probabilities. If β is a two-member set, the environment is of type P; in such an environment, β1 � 1 is considered as a penalty and β2 � 0 is considered as a reward. In the Q-type environment, β (n) can be a discrete value of finite values at the distance of [0.1]; in an S-type environment, β (n) is a random variable at the distance of [0.1]. Ci is the probability, by which ai action will have an adverse effect. In the static environment, Ci values remain unchanged, while in the nonstatic environment, these values change over time. LA with a variable structure can be represented by the quadratic {α, β, P, T}, where a � {a1, a2 . . ., am} is the set of automata operations, β � {β1,. . ., βm} is the set of automata inputs, P � {P1,..., Pm} is the probability vector of selecting each of the operations, and p(n Algorithm 2 shows the pseudocode for LA with a variable structure. Algorithm 2 is an example of linear learning algorithms. Suppose a i operation is selected in the n-th step. Optimal response and adverse response are defined according to equations (4) and (5), respectively, as where a is the reward parameter and b is the penalty parameter. According to the values of a and b, the following three states can be considered. When a and b are equal, we call the algorithm LRP; when b is much smaller than a, we call the algorithm LR * P; and when b is equal to zero, we call the algorithm LRI. is probability update is in such a way that the sum of the probabilities remains equal to one.

A Systematic Review on Clone Node Detection in Static
Wireless Sensor Networks. e recent state-of-the-art innovations in technology enable the development of low-cost sensor nodes with processing and communication capabilities. e unique characteristics of these low-cost sensor nodes such as limited resources in terms of processing, memory, battery, and lack of tamper resistance hardware make them susceptible to clone node or node replication attack. e deployment of WSNs in the remote and harsh environment helps the adversary to capture the legitimate node and extract the stored credential information such as  [12,13] Combined the PSO algorithm with other algorithms such as genetic algorithms and the gradient annealing algorithm Wang and Li and Afzal et al. [14,15] LA has been used to improve the learning ability of many algorithms, including neural networks Meybodi and Beigy [16,17] Genetic algorithms Munetomi et al. and Howell et al. [18,19] e mass movement of binary particles Chan and Seung [20] e standard binary model [21] in solving sample problems Kennedy and Eberhart [21] ID which can be easily reprogrammed and replicated. us, the adversary would be able to control the whole network internally and carry out the same functions as that of the legitimate nodes.

Clone Node Attack.
WSNs are primarily categorized into two types i.e., static and mobile WSNs. In static WSN, once the sensor nodes are deployed, their position remains fixed compared to mobile WSN where nodes can move (1) for each particle do (2) Initialize particle (3) end For (4) do (5) for each particle do (6) Calculate fitness value of the particle f p (7) updating particle's best fitness value so far (9) If fp is better than p_Best (10) set current value as the new p_Best (11) end for (12) Updating population's best fitness value so far (13) Set g_Best to the best fitness value of all particles (14) for each particle (15) Calculate particle velocity according to equation (1) (16) Update particle position according to equation (2 (1) Initialize p to [1/s, 1/s, . . ., 1/s]/ * s is the number of actions * / (2) while not done (3) Select an action i based on the probability vector p (4) Evaluate action and return a reinforcement signal β (5) Update probability vector using learning rule (6) end while ALGORITHM 2: Pseudocode for LA with variable structure [22].
(1) for each particle do (2) Initialize particle (3) end For (4) do (5) for each particle do (6) Calculate fitness value of the particle fp (7) Updating particle's best fitness value so far (9) If fp is better than p_Best (10) set current value as the new p_Best (11) end for (12) Updating population's best fitness value so far (13) Set g_Best to the best fitness value of all particles (14) for each particle (15) Calculate particle velocity according to equation (1) (16) Update particle position according to equation (2) (17) end for (18)  is is the main motivation of researchers to design enhanced detection protocols for clone attacks. Clone node attack is regarded as one of the most hazardous attacks on WSNs. In a clone attack, the attacker initially targets and captures a legal node, extracts the stored credentials using some specialized tools in less than one minute [21]. e attacker then creates clones using the credentials and deploys them to several important locations of the network to carry out internal attacks like denial of service (DoS), a black hole, or even wormhole attack [23]. e attacker can then perform various actions with the help of these clones or carry out more internal attacks to the network. e entire process of launching and detection of clone attacks is depicted in a flowchart shown in Figure 2.

reat Model.
In WSNs, the attacker may possibly launch active and passive attacks. In this work, we consider the existence of an active attack, in which the attacker can launch a clone node attack by compromising a subclass of nodes and producing large amount of replicas for distribution all over the network. Upon compromising a node "n," the attacker may produce a group of replicas n′ � n′1, n′2, n′3, . . .., n′r of which the IDs and secret credentials are the same as the original node n. Replicas can easily override the authenticity and integrity of existing cryptographic security mechanisms because they can sign, encrypt, and decrypt messages to execute the rule, just like original vulnerable node. Once replicas are identified as a legitimate part of the network, they can launch a variety of attacks, such as Sybil attack, selective forwarding attacks, incorrect data injection, protocol interruptions, and traffic jams.

Clone Detection Techniques in Static WSNs.
ere have been numerous techniques proposed for clone detection in static WSNs which can be categorized into centralized and distributed techniques.
(1) Centralized Clone Detection Techniques. Apart from being complex and having low overheads, these techniques mainly rely on powerful base station (BS) for information convergence and decision making, where the nodes send their position claims to the BS with the help of their neighbors. en, the BS will check the node IDs, and if one ID is found in more than one location, an alarm is set up to give alertness about the presence of a clone attack. ese techniques are capable enough to detect clone attacks. Yet, this does not mean that private information of the sensor is secured, where the attacker can do many negative things to spy on the transmitted information between the sink and sensor node. us, there may still be a threat to the network. Another problem is that the lifetime of the network may decrease quickly due to the fact that the nodes which are closer to the sink node lose their energy faster. e static WSNs centralized detection techniques can be categorized into one of these six categories, i.e., base station-based, cluster head-based, key usage-based, zone-based, neighbor ID-based, and neighborhood social signature-based techniques.
(2) Distributed Clone Detection Techniques. e main difference here is that the process of clone detection is done by all the network nodes, which means that there is no central node of authority assigned to do the work. is also means that even the nodes that are located in distant positions in the network are involved in this process.

Whale Optimization Algorithm with Applications to
Resource Allocation in Wireless Networks. Resource allocation plays a pivotal role in improving the performance of wireless and communication networks. However, the optimization of resource allocation is typically formulated as a mixed-integer nonlinear programming (MINLP) problem, which is nonconvex and NP-hard by nature. Usually, solving such a problem is challenging and requires specific methods due to the major shortcomings of the traditional approaches, such as exponential computation complexity of global optimization, no performance optimality guarantee of heuristic schemes, and large training time and generating a standard dataset of machine learning based approaches. Whale optimization algorithm (WOA) has recently gained the attention of the research community as an efficient method to solve a variety of optimization problems. As an alternative to the existing methods, our main goal in this article is to study the applicability of WOA to solve resource allocation problems in wireless networks. First, we present the fundamental backgrounds and the binary version of the WOA as well as introduce a penalty method to handle optimization constraints. en, we demonstrate three examples of WOA to resource allocation in wireless networks, including power allocation for energy and spectral efficiency trade-off in wireless interference networks, power allocation for secure throughput maximization, and mobile edge computation offloading. As mentioned before, the WOA has found important applications in a multitude of disciplines; however, we are not aware of any work providing the application and applicability of the WOA in wireless and communication networks [2]. e main contributions can be summarized as follows: (i) We first provide a brief overview of WOA, including the mathematical model and optimization algorithm. Since the original WOA is only appropriate for continuous and unconstrained optimization problems, we present the binary version of the WOA (BWOA) and introduce the penalty method to deal with optimization constraints. Combination of the original WOA with BWOA and penalty method allows us to solve a wide range of optimization problems and obtain a high-quality solution. (ii) To illustrate the applicability of WOA, we investigate three resource allocation problems in wireless networks: secure throughput maximization, energy and spectral efficiency trade-off, and mobile edge computation offloading, which are then solved by the WOA algorithm. Simulation results are conducted to show that the WOA algorithm can converge very fast and achieve almost the same performance as in the existing algorithms. (iii) We outline some possible applications of WOA to unmanned aerial vehicle (UAV) trajectory optimization, interference management in ultra-dense networks (UDNs), user association and scheduling, mode selection, and computation offloading in multicarrier NOMA-enabled MEC systems. e results verify that the WOA is a highly promising algorithm to optimize resource allocation problems in wireless networks [7].
Over the last few years, many efforts have been devoted to improving the WOA, which mainly focus on the exploitation and exploration capabilities and their balance. For example, Cui et al. [2] proposed using the arcsine function to control the trade-off between exploration and exploitation, and the Levy flight trajectory was used to improve the exploration capability of the WOA in [18]. Adopting such improved versions of the WOA to optimize resource optimization problems in wireless networks is an interesting direction for the future. To conclude, the WOA algorithm can be considered as an efficient global optimizer thanks to its well balance between exploitation and exploration. Since the original WOA algorithm is for unconstrained optimization, we need to employ efficient constraint-handling techniques so as to solve constrained problems. Cui  [2] divided constraint-handling techniques into two major categories: (1) classic methods, which are still widely used in its standalone form, and (2) recent methods, which are based on the hybrid of evolutionary ideas with the classic methods. Some of the well-known constraint-handling methods are the penalty method, equality with tolerance, feasibility rules, separation of objectives and constraints, stochastic ranking, and multiobjective approach [20]. Although the applications of WOA to wireless networks remain unexplored, three examples in the previous section really justify the effectiveness of the WOA-based algorithms. In the following sections, a number of potential applications of WOA in wireless networks are discussed. From this discussion, we expect that the WOA will be an effective tool for optimizing upcoming wireless systems, such as cell-free massive multiinput multioutput (MIMO), holographic, federated learning, intelligent reflecting surface, and terahertz communications.

Employing Data Mining on Highly Secure Private Clouds for Implementing a Security-as-a-Service Framework.
Cloud computing is rapidly gaining popularity. However, like any new system, cloud computing is facing some significant challenges. e most significant challenge faced by cloud adopters is related to legal compliance, security controls, privacy, and trust. Data mining has been used for IT security applications requiring inspection and approval/ denial decision making.
Some key examples are antimalware, antispam, Internet security servers, intrusion detection, and intrusion prevention. Data mining in these applications help in archiving data about attack-like behaviors such that malicious sessions can be separated out of genuine end-customer sessions and appropriate decisionmaking rules as per security strategies could be formulated and implemented [24]. e key security objectives in data mining applications for security are (1) Establishing validity of an identity claimed by a session requester following a process called authentication. (2) Authorizing the requester with an identity to gain access to resources based on context, predicates, and attributes. (3) Ensuring that any attempt to modify, tamper, or delete information is detected and blocked (protection of integrity). (4) Ensuring that information is disclosed to authorized individuals only (protecting confidentiality). (5) Ensuring that all attempts to disrupt availability of services are detected and blocked (protecting availability). (6) Ensuring that all activities are logged such that they can be used to generate and enhance knowledge about attack-like behaviors.
In practical applications, data mining is used for gathering, organizing, and using intelligence information for countering cyberterrorism, insider threats, malicious intrusions, malware attacks, Internet-based financial frauds, identity thefts, and attacks on critical infrastructures and government facilities. Data mining helps in organized detection and analysis of vulnerabilities and threats and building their one-to-one, one-to-many, and many-to-many ontological mappings such that accurate risk analysis can be done for implementing information security [23]. In addition, system, application, user activity, and administrative/ maintenance activity logs could be stored as records in data mines for monitoring the unauthorized activities on sensitive files and predict the possibility of internal or external attacks. Data cubes stored in data mines and exported in the form of XML document-modelling files help in prediction of threats and risks using an integrated activity log analysis framework [12]. Activity logs may comprise attack signatures collected from various nodes spread across the network such that a collective log analysis could be conducted using data mines comprising records of distributed logs from across the networking infrastructure. A brief review of cloud computing security is presented under "background and context." is section is dedicated to investigating use of data mining in implementing service-oriented security applications on cloud computing. e primary systems to secure are service-oriented architecture, virtualisation, networking components and links, databases, applications, data storage, and computing resources [22]. Attack patterns can be detected by applying association and sequencing rules on the item sets captured from inbound traffic for detecting attack signatures, length of streams (comparing streamlengths of valid traffic and known attacks' traffic), and anomaly behaviors. ey designed an improved version of Apriori algorithm for supporting length-based decisions taking help of known flow patterns and attack signatures recorded in data mines [10]. e challenge is not only mining relevant records for predictive security analysis of cloud computing but also related to processing and analyzing mass log databases employing security analytical applications. Figure 3 presents a schematic of collection of logs, mining of logs, and analysis of logs needed on cloud computing. e association rule-based mining (Apriori algorithm) combined with MapReduce is currently a valid solution to mining mass-scale logs from SaaS databases. However, applications for analysis of the logs are open for research. Currently, the key challenges in designing log analysis applications are response times, usage functions, parallel processing of queries, dynamic updating of data mines, and securing the data mines [25].
Data mining has been an innovative and productive system in self-hosted infrastructures. However, its growth and popularity are limited by its neverending demands for significant computing and storage resources. Cloud computing offers a new lease for data mining in a variety of applications. Given the high usefulness of data mining in intrusion detection, anomaly detection, and user activity monitoring, an innovative era of cloud security using data mines is emerging. It will be more powerful and sustainable given the unlimited scalability, massive parallel processing capability, and resources elasticity on demand offered by the clouds.
e literatures reveal usefulness of integrating 8 Security and Communication Networks traditional data mining algorithms with Hadoop MapReduce framework, although research studies are still ongoing. is research will focus on the fundamentals of data mining for security applications and positioning them in the context of cloud computing with the help of existing studies. In addition, this research will present a novel data miningbased security application on cloud computing by designing, modelling, and simulating a security architecture employing applications for attack detection using data mining on the cloud. e results will be analyzed, and the architecture and its simulation results will be ratified by IT security experts working in India. e framework is expected to add value to the existing body of knowledge on data mining security and security applications using data mining on cloud computing.

Proposed Method for Improving Storage in Cloud Data Centers
Storage service providers have to provide services to such an extent to satisfy and meet different needs of users. Providers should be aware of the cost and reliability of their storage service; they should first assess the storage cost of data centers and then minimize storage costs by maintaining the reliability in a safe manner, so that storage service providers do their best to reduce storage costs and maintain storage reliability. In order to solve this problem, in the proposed method, using the PSO algorithm, a multiobjective optimization model for data storage in cloud data centers is presented considering the cost of transmission, communication, storage, and construction of data centers and reliability.

Proposed LAPSO Method.
In this section, a particle swarm optimization algorithm based on LA called LAPSO is proposed. Like the particle swarm optimization algorithm, there is a population of particles in this algorithm; each particle has an initial position and velocity. Figure 4 shows the proposed model for minimizing storage and reliability costs. e difference between the proposed and standard algorithms is that the proposed algorithm uses the LA to control the behavior of the particles. is LA has two actions, "following" and "continuing the current path." Initially, the position and velocity of the particles, as well as the probability vector for the selection of LA operations, are initialized. en, as long as the maximum number of steps or the desired goal is achieved, the following steps are repeated: e action that the LA takes in each step determines how the particle velocity is updated in that step. If the "following" operation is selected, only the best individual experience and the best group experience will be considered in updating the particle velocity, and the current velocity of the particles will be excluded, in which case the velocity of the particles will be updated according to (7). If the "continuing the current path" operation is selected, the new velocity of the particles will be equal to their current velocity and the particle will continue the current path.
In fact, selecting the "following" operation will result in a local search and selecting the "continuing the current path" operation will result in a global search and the discovery of unknown parts of the search space. e task of the LA is to learn to remove the desired probability and to create a balance between global search and local search in the search process. e method for evaluating the selected operation is that the current position of each particle is compared with its previous position. If C imp improves from the population position, the selected operation is positive; otherwise, negative. C imp is one of the proposed algorithm parameters that should be adjusted according to the type of problem and the LA used. Figure 5 shows the pseudocode of the proposed algorithm.

Definition of Variables.
Each server in the data center of a cloud storage system can appear as a node and the connection between the servers and edges [26]. So, we can have a complete graph to show server networks. Data files with different security levels have different storage costs. In addition to the cost of cryptographic processing and use of a special device, another problem is that high-security data files may have more backups around different locations. erefore, the monitoring system needs to communicate with servers located in different locations. Flowchart of the proposed method is presented in Algorithm 3. ese processes not only cost a lot but also make storage unreliable.
where S is the set of servers in the database of a cloud storage system. ese servers are located in different places and the total number of servers is N. Parameter d is the distance between the servers; for example, the distance between server i and server j is as follows: where ∀i ∈ 1, 2, . . . , N { }, d(s i , s j ) � 0 and ∀i, j ∈ 1, 2, . . . , { N}, i ≠ j, d(s i , s j ) ≥ 0. Data files sent by users are as follows: in which f i represents a split data file and M is the number of data files; each data file has its own security level, shown as L (f i ).

Total Cost.
e total cost of services is for storing huge data. On each server, data files with different security levels usually show different storage costs as C s (s i , L (fj) ), which is different from the security level of the files. e number of backups for f i data files with different security levels is often adjusted accordingly. If a data file has a high level of security, it will cost more to store. e total service cost for storing a set of F data files is divided into four sections: storage cost, transfer cost, communication cost [15,20], and data center construction cost.

Cost of Building a Data Center.
e cost of creating a data center depends on the size and number of data centers as well as their location. erefore, to minimize the cost of a data center, factors including the number of data centers, the distance between the data centers, and the location of the data center are optimized using the LAPSO algorithm. e LAPSO algorithm calculates the best location for data centers to communicate between the S and S′ data centers. In this method, the cost of creating a data center is minimized according to the parameters of the number of data centers, data volume, distance between the data centers, and the best position of the data centers.

Storage Cost.
e cost of storing f i data files per unit of time can be treated as the cost of renting data center space for a data storage space, the product of which is the rented volume for data files. e price of the storage service is related to the target server and the storage time, so the cost of storing the fi data file can be assessed through the following formula [15]: erefore, the cost of storing datasets at time t is the total cost of storing each data file in the cloud storage system, the formula of which is as follows: Analyzing the results of the lowest distance and storage cost of distributed cloud data centers with reliability

Transfer Cost.
Users can upload their data files over the Internet to a cloud system and access it almost anywhere.
Servers that are in the cloud management layer decide which target storage servers are selected to store user data files. erefore, some data files may be transferred to other servers located in different locations. e cost of the required transfer is essentially proportional to the distance between the transfer and data volume. Assuming that data files are loaded on the server, the cost of migrating a data block f k from server sb to server s j can be calculated as follows:  where C m is the transfer price.
erefore, the cost of transferring data files during the storage process can be calculated as follows [15]:

Communication Cost.
Communication cost is related to the process of transferring data files to the cloud system. e storage management system must collect the storage information of the cloud system servers to ensure that certain data files can be stored on that server. erefore, communication is established throughout the entire storage process [26]. In the management system, when the desired server is s i . e cost of communication is proportional to the distance of server s m . e data file expressed by the f k is intended for storage in communication. e cost of communication from f k data file storage is as follows: erefore, the total cost of communicating a set of data files provided for storage is calculated as follows [15]: 3.2.6. Total Cost. e F dataset must be sent via the sb terminal server. ζ (F, S) is the total cost of storing dataset in the cloud storage system, which is the sum of the storage cost, communication cost, and cost of transferring and creating the data center.

Result and Experiments
In this section, we review and compare the proposed LAPSO method with other storage improvement methods, implementing the program using MATLAB software on a system with a 2.4 GH Core i3 processor, 4 GB of RAM, and Windows 8 operating system. e proposed method is implemented and evaluated with other methods in equal conditions for a dataset that includes 13 data centers. Below is a description of Iran's spatial and geographical information dataset and initial parameters for the LAPSO algorithm; then, the results are examined.

Data Collection.
In the defined dataset, which has 13 data centers, belongs to Iran's Spatial and Geographical Information, and is taken from the country's Land Affairs Organization, 13 cities out of 31 provinces are located that can be optimal in terms of distance and cost of data transfer. Data centers are selected to store the location data of each province in the existing or near data center of that province and as a backup in another data center that is optimal in terms of data center distance and cost of data transfer. e parameters of this dataset are shown in Table 2. In Table 2, the dataset parameters include the number of data centers (n), the set of data centers (S, S′), the characteristics of data centers (q ID, p name), the position of data centers (x, y), and the edge for data center communication (E). In Table 3, the characteristics of the data centers, which include the name, ID, and location of the data center, are displayed. In Table 2, longitude and latitude (x, y) of data centers related to spatial information of Iran are displayed with codes DC1 to DC13.

PSO Parameters.
e parameters of the PSO algorithm for improving storage in data centers include the number of particles (m), the objective function (f ), the position and velocity of the particles (X, V), and other parameters as follows: (i) Population number n � 100; number of particles m � 78. (ii) Acceleration coefficient: value of c 1 , c 2 is 2 by default and ω � 0.9−t/2MAXgen, where t is the current generation and MAXgen is the maximum generation. (iii) Selection strategy: the next population is selected using the elitism strategy according to the unexpected fast classification approach. (iv) Pausing the criterion: the algorithm will stop when the evolution generation reaches n or the solutions found by the algorithm converge in 10 generations.

Cloud Storage Optimization Tests.
In this section, for cloud storage optimization tests, we consider two optimizations including cloud storage in terms of distance and cloud storage for distance and cost factor, which are described below.

Optimization of Cloud Storage in terms of Distance.
e main task of this section is to analyze and discuss the problem of cloud storage among 13 data centers according to the distance factor. e entire distance between adjacent data centers plays an important role in the transmission and efficiency of data centers. e proposed method (LAPSO) is compared with the PSO and genetic algorithms [14]. e parameters in the LAPSO algorithm and the cloud storage optimization problem should start at the beginning of the evolutionary process.
e number of all particles in the LAPSO algorithm is set to 78, and the maximum number of generations is set to 100. Data center coordinates are mainly determined by latitude and longitude.
ere are 13 data centers, and the topology is shown among the data centers listed in Figure 6. Each particle in the LAPSO algorithm is a relationship between the data center of the S set and another data center of the S′ set. e goal of the LAPSO algorithm is to find the smallest distance between the S and S′ data centers for the topology of the defined data centers. So, if each data center (n) is considered a node on the graph, the number of PSO particles (m) is equal to the total number of edges of the complete graph (m � n(n − 1)/2). Table 4 shows the results of the proposed method and the genetic algorithm. Figure 7 shows the geographic coordinates and relationships between the data centers optimized with the PSO algorithm. In addition, the minimum fit of the objective function in 20 executions corresponding to the LAPSO algorithm is 32.4322; for the discrete PSO algorithm, it is 40.7855 as discussed in [20], and for the genetic algorithm, it is equal to 45.0838 as discussed in [14]. e proposed method has better results in the parameters of minimum distance and cost, which includes the cost of data transfer, data communication, and cost of creating data centers, compared to other methods.

Optimizing Cloud Storage for Distance and Cost Factor.
Depending on the distance and cost factor in the cloud storage issue, the corresponding objective function is selected. With the LAPSO algorithm, the mapping is optimized between the S node set and the S' node set. e best fit for the objective function among the 20 executions is 37,6634 for LAPSO, 48,5824 for PSO, and 52,3044 for the genetic algorithm. e issue of cloud storage among distributed data centers is identified by the LAPSO algorithm and compared with other articles. e result can be applied to the problem of cloud storage in the 13 distributed data centers, and they also provide guidance for the 8 central points of the data center, leading to low production costs. In Table 5, the parameters include optimal location, minimum route cost, distance, data transfer cost, storage cost, data connection cost, load balance, access, and year, which are evaluated and compared with other methods.

General Explanation about Proposed Method
is simulation, which is implemented in MATLAB programming language, uses the capabilities of the SSO algorithm or similar particle swarm optimization (simplified swarm optimization) to find the nearest and most optimal neighbors, so that it can send and receive information with energy consumption highly optimized in cloud computing by virtual machines. Given that the SSO algorithm is an improved version of the PSO algorithm, this section provides a complete description of the PSO and SSO algorithms. e PSO algorithm is a social search algorithm modelled on the social behavior of bird flocks. Initially, this algorithm is used to discover the patterns governing the simultaneous flight of birds and their sudden change of direction and optimal deformation of the handle. In PSO, particles flow in the search space. Displacing the particles in the search space is influenced by the experience and knowledge of themselves and their neighbors. erefore, the other position of the particle mass affects how a particle is searched. e result of modelling this social behavior is the search process, in which particles tend to go to successful areas. Particles learn from each other and move towards their best neighbors based on the knowledge gained and determine the location of all neighbors. According to the contents presented in this section, a new algorithm can be presented, which is an improved PSO algorithm. is algorithm is called "similar particle swarm or SSO algorithm." SSO improves the search space of the PSO algorithm and selects the best neighbor, or in fact, the best particle that has outstanding properties  compared to other particles from the particles in the search space. From this perspective, the SSO algorithm can be used to select the best virtual machine available in cloud computing data centers in order to exchange data and thus reduce energy consumption. e SSO work is based on the principle that at any given moment, each particle adjusts its location in the search space according to the best location it has ever been in and the best location in its entire neighborhood. Figure 8 shows the improvement in selecting the best and most optimal ninety neighbors for transmitting information. erefore, by simulating the SSO algorithm in cloud computing, we can significantly improve the selection of the best and most optimal ninety neighbors to transmit information and exchange messages in reducing the energy consumption of cloud data centers. Different parameters are taken here and their comparison is made as shown below. e value of the makespan of SSO is compared with the    ✓ ✓ CDRM [29] ✓ ✓ ✓ ✓ BARRS [30] ✓ ✓ MORM [31] ✓ ✓ ✓ RAPGC [32] ✓ ✓ ✓ Fuzzy-FP [33] ✓ ✓ PDDRA [23] ✓ ✓ EIMORM [34] ✓ ✓ DPRS [35] ✓ ✓ PDR [36] ✓ ✓ ✓ ACO [24] ✓ ✓ GASA [37] ✓ ✓ DRSACO [25] ✓ ✓ Genetic algorithm [2] ✓ ✓ existing PSO for 10 data centers as shown in Figure 9. e number of cloudlets that show the value of makespan is calculated for 10 data centers with each 50, 100, 150, and 200 cloudlets for both SSO and PSO approaches. e existing PSO is compared with the proposed SWO. It is observed that the proposed technique gives an optimized makespan, rather than the existing PSO. It is observed that makespan is nearly 73.23% more optimum in SSO than the existing PSO for 50 cloudlets, 88.64% for 100 cloudlets, 92.18% for 150 cloudlets, and 94.04% for 200 cloudlets.

Conclusions
Robustness of cloud storage in data centers was analyzed using the proposed method. In data centers, spatial information of Iranian lands was introduced according to the existing communication network and the number of available resources to solve the storage problem between LAPSO data centers. e method used to optimize cloud storage was to minimize storage costs. Optimal location parameters, route minimum cost, distance, data transfer cost, storage cost, data connection cost, load balance, access, and year were employed for optimization. But in other methods, only a few parameters have been evaluated. On the other hand, in this method, implementing the LA algorithm increased accuracy and improved the results compared to other methods. In this paper, a simplified version of PSO algorithm was proposed to solve the job scheduling problem in cloud computing environment. To evaluate the performance of the proposed approach, this study compared the proposed SSO strategy by having it implemented on the CloudSim toolkit. e results obtained demonstrated that the presented PSO algorithm can significantly reduce the makespan of the job scheduling problem compared with the other metaheuristic algorithms evaluated in this paper. Average makespan was compared between the existing PSO and proposed SSO. e average difference thus found out was nearly constant for all the values. e result was validated as the makespan of the proposed SSO was less than that of the existing PSO. e fitness function was also improved.

Data Availability
e data used to support the findings of this study are currently under embargo while the research findings are commercialized. Requests for data, 6/12 months after publication of this article, will be considered by the corresponding author.

Conflicts of Interest
e authors declare that they have no conflicts of interest.