Machine Learning Techniques and Analytics For Cloud Security Advances in Learning Analytics For Intelligent Cloud Iot Systems 1St Edition Chakraborty
Machine Learning Techniques and Analytics For Cloud Security Advances in Learning Analytics For Intelligent Cloud Iot Systems 1St Edition Chakraborty
Machine Learning Techniques and Analytics For Cloud Security Advances in Learning Analytics For Intelligent Cloud Iot Systems 1St Edition Chakraborty
com
https://ebookmeta.com/product/machine-learning-
techniques-and-analytics-for-cloud-security-
advances-in-learning-analytics-for-intelligent-
cloud-iot-systems-1st-edition-chakraborty/
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebookmeta.com/product/machine-learning-approach-for-
cloud-data-analytics-in-iot-1st-edition-sachi-nandan-mohanty-
editor/
https://ebookmeta.com/product/machine-learning-for-intelligent-
multimedia-analytics-techniques-and-applications-pardeep-kumar-
amit-kumar-singh-eds/
https://ebookmeta.com/product/machine-learning-and-iot-for-
intelligent-systems-and-smart-applications-1st-edition/
https://ebookmeta.com/product/deep-learning-approaches-to-cloud-
security-deep-learning-approaches-for-cloud-security-1st-edition/
Data-Driven Mining, Learning and Analytics for Secured
Smart Cities: Trends and Advances (Advanced Sciences
and Technologies for Security Applications) Chinmay
Chakraborty
https://ebookmeta.com/product/data-driven-mining-learning-and-
analytics-for-secured-smart-cities-trends-and-advances-advanced-
sciences-and-technologies-for-security-applications-chinmay-
chakraborty/
https://ebookmeta.com/product/machine-learning-for-cloud-
management-1st-edition-kumar/
https://ebookmeta.com/product/machine-learning-for-intelligent-
multimedia-analytics-techniques-and-applications-studies-in-big-
data-82-pardeep-kumar-editor-amit-kumar-singh-editor/
https://ebookmeta.com/product/architecting-data-and-machine-
learning-platforms-enable-analytics-and-ai-driven-innovation-in-
the-cloud-1st-edition-marco-tranquillin/
Machine Learning Techniques
and Analytics for Cloud Security
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
The role of adaptation, learning analytics, computational Intelligence, and data analytics in the field
of cloud-IoT systems is becoming increasingly essential and intertwined. The capability of an
intelligent system depends on various self-decision-making algorithms in IoT devices. IoT-based
smart systems generate a large amount of data (big data) that cannot be processed by traditional data
processing algorithms and applications. Hence, this book series involves different computational
methods incorporated within the system with the help of analytics reasoning and sense-making in big
data, which is centered in the cloud and IoT-enabled environments. The series publishes volumes that
are empirical studies, theoretical and numerical analysis, and novel research findings.
Publishers at Scrivener
Martin Scrivener (martin@scrivenerpublishing.com)
Phillip Carmical (pcarmical@scrivenerpublishing.com)
Machine Learning Techniques
and Analytics for Cloud Security
Edited by
Rajdeep Chakraborty
Anupam Ghosh
and
Jyotsna Kumar Mandal
This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener
Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2022 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to
obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.
wiley.com.
ISBN 978-1-119-76225-6
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
10 9 8 7 6 5 4 3 2 1
Contents
Preface xix
Part I: Conceptual Aspects on Cloud and Applications
of Machine Learning 1
1 Hybrid Cloud: A New Paradigm in Cloud Computing 3
Moumita Deb and Abantika Choudhury
1.1 Introduction 3
1.2 Hybrid Cloud 5
1.2.1 Architecture 6
1.2.2 Why Hybrid Cloud is Required? 6
1.2.3 Business and Hybrid Cloud 7
1.2.4 Things to Remember When Deploying Hybrid Cloud 8
1.3 Comparison Among Different Hybrid Cloud Providers 9
1.3.1 Cloud Storage and Backup Benefits 11
1.3.2 Pros and Cons of Different Service Providers 11
1.3.2.1 AWS Outpost 12
1.3.2.2 Microsoft Azure Stack 12
1.3.2.3 Google Cloud Anthos 12
1.3.3 Review on Storage of the Providers 13
1.3.3.1 AWS Outpost Storage 13
1.3.3.2 Google Cloud Anthos Storage 13
1.3.4 Pricing 15
1.4 Hybrid Cloud in Education 15
1.5 Significance of Hybrid Cloud Post-Pandemic 15
1.6 Security in Hybrid Cloud 16
1.6.1 Role of Human Error in Cloud Security 18
1.6.2 Handling Security Challenges 18
1.7 Use of AI in Hybrid Cloud 19
1.8 Future Research Direction 21
1.9 Conclusion 22
References 22
v
vi Contents
4.2.4 Advantages 67
4.2.5 Disadvantages 67
4.3 Literature Review 67
4.4 Role of Sensors and Microcontrollers in Smart Home Design 68
4.5 Motivation of the Project 70
4.6 Smart Informative and Command Accepting Interface 70
4.7 Data Flow Diagram 71
4.8 Components of Informative Interface 72
4.9 Results 73
4.9.1 Circuit Design 73
4.9.2 LDR Data 76
4.9.3 API Data 76
4.10 Conclusion 78
4.11 Future Scope 78
References 78
5 Symmetric Key and Artificial Neural Network With Mealy Machine:
A Neoteric Model of Cryptosystem for Cloud Security 81
Anirban Bhowmik, Sunil Karforma and Joydeep Dey
5.1 Introduction 81
5.2 Literature Review 85
5.3 The Problem 86
5.4 Objectives and Contributions 86
5.5 Methodology 87
5.6 Results and Discussions 91
5.6.1 Statistical Analysis 93
5.6.2 Randomness Test of Key 94
5.6.3 Key Sensitivity Analysis 95
5.6.4 Security Analysis 96
5.6.5 Dataset Used on ANN 96
5.6.6 Comparisons 98
5.7 Conclusions 99
References 99
6 An Efficient Intrusion Detection System on Various Datasets Using
Machine Learning Techniques 103
Debraj Chatterjee
6.1 Introduction 103
6.2 Motivation and Justification of the Proposed Work 104
6.3 Terminology Related to IDS 105
6.3.1 Network 105
6.3.2 Network Traffic 105
6.3.3 Intrusion 106
6.3.4 Intrusion Detection System 106
6.3.4.1 Various Types of IDS 108
6.3.4.2 Working Methodology of IDS 108
viii Contents
Our objective in writing this book was to provide the reader with an in-depth knowledge
of how to integrate machine learning (ML) approaches to meet various analytical issues
in cloud security deemed necessary due to the advancement of IoT networks. Although
one of the ways to achieve cloud security is by using ML, the technique has long-standing
challenges that require methodological and theoretical approaches. Therefore, because the
conventional cryptographic approach is less frequently applied in resource-constrained
devices, the ML approach may be effectively used in providing security in the constantly
growing cloud environment. Machine learning algorithms can also be used to meet various
cloud security issues for effective intrusion detection and zero-knowledge authentication
systems. Moreover, these algorithms can also be used in applications and for much more,
including measuring passive attacks and designing protocols and privacy systems. This
book contains case studies/projects for implementing some security features based on ML
algorithms and analytics. It will provide learning paradigms for the field of artificial intelli-
gence and the deep learning community, with related datasets to help delve deeper into ML
for cloud security.
This book is organized into five parts. As the entire book is based on ML techniques,
the three chapters contained in “Part I: Conceptual Aspects of Cloud and Applications of
Machine Learning,” describe cloud environments and ML methods and techniques. The
seven chapters in “Part II: Cloud Security Systems Using Machine Learning Techniques,”
describe ML algorithms and techniques which are hard coded and implemented for pro-
viding various security aspects of cloud environments. The four chapters of “Part III: Cloud
Security Analysis Using Machine Learning Techniques,” present some of the recent studies
and surveys of ML techniques and analytics for providing cloud security. The next three
chapters in “Part IV: Case Studies Focused on Cloud Security,” are unique to this book as
they contain three case studies of three cloud products from a security perspective. These
three products are mainly in the domains of public cloud, private cloud and hybrid cloud.
Finally, the two chapters in “Part V: Policy Aspects,” pertain to policy aspects related to
the cloud environment and cloud security using ML techniques and analytics. Each of the
chapters mentioned above are individually highlighted chapter by chapter below.
xix
xx Preface
and the third is verifier. For example, to see a movie in a theater we purchase
ticket. So, the theater counter is the ticket generator; and while purchasing
a ticket here we generally don’t reveal our identifying information such as
name, address or social security number. We are allowed to enter the theater
when this ticket is verified at the gate, so, this is the verifier algorithm. This
chapter also discusses ZKP for cloud security.
–– Chapter 9 discusses an effective spam detection system for cloud secu-
rity using supervised ML techniques. Spam, which is an unwanted mes-
sage that contains malicious links, viral attachments, unwelcome images
and misinformation, is a major security concern for any digital system and
requires an effective spam detection system. Therefore, this chapter begins
by discussing the requirements for such a system. Then, it gradually moves
towards a supervised ML-technique-based spam detection system, mainly
using a support vector machine (SVM) and convolutional neural network
(CNN). Implementation results are also given with application in cloud
environment.
–– Chapter 10 describes an intelligent system for securing network from intru-
sion detection and phishing attacks using ML approaches, with a focus on
phishing attacks on the cloud environment. It begins by describing different
fishing attacks on cloud environment and then proposes a method for detect-
ing these attacks using ML. Next, analysis of different parameters for ML
models, predictive outcome analysis in phishing URLs dataset, analysis of
performance metrics and statistical analysis of results are presented.
approaches for spreading policies using network science are discussed. Then,
evaluations and matrices to evaluate policies for cloud security are described.
This chapter concludes with a presentation of all the simulation results.
–– Chapter 19 discusses the policies of iSchools with artificial intelligence,
machine learning, and robotics through analysis of programs, curriculum and
potentialities towards intelligent societal systems on cloud platform. iSchools
are a kind of consortium that develops with the collection of information and
technology-related schools and academic units. In the last decade there has
been a significant growth in the development of such academic bodies. This
chapter provides a policy framework for iSchools, the methodology involved
and a list of available iSchools. The chapter concludes with some policy sug-
gestions and future work related to iSchools.
The Editors
October 2021
Part I
CONCEPTUAL ASPECTS ON CLOUD AND
APPLICATIONS OF MACHINE LEARNING
1
Hybrid Cloud: A New Paradigm
in Cloud Computing
Moumita Deb* and Abantika Choudhury†
Abstract
Hybrid cloud computing is basically a combination of cloud computing with on-premise resources
to provide work portability, load distribution, and security. Hybrid cloud may include one public
and one private cloud, or it may contain two or more private clouds or may have two or more public
clouds depending on the requirement. Public clouds are generally provided by third party vendors
like Amazon, Google, and Microsoft. These clouds traditionally ran off premise and provide ser-
vices through internet. Whereas private clouds also offer computing services to selected user either
over the internet or within a private internal network and conventionally ran on-premise. But this
scenario is changing nowadays. Earlier distinction between private and public clouds can be done
on the location and ownership information, but currently, public clouds are running in on-premise
data centers of customer and private clouds are constructed on off premise rented, vendor-owned
data centers as well. So, the architecture is becoming complex. Hybrid cloud reduces the potential
exposure of sensitive or crucial data from the public while keeping non-sensitive data into the cloud.
Thus, secure access to data while enjoying attractive services of the public cloud is the key factor in
hybrid cloud. Here, we have done a survey on hybrid cloud as it is one of the most promising areas
in cloud computing, discuss all insight details. Security issues and measures in hybrid cloud are also
discussed along with the use of artificial intelligence. We do not intend to propose any new findings
rather we will figure out some of future research directions.
1.1 Introduction
Cloud computing is catering computing services such as storage, networking, servers, ana-
lytics, intelligence, and software though the internet on demand basis. We typically have
to pay for only for the services we use. IT is a growing industry and catering its service
requirement is challenging. On-premise resources are not sufficient always, so leveraging
attractive facilities provided by cloud service providers is often required. Typical services
Rajdeep Chakraborty, Anupam Ghosh and Jyotsna Kumar Mandal (eds.) Machine Learning Techniques and Analytics for
Cloud Security, (3–24) © 2022 Scrivener Publishing LLC
3
4 Machine Learning Techniques and Analytics for Cloud Security
provided by cloud computing are Platform as a service (PaaS), Software as a service (SaaS),
and Infrastructure as a service (IaaS). But all the clouds are not same and no one particular
cloud can satisfy all the customer. As a result, various types of services are emerging to cater
the need of any organization. The following are the facilities cater by cloud computing.
Thus, it enables the customer to extend their business by leveraging the attractive services
provided by public cloud as well as securing the delicate data through the use of private
cloud. When the demand of a business fluctuates that may be sudden peak in the business
come or sudden fall down, in those scenarios, hybrid cloud is the best possible option as
it has that flexibility [8]. Organizations can seamlessly use public cloud amenities without
directly giving access to their data centers which are part of their on-premise servers. So,
business critical data and applications can be kept safe behind, while computing power of
the public cloud can be used for doing complex tasks. Organizations will only have to pay
for the services it is using without considering the capital expenditure involve in purchasing,
programming and maintaining new resources which can be used for a short span of time and
may remain idle for long. Private cloud on the other hand is more like public cloud, but gen-
erally installed on clients datacenter and mainly focus on self-servicing, scalable structure.
Single tone service nature, service-level agreement (SLA), and similar association make the
relationship between client and cloud stronger and less demanding [33, 34].
6 Machine Learning Techniques and Analytics for Cloud Security
1.2.1 Architecture
There may be any combination of cloud services when to deploy a hybrid cloud. It may
the client has its own on-premise private cloud as IaaS and leverage public cloud as SaaS.
Private cloud may be on premise or sometimes off premise on a dedicated server [10]. There
is no fixed fits for all architecture. Private clouds can be made individually, whereas public
cloud can be hired from vendors like Amazon, Microsoft, Alibaba, Google, and IBM. Next,
a middleware is required to combine public and private cloud mostly provided by the cloud
vendors as a part of their package. Figure 1.1 gives general diagram of a hybrid cloud.
In case of hybrid cloud architecture, the following is a list of properties that must to be
kept in mind [4]:
a. Multiple devices need to be connected via LAN, WAN, or VPN with a com-
mon middleware that provides an API for user services. Rather than using a
vast network of API, a single operating system must be used throughout the
network and APIs can be built on top of that.
b. Resources are made available to all the connected devices via virtualization
and it can be scaled up to any limit.
c. The middleware does all the coordination between devices and resources are
made available on demand basis with proper authentication.
On-Premise Apps
PUBLIC CLOUD
SQL SQL
Off-Premise Apps
SaaS, Iaas and PasS
Mobile Applications
PRIVATE CLOUD
No matter how well we plan the future, it still remains uncertain and hybrid cloud pro-
vides the facility to use cloud services as and when it is required. It is also quite unlikely
that workload of an organization remains same throughout the whole year. Suppose an
organization is working on big data analytics, it can take help of public cloud computing
resources for high complex computations but that too is not needed for long run, may be
require for few months. Here, public cloud resources can be borrowed for few months only.
In the same way, startup companies can start with some trivial private resources and take
cloud services for rest of the processing. Then, based on the performance, they can plan
to expand the business with the help of public cloud. All these are possible only in case of
hybrid cloud as it has agility, scalability, data reliability, speedy recovery, and improved
connectivity and security.
hosting services in just single point of contact. North America was the most promising
hybrid cloud market place in 2018 and Asia Pacific areas shows the highest CAGR. So,
hybrid cloud is a promising area in business. Major sectors using hybrid cloud computing
are healthcare, retail, government, or public sectors, banking, entertainment media, insur-
ance, finance, communication media, etc. [14]. According to a report published by Mordor
Intelligence, North America, Middle East, Africa, Europe, and Asia Pacific are top growing
regions worldwide. Figure 1.2 shows the hybrid cloud market. Green portions represent
highly growing market. Hybrid cloud management software solution is the main reason of
this popularity. Starting from deployment to quota management, customization of service
library, costing, performance management, and governance, everything is taken care of,
like the software management tool. Mostly, the services provided by public providers are
restricted to some architecture or technology and vendor specific. But the management
tool provided by hybrid providers helps to amalgamate different services provided by var-
ious vendors. Amazon and Microsoft, the giants in this field, are working hard in the up
gradation of their management software by including advanced infrastructure templates,
libraries, API, and apps. In India, IBM is also approaching toward hybrid cloud and AI [15].
IBM invested $1 billion into a cloud ecosystem project in the month of August. They are
expected to invest more in the coming time. In India, 17% of organizations are planning to
spend investment from 42% to 49% on hybrid cloud by 2023 according to a study by IBM
IBV. Since India is heading toward a digital transformation and self-reliant camping, so the
opportunity of new technology adaptation also increasing.
• Selection of best suitable platform for cloud: As discussed, the need of every
organization is not same. Before deployment of the hybrid cloud, organi-
zations need to have a plan for the services; it will borrow from the public
Hybrid Cloud: New Paradigm in Cloud Computing 9
cloud. If it is going to use only SaaS, then it is not a problem but it is going
to use IaaS or PaaS and then it is very important to take the correct decision
from the commencement of the service as building a hybrid structure that
would not be able to handle additional workload generates severe problem.
• Whether to use unified OS or not: In true hybrid cloud, a unified OS is
installed in the middleware that basically governs the overall functionalities.
But in some cases, on-premise system may be operated by its own OS then
just with the help of internet they can connect to public cloud. The perfor-
mance of this architecture will be vast different from unified OS. OpenStack,
VMWare cloud, Nutanix, and Kubernetes are some example of cloud OS
framework. These frameworks are sufficient building the middleware and it
provides OS and all supporting application for the smooth execution of all
activities in hybrid cloud.
• How to manage different activity: Huge amount of data need to be handled
in case of hybrid cloud. A hybrid system should look into smooth accessi-
bility of data, and at the same time, security of data needs to be guaranteed.
Anyone cannot host any data onto the public cloud. Proper personnel with
adequate experience need to be engaged for the management of dedicated
applications.
• How security of data will be guaranteed: Since data is moving in between
public and private cloud, it needs to be secured. Through security mecha-
nisms of public cloud, it has developed much from its early date but still it is
not 100% secure. There are always threats of data breach. Migration of sensi-
tive need special care as sight alteration in business sensitive data might cause
severe problem in the business.
• How to integrate public cloud with existing on-premise system: Amalgamation
of public cloud onto an existing on-premise system often needs several alter-
ations in the working of the existing on-premise system. Overall performance
of the system should always improve with the addition of the public cloud,
and it should not degrade.
• How to manage common backup and disaster recovery: Data need to be
backed up to ensure reliability and availability. Backing up of all the data both
in private and public cloud need to be done. At the same time, the system
should be able to handle catastrophic failure or disaster. How to maintain a
common routine for all the operational data to accommodate those situa-
tions is key to the success of hybrid cloud deployment.
Building a hybrid cloud is a complex procedure but successful implementation will pro-
vide scalability, flexibility, security, and cost saving. More and more organizations approach-
ing toward hybrid cloud for the current benefit and future growth.
cloud providers have important role in the PaaS and IaaS markets. Synergy Research Group
reported that the growth of Amazon is very significantly high in overall growth of market.
It possesses a share of 33% of cloud market throughout the world. In second position, there
is Microsoft. Microsoft is very fast growing and in the last four quarters, and its share has
been increased by 3% and it reaches at 18%. Nowadays, cloud computing is become much
matured. It is becoming hybrid cloud, and it also becomes more enhanced as market share.
New trends have come to improve cloud computing system in 2020 than that of 2017, 2018,
and 2019 [17].
Hybrid cloud [17] provides strategy for enterprises that involve operational part of vari-
eties of job in varieties infrastructure, whether on private cloud and public cloud with a
proprietary different layers at the top level. Multi-cloud concept is similar kind of but not
to involve any private cloud. Hybrid cloud is the most popular strategy among enterprises;
58% of respondents stated that it is their choice able approach while 10% for a single public
cloud provider and 17% for multiple public clouds.
It also offers to do lift and shift on-premise apps, executing on IBM plat-
forms [18].
• Cisco Cloud Center: Cisco is popular for private cloud that also offers hybrid
solutions via its partner. Cisco Cloud Center is more secured to manage and
deploy the applications in different data centers in both private and public
cloud environments. Cisco’s partner networks are Google, CDW, Accenture,
and AT&T. Google is the biggest partner among them. It offers the hybrid
connectivity and their solutions [18].
• VMware vCloud Suite: VMware provides vendor for virtualized services.
It is relatively new than that of other service providers. VMware has the
vSphere hypervisor. Customers can run in some known public clouds or
their own data centers or cloud provider partners. These cloud providers
are able to run vSphere on-premise that creates a stable hybrid cloud infra-
structure [19].
Table 1.1 Comparison between AWS Outpost, Microsoft Azure Stack, and Google Cloud Anthos.
AWS Outpost Microsoft Azure Stack Google Cloud Anthos
Amazon has a huge tool set The customer can run in Google has come to the
and that too is rapidly their own data center. cloud market later. So,
growing. No service Azure tries to incorporate it does not have that
providers can match with that. It provides the much level of focus to
with it. But the pricing facility of hybrid cloud incorporate the customers.
is bit puzzling. Though [19]. But the strength is its
providing service for A customer can replicate technical efficiency. Some
hybrid or public cloud is his environment in Azure of its efficient tools are
not amazon’s primary focus Stack. This is very useful in applicable in data analytics,
thus incorporation of cloud case of backup disaster and machine learning, and
services with on-premise for cutting cost. deep learning.
data is not in top priority
[20]. They primarily focus
on public cloud.
12 Machine Learning Techniques and Analytics for Cloud Security
Table 1.2 Pros and cons between AWS Outpost, Microsoft Azure Stack, and Google Cloud Anthos.
Vendor Strength Weakness
AWS Outpost 1. Dominant market position 1. Managing cost
2. Extensive, mature offerings 2. Very difficult for using
3. Effective use in large organizations 3. Options are overwhelming
Microsoft 1. Second largest service provider 1. Poor documentation
Azure Stack 2. Coupling with Microsoft software 2. Management tooling is incomplete
3. Set of features is vast
4. Provides Hybrid cloud
5. Open source supported
Google Cloud 1. Designed to serve for cloud-native 1. Enters late in IaaS market
Anthos enterprises 2. Less services and features
2. Provides portability and allows 3. Not focused for enterprise
open source
3. Huge discounts and suitable
contracts
4. Expertise in DevOps
offers in load balancing and considerable scale. Google is also efficient knowledge about
different data centers and quick response time. Google stands in third in the field of market
share [21]. But, it is rapidly increasing its offers. As per Gartner, clients choose GCP as a
secondary provider than that of primary provider.
A few days later a client of ours named Powell for whom we were
conducting a piece of rather intricate business concerning a
mortgage of some land in Essex, invited me to join himself and his
wife at dinner at the Savoy.
Our table was in a corner near the orchestra and the big restaurant
was crowded. Sovrani, the famous maître d’hôtel knew all three of us
well and we dined excellently under his tactful supervision. After
dinner Mrs. Powell, a pretty young woman, exquisitely gowned,
suggested a dance in the room below. We went there and danced
until about half-past ten when Powell said:
“Let’s go to the Ham-bone.”
“The Ham-bone,” I echoed. “What on earth is that?”
“Oh!” laughed Mrs. Powell, “it is one of London’s merriest Bohemian
dance clubs. The male members are all artists, sculptors or literary
men, and the female members are all girls who earn their own living
—mannequins, secretaries, artists’ models and girl journalists. It is
screamingly amusing. Quite Bohemian and yet high select, isn’t it,
Harry?”
“I’ve never heard of it,” I said.
“Well, one gets a really splendid dinner there for half-a-crown,
though, of course, you get paper serviettes, and for supper after the
hours, you men can have a kipper—a brand that is extra special—
and a drink with it,” she went on.
“Yes, Leila,” laughed her husband. “The place is unique. Half the
people in ‘smart’ society, men as well as women, want to become
members, but the Committee, who are all well-known artists, don’t
want the man-about-town: they only want the real hard-working
Bohemians who go there at night for relaxation. Burlac, the sculptor,
put me up.”
The novelty of the idea attracted me, so we went in a taxicab to an
uninviting looking mews off Great Windmill Street, behind the Café
Monico in Piccadilly Circus. Walking up it, we passed through a
narrow swing-door, over which hung a dim feeble light and a big
ham-bone!
Up a precipitous flight of narrow stone steps we went until we
reached a little door where a stout ex-sergeant of police smiled
recognition upon my host, placed a book before him to sign and
relieved us of our coats.
In a room above a piano was being played by someone who was
evidently an artist and dancing was in progress.
The place might have been a cabaret in the Montmartre in Paris. I
thought I knew London’s night clubs fairly well—the Embassy, Ciro’s,
the Grafton, the Mayfair, the Royalty, the Twenty, Murray’s, Tate’s,
the Trippers, the Dainty, and others—but when I entered the big
whitewashed dancing room I found myself looking on a scene that
was a complete novelty to me.
The room was long and narrow. The walls were painted in stripes
representing oaken beams and set around them were many small
tables. The floor was filled with merry dancers, among whom I
recognized many people well-known in artistic and social circles.
Some of the men wore dinner jackets and many of the women were
in beautiful evening dress, but smart clothes evidently were regarded
as a non-essential, for a large proportion of the men wore ordinary
lounge suits.
As we stood watching the scene a tall, elderly man rose from a table
and cried:
“Hulloa! Leila! What a stranger you are!”
My hostess smiled and waved recognition, whereupon her friend—a
portrait painter whose reputation was world-wide, bowed over her
hand and said:
“Well, only fancy! It is really delightful that you should return to us!
We thought we’d lost you after you married!”
“My dear Charlie,” she laughed—for it was a rule in the Ham-bone
that every member addressed every one else by his or her Christian
name, and “Charlie” was a Royal Academician—“I am an old
Hamyardian: I was one of the first lady members.”
“Of course. You’ll find Marigold here. I’ve just been chatting with her.
She’s round the corner, over yonder. But she’s funny. What’s the
matter with her? Do you know?” he added in a low, serious voice.
“No, I didn’t know there was anything wrong,” replied my hostess.
It was easy to realize that here in this stable converted into a club
was an atmosphere and an environment without its like in London or
elsewhere. The denizens of that little circle of Bohemia cared for
absolutely nothing and nobody outside its own careless world whose
boundaries were Chelsea and the Savoy Club.
Ordinary social distinctions were utterly and completely ignored.
Gayety was supreme and in the merry throng I caught sight within a
few minutes of a well-known London magistrate before whom I had
often pleaded as a Solicitor, a famous scientist, the millionaire owner
of a great daily paper. Several leading members of the Chancery
Bar, an under-secretary of State and quite a sprinkling of young
scions of patrician families.
They were men and women of the intellectual type who cared
nothing for the vicious joys of the ordinary night club. They came in
frank enjoyment of dancing and music and the fried kippers, as
custom decreed, in order to comply with the kill-joy law that ordained
that they must eat if they wanted a drink! Everything, apparently, was
free and easy gaiety. Yet it was at least as difficult to become a
member of the Ham-bone as to gain admission to any of the most
exclusive clubs along Pall Mall. Money was no sort of passport: only
personality, ability or the true inborn spirit of Bohemianism could
open the portals of the Ham-bone.
The “master of ceremonies” was a well-known landscape painter,
whom every one addressed as “George,” a smart figure in the brown
velvet jacket of his profession. He chaffed and joked with every one
in French, revealing a side of his nature certainly unsuspected by the
general public to whom he usually presented a grave and austere
front. But this was the key-note of the Ham-bone: every one seemed
to “let himself go” and the stilted social etiquette of our ordinary world
seemed as far off as if we had been in Limehouse or Poplar.
I was dancing with Mrs. Powell, when, suddenly, she halted before a
small table in a corner where there sat alone a beautiful dark-haired
girl in a smartly cut dance-frock of black charmeuse.
“Mr. Yelverton,” she said, “will you let me introduce you to my dearest
friend, Marigold Day?” And to the girl she said, “Marigold, this is Mr.
Rex Yelverton, the gentleman of whom I recently spoke to you.”
Somberly dressed, her white neck and bare arms in vivid contrast
with her dead-black frock, she was almost wickedly beautiful. Her
well-dressed hair, across which she wore a bandeau of golden
leaves, was dark; her scarlet mouth was like the curling underleaves
of a rose, her lips with the true arc-de-cupidon so seldom seen, were
slightly apart, and between them showed strong white teeth. Her
eyes were large and deeply violet and they held a fascination such
as I had seldom before seen.
“We’ll be back presently,” said Mrs. Powell, as we slipped again into
the dance. “I want to have a chat with you.”
“Who’s that?” I asked, as soon as we were a few feet away.
“Oh, that’s Marigold. We are fellow-members here. She was in
business with me before I married. Isn’t she very good-looking, don’t
you think?”
“Beautiful,” I declared.
“Ah, I see,” laughed my partner. “You are like all the other men. They
all admire her, and want to dance with her. But Marigold is a queer
girl: I can never make her out in these days. Once she was very
bright and merry, and always gadding about somewhere with a man
named Audley. Now there’s a kink somewhere. She accepts no
invitations, keeps herself to herself, and only on rare occasions
comes here just to look on. A great change has come over her. Why,
I can’t make out. We were the closest of friends before I married, so
I’ve asked her the reason of it all, but she will tell me absolutely
nothing.”
“Audley,” I gasped. “Where is she at business?”
“At Carille’s, the dressmakers in Dover Street. She’s a mannequin,
and I was a typist there,” she replied. “And now Mr. Yelverton, you
know what was my business before I married,” she added, with a
laugh.
“Pretty boring, I should say, showing off dresses to a pack of
unappreciative old cats,” was my remark.
“Boring isn’t the word for it,” Mrs. Powell declared, “I couldn’t have
stood her work. You should see our clients—uneducated, fat, coarse,
war-rich old hags who look Marigold up and down, and fancy they
will appear as smart as she does in one of Monsieur Carille’s latest
creations. How Marigold sticks at it so long I can’t make out. She
ought to be awarded the prize medal for patience. I could never
amble about over that horrid grey carpet and place my neck, my
elbows and hands at absurd angles for the benefit of those ugly old
tabbies—no matter what salary I was paid!”
At that moment we found ourselves before the table where her
husband was seated, smoking and drinking coffee with Sava, the
young Serbian who was perhaps the greatest modern caricaturist.
Belgravia is good; Bohemia is better; the combination of both is
surely Paradise! Sava’s conversation was as perfect as his
caricatures: he had seen life in every capital in Europe and was a
born raconteur. For a time he held us engrossed with his witty
comments on the men and matters of half-a-dozen countries, all of
which he knew to perfection.
Never have I seen so truly fraternal a circle as that little backwater of
Bohemianism. Every one was at his ease: there was no such a thing
as being a stranger there. The fact that you were there—that some
member had introduced you and vouched for you—broke down all
barriers and men who had never before met and might never meet
again met and chatted as freely as if they were old friends and with
an utter disregard of all the vexing problems of wealth, rank,
profession and precedence.
Presently my hostess took me back to the mannequin in black whom
I new realized must be wearing a copy of one of the famous man-
dressmaker’s latest creations.
“Mr. Yelverton wants a partner, Marigold,” my companion exclaimed
gayly, whereupon her friend smiled and rising at once, joined me in a
fox-trot with an expression of pleasure upon her face. She was a
splendid dancer.
“Mrs. Powell has told me of your acquaintance with Mr. Audley,” I
said, after a few minutes of the usual ball-room chat. “I wonder if it is
the same man I know. He used to live in Half Moon Street.”
She clearly resented the question. “Why do you ask?” she
demanded.
“Because I’ve lost sight of my friend of late,” I replied.
“Well, Mr. Audley did live in Half Moon Street, but he has gone
away,” she replied. And I thought I detected a hint of tragedy upon
her face.
CHAPTER VII
IN THE WEB