Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.5.49

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques  

Gadde, Swetha (Department of Computer Science and Engineering, Rajarajeswari college of Engineering, Affiliated to VTU)
Amutharaj, J. (Department of Information Science and Engineering, Rajarajeswari college of Engineering, Affiliated to VTU)
Usha, S. (Department of Computer Science and Engineering, Rajarajeswari college of Engineering, Affiliated to VTU)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.5, 2022 , pp. 342-347 More about this Journal
Abstract
On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.
Keywords
Cloud Computing; Cryptographic Methods; Encryption; Machine Learning Techniques; Secrecy;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," 2010, doi: 10.1109/INFCOM.2010.5462174.   DOI
2 J. Lee, "A view of cloud computing," Int. J. Networked Distrib. Comput., 2013, doi: 10.2991/ijndc.2013.1.1.2.   DOI
3 M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Trans. Parallel Distrib. Syst., 2013, doi: 10.1109/TPDS.2012.97.   DOI
4 X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, and M. Li, "Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing," Comput. Secur., 2014, doi: 10.1016/j.cose.2013.12.002.   DOI
5 P. Yang, N. Xiong, and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access. 2020, doi: 10.1109/ACCESS.2020.3009876.   DOI
6 N. Taleb and E. A. Mohamed, "Cloud computing trends: A literature review," Academic Journal of Interdisciplinary Studies. 2020, doi: 10.36941/ajis2020-0008.   DOI
7 M. A. Ako, "Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data," Cryptogr. Netw. Secur., 2017.
8 S. Shilpashree, R. R. Patil, and C. Parvathi, "'Cloud computing an overview,'" Int. J. Eng. Technol., 2018, doi: 10.14419/ijet.v7i4.10904.   DOI
9 P. Mulinka and P. Casas, "Stream-based machine learning for network security and anomaly detection," 2018, doi: 10.1145/3229607.3229612.   DOI
10 P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, "Efficient data security using hybrid cryptography on cloud computing," 2021, doi: 10.1007/978-981-15-7345-3_46.   DOI
11 U. A. Butt et al., "A review of machine learning algorithms for cloud computing security," Electronics (Switzerland). 2020, doi: 10.3390/electronics9091379.   DOI