Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment

被引:2
|
作者
Suganya, M. [1 ]
Sasipraba, T. [2 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Sathyabama Inst Sci & Technol, Chennai, Tamil Nadu, India
关键词
Spatial data; Cloud computing; Cryptosystem; Cipher texts; Multi authority; Data correctness; CRYPTOSYSTEM;
D O I
10.1186/s13677-023-00442-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing rise of distributed system technologies, one of the most pressing problems facing the digital world is ensuring the security of sensitive and confidential data during transport and storage, which is also regarded as one of the most critical difficulties facing cloud computing. Numerous techniques exist for enhancing data security in the cloud computing storage environment. Encryption is the most important method of data protection. Consequently, several accessible encryption strategies are utilized to provide security, integrity, and authorized access by employing modern cryptographic algorithms. Cloud computing is an innovative paradigm widely accepted as a platform for storing and analysing user data. The cloud is accessible via the internet, exposing the data to external and internal threats. Cloud Service Providers (CSPs) must now implement a secure architecture to detect cloud intrusions and safeguard client data from hackers and attackers. This paper combines Stochastic Gradient Descent long short-term memory (SGD-LSTM) and Blow Fish encryption to detect and prevent unauthorized cloud access. User registration, intrusion detection, and intrusion prevention are the three phases of the planned system. The SGD-LSTM classifier predicts cloud data access and prevents unauthorized cloud access. In the data access phase, cloud data access is managed by authenticating the authorized user with the Blowfish encryption algorithm. Comparing the proposed classifier to existing classifiers demonstrates that it detects abnormal access accurately. The experimental outcomes enhanced data security, which can be utilized to protect cloud computing applications. The experimental results of the suggested SGD-LSTM algorithm indicated a high level of protection, as well as a considerable improvement in security and execution speed when compared to algorithms that are often used in cloud computing.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A Novel IRIS Based Data Storage and Retrieval in Cloud Environment (IBDS)
    Srinath, Shreyas
    Pal, Ankita
    Deepak, G.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [42] Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment
    Madni, Syed Hamid Hussain
    Abd Latiff, Muhammad Shafie
    Abdulhamid, Shafi'i Muhammad
    Ali, Javed
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01): : 301 - 334
  • [43] Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment
    Syed Hamid Hussain Madni
    Muhammad Shafie Abd Latiff
    Shafi’i Muhammad Abdulhamid
    Javed Ali
    Cluster Computing, 2019, 22 : 301 - 334
  • [44] Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments
    Awadh W.A.
    Hashim M.S.
    Alasady A.S.
    Informatica (Slovenia), 2024, 48 (06): : 173 - 184
  • [45] A CSO-based approach for secure data replication in cloud computing environment
    N. Mansouri
    M. M. Javidi
    B. Mohammad Hasani Zade
    The Journal of Supercomputing, 2021, 77 : 5882 - 5933
  • [46] A CSO-based approach for secure data replication in cloud computing environment
    Mansouri, N.
    Javidi, M. M.
    Mohammad Hasani Zade, B.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (06): : 5882 - 5933
  • [47] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [48] Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud
    Morales-Sandoval, Miguel
    Cabello, Melissa Hinojosa
    Marin-Castro, Heidy Marisol
    Compean, Jose Luis Gonzalez
    IEEE ACCESS, 2020, 8 (170101-170116) : 170101 - 170116
  • [49] Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    FU Jingyi
    NIU Xinxin
    Chinese Journal of Electronics, 2014, 23 (03) : 557 - 563
  • [50] Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (03) : 557 - 563