Enhanced Security in Cloud Computing Using Neural Network and Encryption

被引:5
|
作者
Sana, Muhammad Usman [1 ]
Li, Zhanli [1 ]
Javaid, Fawad [2 ]
Bin Liaqat, Hannan [3 ]
Ali, Muhammad Usman [4 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Shaanxi, Peoples R China
[2] Xian Univ Sci & Technol, Dept Commun & Informat Engn, Xian 710054, Shaanxi, Peoples R China
[3] Univ Gujrat, Dept Informat Technol, Gujrat 50700, Punjab, Pakistan
[4] Univ Gujrat, Dept Comp Sci, Gujrat 50700, Punjab, Pakistan
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Cloud computing; Computational modeling; Data privacy; Biological neural networks; Privacy; Data models; Tools; Ciphertext; cloud computing; homomorphic encryption; matrix operation-based randomization and encipherment; neural network; CLASSIFICATION; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2021.3122938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast advancement in cloud computing, progressively more users store their applications and data on the cloud. Cloud computing has lots of features, e.g. virtualization, multi-user, efficiency, cost savings, and most importantly security. Machine learning approaches based on neural networks are being widely applied in cloud infrastructure when training is performed however this may produce possible privacy and security risk as direct access to raw data is required. To address this problem, we propose a new security design using Artificial Neural Networks (ANN) and encryption to confirm a safe communication system in the cloud environment, by letting the third parties access the data in an encrypted form for processing without disclosing the data of the provider party to secure important information. In this paper, to train neural networks using encrypted data we considered the Matrix Operation-based Randomization and Encipherment (MORE) technique, based on Fully Homomorphic Encryption (FHE). This technique allows the computations to be performed directly on floating-point data within a neural network with a minor computational overhead. We examined the speech and voice recognition problem and the performance of the proposed method has been validated in MATLAB simulation. Results showed that applying neural network training with MORE offers improved accuracy, runtime, and performance. These results highlight the potential of the proposed method to protect privacy and provide high accuracy in a reasonable amount of time when compared to other state-of-the-art techniques.
引用
收藏
页码:145785 / 145799
页数:15
相关论文
共 50 条
  • [1] Enhanced Security in Cloud Computing Using Neural Network and Encryption
    Sana, Muhammad Usman
    Li, Zhanli
    Javaid, Fawad
    Liaqat, Hannan Bin
    Ali, Muhammad Usman
    IEEE Access, 2021, 9 : 145785 - 145799
  • [2] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [3] 3-Multi ranked encryption with enhanced security in cloud computing
    Kim, YeEun
    Son, Junggab
    Parizi, Reza M.
    Srivastava, Gautam
    Oh, Heekuck
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) : 313 - 326
  • [4] 3-Multi ranked encryption with enhanced security in cloud computing
    YeEun Kim
    Junggab Son
    Reza MParizi
    Gautam Srivastava
    Heekuck Oh
    Digital Communications and Networks, 2023, 9 (02) : 313 - 326
  • [5] Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques
    Kaur, Ranjit
    Singh, Raminder Pal
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1227 - 1233
  • [6] Cloud Computing Security by Integrating Classical Encryption
    Goodarzi, Koorosh
    Karimi, Abbas
    MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 : 320 - 326
  • [7] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [8] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [9] On Artificial Neural Network used in Cloud Computing Security - A Survey
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2018,
  • [10] Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment
    Peng P.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)