Enhanced Security in Cloud Computing Using Neural Network and Encryption

被引:5
|
作者
Sana, Muhammad Usman [1 ]
Li, Zhanli [1 ]
Javaid, Fawad [2 ]
Bin Liaqat, Hannan [3 ]
Ali, Muhammad Usman [4 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Shaanxi, Peoples R China
[2] Xian Univ Sci & Technol, Dept Commun & Informat Engn, Xian 710054, Shaanxi, Peoples R China
[3] Univ Gujrat, Dept Informat Technol, Gujrat 50700, Punjab, Pakistan
[4] Univ Gujrat, Dept Comp Sci, Gujrat 50700, Punjab, Pakistan
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Cloud computing; Computational modeling; Data privacy; Biological neural networks; Privacy; Data models; Tools; Ciphertext; cloud computing; homomorphic encryption; matrix operation-based randomization and encipherment; neural network; CLASSIFICATION; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2021.3122938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast advancement in cloud computing, progressively more users store their applications and data on the cloud. Cloud computing has lots of features, e.g. virtualization, multi-user, efficiency, cost savings, and most importantly security. Machine learning approaches based on neural networks are being widely applied in cloud infrastructure when training is performed however this may produce possible privacy and security risk as direct access to raw data is required. To address this problem, we propose a new security design using Artificial Neural Networks (ANN) and encryption to confirm a safe communication system in the cloud environment, by letting the third parties access the data in an encrypted form for processing without disclosing the data of the provider party to secure important information. In this paper, to train neural networks using encrypted data we considered the Matrix Operation-based Randomization and Encipherment (MORE) technique, based on Fully Homomorphic Encryption (FHE). This technique allows the computations to be performed directly on floating-point data within a neural network with a minor computational overhead. We examined the speech and voice recognition problem and the performance of the proposed method has been validated in MATLAB simulation. Results showed that applying neural network training with MORE offers improved accuracy, runtime, and performance. These results highlight the potential of the proposed method to protect privacy and provide high accuracy in a reasonable amount of time when compared to other state-of-the-art techniques.
引用
收藏
页码:145785 / 145799
页数:15
相关论文
共 50 条
  • [31] Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System
    Shahzadi, Shumaila
    Khaliq, Bushra
    Rizwan, Muhammad
    Ahmad, Fahad
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [32] Cloud Security Implementation using Homomorphic Encryption
    Syafalni, Infall
    Fadhli, Hamdani
    Utami, Wuri
    Dharma, Gede Satya Adi
    Mulyawan, Rahmat
    Sutisna, Nana
    Adiono, Trio
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2020, : 341 - 345
  • [33] Network Virtualization System for Security in Cloud Computing
    Ashalatha, R.
    Agarkhed, Jayashree
    Patil, Siddarama
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 346 - 350
  • [34] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [35] Security Enhanced Sentence Similarity Computing Model Based on Convolutional Neural Network
    Sun, Qifeng
    Huang, Xingzhe
    Kibalya, Godfrey
    Kumar, Neeraj
    Kumar, Santhosh S. V. N.
    Zhang, Peiying
    Xie, Dongliang
    IEEE ACCESS, 2021, 9 (09): : 104183 - 104196
  • [36] Security on mobile cloud computing using cipher text policy and attribute based encryption scheme
    Swetha M.
    Latha M.
    Materials Today: Proceedings, 2023, 80 : 3059 - 3063
  • [38] Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing
    Dogan, Demet Cidem
    Altindis, Huseyin
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2020, 26 (01) : 78 - 83
  • [39] Enhanced Data Storage Security in Cloud Environment using Encryption, Compression and Splitting technique
    Rani, Kajal
    Sagar, Raj Kumar
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 366 - 370
  • [40] Enhanced Encryption and Decryption Gateway Model for Cloud Data Security in Cloud Storage
    Boopathy, D.
    Sundaresan, M.
    EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 415 - 421