Enhanced Security in Cloud Computing Using Neural Network and Encryption

被引:5
|
作者
Sana, Muhammad Usman [1 ]
Li, Zhanli [1 ]
Javaid, Fawad [2 ]
Bin Liaqat, Hannan [3 ]
Ali, Muhammad Usman [4 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Shaanxi, Peoples R China
[2] Xian Univ Sci & Technol, Dept Commun & Informat Engn, Xian 710054, Shaanxi, Peoples R China
[3] Univ Gujrat, Dept Informat Technol, Gujrat 50700, Punjab, Pakistan
[4] Univ Gujrat, Dept Comp Sci, Gujrat 50700, Punjab, Pakistan
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Cloud computing; Computational modeling; Data privacy; Biological neural networks; Privacy; Data models; Tools; Ciphertext; cloud computing; homomorphic encryption; matrix operation-based randomization and encipherment; neural network; CLASSIFICATION; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2021.3122938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast advancement in cloud computing, progressively more users store their applications and data on the cloud. Cloud computing has lots of features, e.g. virtualization, multi-user, efficiency, cost savings, and most importantly security. Machine learning approaches based on neural networks are being widely applied in cloud infrastructure when training is performed however this may produce possible privacy and security risk as direct access to raw data is required. To address this problem, we propose a new security design using Artificial Neural Networks (ANN) and encryption to confirm a safe communication system in the cloud environment, by letting the third parties access the data in an encrypted form for processing without disclosing the data of the provider party to secure important information. In this paper, to train neural networks using encrypted data we considered the Matrix Operation-based Randomization and Encipherment (MORE) technique, based on Fully Homomorphic Encryption (FHE). This technique allows the computations to be performed directly on floating-point data within a neural network with a minor computational overhead. We examined the speech and voice recognition problem and the performance of the proposed method has been validated in MATLAB simulation. Results showed that applying neural network training with MORE offers improved accuracy, runtime, and performance. These results highlight the potential of the proposed method to protect privacy and provide high accuracy in a reasonable amount of time when compared to other state-of-the-art techniques.
引用
收藏
页码:145785 / 145799
页数:15
相关论文
共 50 条
  • [41] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [42] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [43] Enhanced Cloud Storage Encryption Standard for Security in Distributed Environments
    Reyana, A.
    Kautish, Sandeep
    Juneja, Sapna
    Mohiuddin, Khalid
    Karim, Faten Khalid
    Elmannai, Hela
    Ghorashi, Sara
    Hamid, Yasir
    ELECTRONICS, 2023, 12 (03)
  • [44] An enhanced encryption-based security framework in the CPS Cloud
    Priyadarshini, R.
    Quadir, Abdul Md
    Rajendran, N.
    Neelanarayanan, V
    Sabireen, H.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [45] An enhanced encryption-based security framework in the CPS Cloud
    R. Priyadarshini
    Abdul Quadir Md
    N. Rajendran
    V. Neelanarayanan
    H. Sabireen
    Journal of Cloud Computing, 11
  • [46] Oblivious Neural Network Computing via Homomorphic Encryption
    Orlandi, C.
    Piva, A.
    Barni, M.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):
  • [47] Optimal urban competitiveness assessment using cloud computing and neural network
    Hu, Rong
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [48] Optimal urban competitiveness assessment using cloud computing and neural network
    Rong Hu
    Journal of Cloud Computing, 12
  • [49] Security-Enhanced vTPM 2.0 for Cloud Computing
    Wang, Juan
    Xiao, Feng
    Huang, Jianwei
    Zha, Daochen
    Fan, Chengyang
    Hu, Wei
    Zhang, Huanguo
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 557 - 569
  • [50] An Adaptive Cloud Communication Network Using VSAT with Enhanced Security Implementation
    Bose, Rajesh
    Sahana, Sudipta
    Sarddar, Debabrata
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 117 - 125