Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

被引:0
|
作者
Gadde, Swetha [1 ]
Amutharaj, J. [2 ]
Usha, S. [1 ]
机构
[1] VTU, Rajarajeswari Coll Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[2] VTU, Rajarajeswari Coll Engn, Dept Informat Sci & Engn, Bengaluru, Karnataka, India
关键词
Cloud Computing; Cryptographic Methods; Encryption; Machine Learning Techniques; Secrecy;
D O I
10.22937/IJCSNS.2022.22.5.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.
引用
收藏
页码:342 / 347
页数:6
相关论文
共 50 条
  • [1] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [2] Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [3] Improving the Security by using Various Cryptographic Techniques in Cloud Computing
    Jain, Gaurav
    Sejwar, Vikas
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 23 - 28
  • [4] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [5] Machine learning with big data analytics for cloud security
    Mohammad, Abdul Salam
    Pradhan, Manas Ranjan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96
  • [6] Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques
    Tiwari, Pradeep Kumar
    Kannan, K.
    Veeraiah, Duggineni
    Ranjan, Nikhil
    Singh, Jain
    Alshammri, Ghalib H.
    Halifa, Awal
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] Cloud data transmission based on security and improved routing through hybrid machine learning techniques
    Qamar, Shamimul
    Amaan, Mohd
    Rahman, Mohammed Inamur
    Aqeel, Ibrahim
    Shuaib, Mohammed
    Khormi, Ibrahim Mohsen
    Alam, Shadab
    [J]. SOFT COMPUTING, 2023,
  • [8] ENHANCEMENT OF SECURITY USING CRYPTOGRAPHIC TECHNIQUES
    Saini, Natasha
    Pandey, Nitin
    Singh, Ajeet Pal
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [9] Storage Enhancement in the Cloud Using Machine Learning Technique and Novel Hash Algorithm for Cloud Data Security
    Hema, C.
    Garcia Marquez, Fausto Pedro
    [J]. PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT - VOL 1, 2022, 144 : 516 - 526
  • [10] Security Enhancement in Healthcare Cloud using Machine Learning
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 388 - 397