Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

被引:0
|
作者
Gadde, Swetha [1 ]
Amutharaj, J. [2 ]
Usha, S. [1 ]
机构
[1] VTU, Rajarajeswari Coll Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[2] VTU, Rajarajeswari Coll Engn, Dept Informat Sci & Engn, Bengaluru, Karnataka, India
关键词
Cloud Computing; Cryptographic Methods; Encryption; Machine Learning Techniques; Secrecy;
D O I
10.22937/IJCSNS.2022.22.5.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.
引用
收藏
页码:342 / 347
页数:6
相关论文
共 50 条
  • [21] Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud
    Kanna, G. Prabu
    Vasudevan, V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3688 - 3693
  • [22] Achieving cloud security solutions through machine and non-machine learning techniques: A survey
    Shyam G.K.
    Doddi S.
    Journal of Engineering Science and Technology Review, 2019, 12 (03) : 51 - 63
  • [23] A pairing-based cryptographic approach for data security in the cloud
    Morales-Sandoval, Miguel
    Luis Gonzalez-Compean, Jose
    Diaz-Perez, Arturo
    Sosa-Sosa, Victor J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 441 - 461
  • [24] A pairing-based cryptographic approach for data security in the cloud
    Miguel Morales-Sandoval
    Jose Luis Gonzalez-Compean
    Arturo Diaz-Perez
    Victor J. Sosa-Sosa
    International Journal of Information Security, 2018, 17 : 441 - 461
  • [25] Secure File Sharing Using Cryptographic Techniques in Cloud
    Malarvizhi, M.
    Sujana, J. Angela Jennifa
    Revathi, T.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [26] Cloud Client Prediction Models Using Machine Learning Techniques
    Ajila, Samuel A.
    Bankole, Akindele A.
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 134 - 142
  • [27] Predicting Cloud Resource Provisioning using Machine Learning Techniques
    Bankole, Akindele A.
    Ajila, Samuel A.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 850 - 853
  • [28] Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile data to Cloud
    Sujithra, M.
    Padmavathi, G.
    Narayanan, Sathya
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 480 - 485
  • [29] Security Analysis of Cryptographic Algorithms: Hints from Machine Learning
    Paravisi, Mattia
    Visconti, Andrea
    Malchiodi, Dario
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2024, 2024, 2141 : 569 - 580
  • [30] Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud
    Mehrotra, Sharad
    Sharma, Shantanu
    Ullman, Jeffrey D.
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 165 - 167