Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

被引:0
|
作者
Gadde, Swetha [1 ]
Amutharaj, J. [2 ]
Usha, S. [1 ]
机构
[1] VTU, Rajarajeswari Coll Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[2] VTU, Rajarajeswari Coll Engn, Dept Informat Sci & Engn, Bengaluru, Karnataka, India
关键词
Cloud Computing; Cryptographic Methods; Encryption; Machine Learning Techniques; Secrecy;
D O I
10.22937/IJCSNS.2022.22.5.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.
引用
收藏
页码:342 / 347
页数:6
相关论文
共 50 条
  • [31] Security intrusion detection using quantum machine learning techniques
    Kalinin, Maxim
    Krundyshev, Vasiliy
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 125 - 136
  • [32] Enhancing Network Security using Hybrid Machine Learning Techniques
    Sirenjeevi, P.
    Dhanakoti, V.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [33] Security intrusion detection using quantum machine learning techniques
    Maxim Kalinin
    Vasiliy Krundyshev
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 125 - 136
  • [34] DASH Framework Using Machine Learning Techniques and Security Controls
    Shaheed, Aref
    Al-radwan, Haisam
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2022, 2022
  • [35] A Review of Data Security and Cryptographic Techniques in IoT based devices
    Mustafa, Ghulam
    Ashraf, Rehan
    Mirza, Muhammad Ayzed
    Jamil, Abid
    Muhammad
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [36] A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques
    Bal, Prasanta Kumar
    Mohapatra, Sudhir Kumar
    Das, Tapan Kumar
    Srinivasan, Kathiravan
    Hu, Yuh-Chung
    SENSORS, 2022, 22 (03)
  • [37] Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
    Sasikumar, K.
    Nagarajan, Sivakumar
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2025, 6 : 392 - 402
  • [38] Enhanced Security for Multi-Cloud Storage using Cryptographic Data Splitting with Dynamic Approach
    Balasaraswathi, V. R.
    Manikandan, S.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1190 - 1194
  • [39] Using machine learning techniques to combine forecasting methods
    Prudêncio, R
    Ludermir, T
    AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 1122 - 1127
  • [40] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534