Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

被引:0
|
作者
Gadde, Swetha [1 ]
Amutharaj, J. [2 ]
Usha, S. [1 ]
机构
[1] VTU, Rajarajeswari Coll Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[2] VTU, Rajarajeswari Coll Engn, Dept Informat Sci & Engn, Bengaluru, Karnataka, India
关键词
Cloud Computing; Cryptographic Methods; Encryption; Machine Learning Techniques; Secrecy;
D O I
10.22937/IJCSNS.2022.22.5.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.
引用
收藏
页码:342 / 347
页数:6
相关论文
共 50 条
  • [41] The Recent Trends, Techniques and Methods of Cloud Security
    Yadav, Ravinder
    Kilaru, Aravind
    Kumari, Shambhavi
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 594 - 601
  • [42] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694
  • [43] Document Security in Cloud Environment Using A Novel Cryptographic Approach
    Darokar, Anagha
    Chatur, P. N.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 691 - 694
  • [44] Advanced privacy protection (APP) machine learning model using cryptographic techniques for IoT
    Senthil, K.
    Karthikeyan, R.
    Priya, S. Shanmuga
    Monikaa, R.
    Ramamoorthi, S.
    Hussain, S. Faizal Mukthar
    DISCOVER APPLIED SCIENCES, 2025, 7 (03)
  • [45] Protection Methods for Cloud Data Security
    Shen J.
    Zhou T.
    Cao Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2079 - 2098
  • [46] Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024, 24 (01)
  • [47] CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Raso, Emanuele
    Naldi, Maurizio
    Bianchi, Giuseppe
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 361 - 368
  • [48] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    CYBERNETICS AND SYSTEMS, 2023,
  • [49] Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
    Rahul, B.
    Kuppusamy, K.
    IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 6053 - 6064
  • [50] Modelling cryptographic distinguishers using machine learning
    Carlo Brunetta
    Pablo Picazo-Sanchez
    Journal of Cryptographic Engineering, 2022, 12 : 123 - 135