Integrating Machine Learning Algorithms with an Advanced Encryption Scheme: Enhancing Data Security and Privacy

Authors

  • Priyanka Rajan Kumar Department of Computer Science, Punjabi University, Patiala, Punjab, India
  • Sonia Goel Department of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, India

Keywords:

Cloud Computing, Fog Computing, DES Algorithm, 3DES Algorithm, AES Algorithm, Encryption

Abstract

Distributed computing is considered one of the most thrilling innovations considering its adaptability and versatility. The fundamental issue that happens in the cloud is security. To conquer the threats to security, another technique called Fog computing is developed. The concerns about privacy and security have become increasingly prominent in Fog, including data analysis and cryptography. One approach that has gained attention is the combination of logistic regression, a popular machine-learning technique, with cryptographic algorithms. This integration offers a powerful solution that addresses both privacy and security challenges. This paper explores the rationale behind the combination of logistic regression and cryptographic algorithms, highlighting their benefits and real-world applications. Here the hybrid combination of the (ECC+AES) algorithm and the application of logistic regression is applied to the data for security and the system's performance is measured in terms of encryption/ decryption time, and avalanche effect. The datasets of various kinds are thought of and applied the encryption method over those datasets, whole information over datasets is by and large precisely encoded and decoded back also.  Subsequently, both best and worst-case scenarios among the datasets were analyzed, thus evaluating the suitability of the proposed model in a Fog environment.

Downloads

Download data is not yet available.

References

.Lee and K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Business Horizons, vol. 58, no. 4, pp. 431–440, (2015).

J. Ahamed and A. V. Rajan, “Internet of Things (IoT): Application systems and security vulnerabilities,” in Proc. 2016 5th Int. Conf. on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, pp. 1–5, (2016).

S. Wang, Y. Hou, F. Gao, and X. Ji, “A novel IoT access architecture for vehicle monitoring system,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 639–642, Reston, VA, USA, (2016).

Tekeoglu and A. S. Tosun, “An experimental framework for investigating security and privacy of IoT devices,” in Proc. Int. Conf. on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, Vancouver, BC, Canada, pp. 63–83, (2017).

M. Frustaci, P. Pace, G. Aloi and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, (2018).

Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., Priyan, M.K.: Centralized fog computing security platform for IoT and cloud in the healthcare system. In: Fog computing: Breakthroughs in research and practice (pp. 365–378). IGI global (2018).

Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, p. 909, (2018).

D. Puthal, S. P. Mohanty, S. A. Bhavake, G. Morgan, and R. Ranjan, “Fog computing security challenges and future directions [energy and security],” IEEE Consumer Electronics Magazine, vol. 8, no. 3, pp. 92–96, (2019).

Farjana, N., Roy, S., Mahi, M.J.N., Whaiduzzaman, M.: An identity-based encryption scheme for data security in fog computing. In: Proceedings of International Joint Conference on computational intelligence (pp. 215–226). Springer, Singapore (2020).

Whaiduzzaman, M.: An identity-based encryption scheme for data security in fog computing. In: Proceedings of International Joint Conference on computational intelligence (pp. 215–226). Springer, Singapore (2020)

Zhou, C., Fu, A., Yu, S., Yang, W., Wang, H., Zhang, Y.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. 7(11), 10782–10793 (2020).

Manogaran, G., et al.: Machine learning assisted information management scheme in service concentrated IoT. IEEE Trans. Ind. Inf. 17(4), 2871–2879 (2020).

Hameed, A.R., ul-Islam, S., Ahmad, I., Munir, K.: Energy-and performance-aware load-balancing in vehicular fog computing. Sustain. Comput. 30, 100454 (2021).

Kaviyazhiny, C., Bala, P.S., Gowri, A.S.: Fog computing perspective: technical trends, security practices, and recommendations. Smart Cyber Ecosyst. Sustain. Dev. 21, 323–351 (2021).

Hameed, A.R., ul-Islam, S., Ahmad, I., Munir, K.: Energy-and performance-aware load-balancing in vehicular fog computing. Sustain. Comput. 30, 100454 (2021).

Mengqi, Z., Xi, W., Sathishkumar, V.E., Sivakumar, V.: Machine learning techniques based on security management in smart cities using robots. Work, (Preprint), 1–12 (2021).

Alshudukhi, J.S.; Al-Mekhlafi, Z.G.; Mohammed, B.A. A Lightweight Authentication with Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography. IEEE Access 2021, 9, 15633–15642.

Supriya, Gurpreet Singh, “A study of Encryption Algorithms (RSA, DES, 3DES, and AES) for Information Security”, International Journal of Computer Applications (0975-8887), vol. 67, no.19, April 2013.

Soheila Omer AL Farooq Mohammed Koko, Dr. Amin Babiker A/Nabi Mustafa, “Comparison of Various Encryption Algorithms and Techniques for improving secured data communication”, IOSR-Journal of Computer Engineering, vol.17, issue 1, pp 62-69, January-February 2015.

Shaza D. Rihan, Ahmed Khalid, Saife Eldin F.Osman, “A Performance Comparison of Encryption Algorithms AES and DES” International Journal of Engineering Research & Technology (IJERT), vol.4, issue 12, December 2015.

Bhawna Dakhare, NileshN.Shinde, Swanand S.Salvi, Ankit H.Kadam, Pooja G.Wagh, “Performance Analysis of Data Encryption Algorithms using AES BLOWFISH and SNAP” International Journal of Engineering Science and Computing vol. 8, issue no.3, 2018.

G, M. ., Deshmukh, P. ., N. L., U. K. ., Macedo, V. D. J. ., K B, V. ., N, A. P. ., & Tiwari, A. K. . (2023). Resource Allocation Energy Efficient Algorithm for H-CRAN in 5G. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 118–126. https://doi.org/10.17762/ijritcc.v11i3s.6172

Anthony Thompson, Anthony Walker, Luis Pérez , Luis Gonzalez, Andrés González. Machine Learning-based Recommender Systems for Educational Resources. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/181

Downloads

Published

21.09.2023

How to Cite

Kumar, P. R. ., & Goel, S. . (2023). Integrating Machine Learning Algorithms with an Advanced Encryption Scheme: Enhancing Data Security and Privacy . International Journal of Intelligent Systems and Applications in Engineering, 11(4), 453–465. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3543

Issue

Section

Research Article