Integrating Machine Learning Algorithms with an Advanced Encryption Scheme: Enhancing Data Security and Privacy
Keywords:
Cloud Computing, Fog Computing, DES Algorithm, 3DES Algorithm, AES Algorithm, EncryptionAbstract
Distributed computing is considered one of the most thrilling innovations considering its adaptability and versatility. The fundamental issue that happens in the cloud is security. To conquer the threats to security, another technique called Fog computing is developed. The concerns about privacy and security have become increasingly prominent in Fog, including data analysis and cryptography. One approach that has gained attention is the combination of logistic regression, a popular machine-learning technique, with cryptographic algorithms. This integration offers a powerful solution that addresses both privacy and security challenges. This paper explores the rationale behind the combination of logistic regression and cryptographic algorithms, highlighting their benefits and real-world applications. Here the hybrid combination of the (ECC+AES) algorithm and the application of logistic regression is applied to the data for security and the system's performance is measured in terms of encryption/ decryption time, and avalanche effect. The datasets of various kinds are thought of and applied the encryption method over those datasets, whole information over datasets is by and large precisely encoded and decoded back also. Subsequently, both best and worst-case scenarios among the datasets were analyzed, thus evaluating the suitability of the proposed model in a Fog environment.
Downloads
References
.Lee and K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Business Horizons, vol. 58, no. 4, pp. 431–440, (2015).
J. Ahamed and A. V. Rajan, “Internet of Things (IoT): Application systems and security vulnerabilities,” in Proc. 2016 5th Int. Conf. on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, pp. 1–5, (2016).
S. Wang, Y. Hou, F. Gao, and X. Ji, “A novel IoT access architecture for vehicle monitoring system,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 639–642, Reston, VA, USA, (2016).
Tekeoglu and A. S. Tosun, “An experimental framework for investigating security and privacy of IoT devices,” in Proc. Int. Conf. on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, Vancouver, BC, Canada, pp. 63–83, (2017).
M. Frustaci, P. Pace, G. Aloi and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, (2018).
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., Priyan, M.K.: Centralized fog computing security platform for IoT and cloud in the healthcare system. In: Fog computing: Breakthroughs in research and practice (pp. 365–378). IGI global (2018).
Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, p. 909, (2018).
D. Puthal, S. P. Mohanty, S. A. Bhavake, G. Morgan, and R. Ranjan, “Fog computing security challenges and future directions [energy and security],” IEEE Consumer Electronics Magazine, vol. 8, no. 3, pp. 92–96, (2019).
Farjana, N., Roy, S., Mahi, M.J.N., Whaiduzzaman, M.: An identity-based encryption scheme for data security in fog computing. In: Proceedings of International Joint Conference on computational intelligence (pp. 215–226). Springer, Singapore (2020).
Whaiduzzaman, M.: An identity-based encryption scheme for data security in fog computing. In: Proceedings of International Joint Conference on computational intelligence (pp. 215–226). Springer, Singapore (2020)
Zhou, C., Fu, A., Yu, S., Yang, W., Wang, H., Zhang, Y.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. 7(11), 10782–10793 (2020).
Manogaran, G., et al.: Machine learning assisted information management scheme in service concentrated IoT. IEEE Trans. Ind. Inf. 17(4), 2871–2879 (2020).
Hameed, A.R., ul-Islam, S., Ahmad, I., Munir, K.: Energy-and performance-aware load-balancing in vehicular fog computing. Sustain. Comput. 30, 100454 (2021).
Kaviyazhiny, C., Bala, P.S., Gowri, A.S.: Fog computing perspective: technical trends, security practices, and recommendations. Smart Cyber Ecosyst. Sustain. Dev. 21, 323–351 (2021).
Hameed, A.R., ul-Islam, S., Ahmad, I., Munir, K.: Energy-and performance-aware load-balancing in vehicular fog computing. Sustain. Comput. 30, 100454 (2021).
Mengqi, Z., Xi, W., Sathishkumar, V.E., Sivakumar, V.: Machine learning techniques based on security management in smart cities using robots. Work, (Preprint), 1–12 (2021).
Alshudukhi, J.S.; Al-Mekhlafi, Z.G.; Mohammed, B.A. A Lightweight Authentication with Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography. IEEE Access 2021, 9, 15633–15642.
Supriya, Gurpreet Singh, “A study of Encryption Algorithms (RSA, DES, 3DES, and AES) for Information Security”, International Journal of Computer Applications (0975-8887), vol. 67, no.19, April 2013.
Soheila Omer AL Farooq Mohammed Koko, Dr. Amin Babiker A/Nabi Mustafa, “Comparison of Various Encryption Algorithms and Techniques for improving secured data communication”, IOSR-Journal of Computer Engineering, vol.17, issue 1, pp 62-69, January-February 2015.
Shaza D. Rihan, Ahmed Khalid, Saife Eldin F.Osman, “A Performance Comparison of Encryption Algorithms AES and DES” International Journal of Engineering Research & Technology (IJERT), vol.4, issue 12, December 2015.
Bhawna Dakhare, NileshN.Shinde, Swanand S.Salvi, Ankit H.Kadam, Pooja G.Wagh, “Performance Analysis of Data Encryption Algorithms using AES BLOWFISH and SNAP” International Journal of Engineering Science and Computing vol. 8, issue no.3, 2018.
G, M. ., Deshmukh, P. ., N. L., U. K. ., Macedo, V. D. J. ., K B, V. ., N, A. P. ., & Tiwari, A. K. . (2023). Resource Allocation Energy Efficient Algorithm for H-CRAN in 5G. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 118–126. https://doi.org/10.17762/ijritcc.v11i3s.6172
Anthony Thompson, Anthony Walker, Luis Pérez , Luis Gonzalez, Andrés González. Machine Learning-based Recommender Systems for Educational Resources. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/181
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Priyanka Rajan Kumar, Sonia Goel
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.