Cloud Data Security by Hybrid Machine Learning and Cryptosystem Approach

Authors

  • Aditya Kumar Shukla Department of Computer Engineering & Applications, GLA University, NH#2, Delhi Mathura Highway, Post Ajhai, Mathura (UP) India
  • Ashish Sharma Department of Computer Engineering & Applications, GLA University, NH#2, Delhi Mathura Highway, Post Ajhai, Mathura (UP) India

Keywords:

Cloud computing, ML in cloud, Cryptography, Security in cloud, Data privacy

Abstract

Cloud computing is a key platform for achieving secure data exchange and offering increased data storage with no additional burden. Cloud environments provide these benefits. In order to achieve greater levels of security inside a cloud environment, one of the most important aspects of cloud service provisioning is the prevention of data breaches caused by unauthorized access to personal information. There are still many security measures that have not been refined to an acceptable level. To address this issue, we provide an unique machine learning programme that use cryptographic techniques to protect data both while it is being stored in the cloud and while it is being accessed. According to the results of the study, the suggested approach has attained a sensitivity of 87.5%, an F1-score of 93.5%, and a specificity of 97.5%.

Downloads

Download data is not yet available.

References

El-Attar, Noha E., Doaa S. El-Morshedy, and Wael A. Awad. "A New Hybrid Automated Security Framework to Cloud Storage System." Cryptography 5, no. 4 (2021): 37.

Wang, Cong, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. "Toward secure and dependable storage services in cloud computing." IEEE transactions on Services Computing 5, no. 2 (2011): 220-232.

Gao, Jiechao, Haoyu Wang, and Haiying Shen. "Machine learning based workload prediction in cloud computing." In 2020 29th international conference on computer communications and networks (ICCCN), pp. 1-9. IEEE, 2020.

Udendhran, R. "New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment." Asian Journal of Computer Science and Information Technology 4, no. 12 (2014): 87-91.

Udendhran, R. "A hybrid approach to enhance data security in cloud storage." In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, pp. 1-6. 2017.

Wani, Abdul Raoof, Q. P. Rana, U. Saxena, and Nitin Pandey. "Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques." In 2019 Amity International conference on artificial intelligence (AICAI), pp. 870-875. IEEE, 2019.

Mohiuddin, Irfan, Ahmad Almogren, Majed Alrubaian, and Muhammad Al-Qurishi. "Analysis of network issues and their impact on Cloud Storage." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1-4. IEEE, 2019.

Bhagawat, V., and A. Kumar. "Survey on data security issues in cloud environment." International Journal of Innovative Research in Advanced Engineering 2, no. 1 (2015): 31-35.

Darwazeh, Nour S., Raad S. Al-Qassas, and Fahd AlDosari. "A secure cloud computing model based on data classification." Procedia Computer Science 52 (2015): 1153-1158.

Cyril, B. Rex, and DS KUMAR. "Cloud computing data security issues, challenges, architecture and methods-A survey." International Research Journal of Engineering and Technology 2, no. 4 (2015): 848-857.

Timothy, Divya Prathana, and Ajit Kumar Santra. "A hybrid cryptography algorithm for cloud computing security." In 2017 international conference on microelectronic devices, circuits and systems (ICMDCS), pp. 1-5. IEEE, 2017.

Singh, Rajesh, Anita Gehlot, Mamoon Rashid, Ritika Saxena, Shaik Vaseem Akram, Sultan S. Alshamrani, and Ahmed Saeed AlGhamdi. "Cloud server and internet of things assisted system for stress monitoring." Electronics 10, no. 24 (2021): 3133.

Goel, Gaurav, Rajeev Tiwari, Vinay Rishiwal, and Shuchi Upadhyay. "Data preservation by hash algorithm for matrix multiplication over venomous cloud." In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 210-214. IEEE, 2018.

Akhtar, Naveed, and Ajmal Mian. "Threat of adversarial attacks on deep learning in computer vision: A survey." Ieee Access 6 (2018): 14410-14430.

Rodríguez, Eva, Beatriz Otero, and Ramon Canal. "A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things." Sensors 23, no. 3 (2023): 1252.

Ma, Wentao, Tongqing Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, and Zhiping Cai. "A privacy-preserving content-based image retrieval method based on deep learning in cloud computing." Expert Systems with Applications 203 (2022): 117508.

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1-2 (2022): 158-173.

Bal, Prasanta Kumar, Sudhir Kumar Mohapatra, Tapan Kumar Das, Kathiravan Srinivasan, and Yuh-Chung Hu. "A joint resource allocation, security with efficient task scheduling in cloud computing using hybrid machine learning techniques." Sensors 22, no. 3 (2022): 1242.

Sri, V. Devi Satya, and Srikanth Vemuru. "A Framework for Uncertain Cloud Data Security and Recovery Based on Hybrid Multi-User Medical Decision Learning Patterns." International Journal of Communication Networks and Information Security 14, no. 1s (2022): 136-152.

Chen, Yange, Hequn Liu, Baocang Wang, Baljinnyam Sonompil, Yuan Ping, and Zhili Zhang. "A threshold hybrid encryption method for integrity audit without trusted center." Journal of Cloud Computing 10 (2021): 1-14.

Prabhakaran, Varun, and Ashokkumar Kulandasamy. "Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection." Neural Computing and Applications 33, no. 21 (2021): 14459-14479.

Praveena, D., and P. Rangarajan. "A machine learning application for reducing the security risks in hybrid cloud networks." Multimedia Tools and Applications 79 (2020): 5161-5173.

Yousif, Raghad Z., Shahab W. Kareem, and Shadan M. Abdalwahid. "Enhancing approach for information security in hadoop." Polytechnic Journal 10, no. 1 (2020): 81-87.

Sajay, K. R., Suvanam Sasidhar Babu, and Yellepeddi Vijayalakshmi. "Enhancing the security of cloud data using hybrid encryption algorithm." Journal of Ambient Intelligence and Humanized Computing (2019): 1-10.

Saini, Kavita, Vaibhav Agarwal, Arjun Varshney, and Anushka Gupta. "E2EE for data security for hybrid cloud services: a novel approach." In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 340-347. IEEE, 2018.

A. K. Shukla and A. Sharma, "Cloud Base Intrusion Detection System using Convolutional and Supervised Machine Learning," 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2023, pp. 1-5, doi: 10.1109/ISCON57294.2023.10112007.

A. K. Shukla and A. Sharma, "Classification and Mitigation of DDOS attacks Based on Self-Organizing Map and Support Vector Machine," 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2023, pp. 1-5, doi: 10.1109/ISCON57294.2023.10111988.

A. K. Shukla and A. Sharma, "Distributed Attacks Classification Based on Radical Basis Function and Particle Swarm Optimization In Hypervisor Layer," 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2023, pp. 1-4, doi: 10.1109/ISCON57294.2023.10112162.

Shukla, Aditya Kumar, and Ashish Sharma. "Cryptography Algorithm Using A Lightweight For Enhancing Data Security In Cloud Computing." Journal of Optoelectronics Laser 41.5 (2022): 606-624.

Manikandan, J. ., & Uppalapati, S. L. . (2023). Critical Analysis on Detection and Mitigation of Security Vulnerabilities in Virtualization Data Centers. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 238–246. https://doi.org/10.17762/ijritcc.v11i3s.6187

Carlos Silva, David Cohen, Takashi Yamamoto, Maria Petrova, Ana Costa. Ethical Considerations in Machine Learning Applications for Education. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/

Downloads

Published

27.10.2023

How to Cite

Shukla, A. K. ., & Sharma, A. . (2023). Cloud Data Security by Hybrid Machine Learning and Cryptosystem Approach. International Journal of Intelligent Systems and Applications in Engineering, 12(2s), 01–14. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3554

Issue

Section

Research Article

Most read articles by the same author(s)