Enhanced ANN-Based Real-Time Secure Authentication and Data Sharing Framework for Cloud Platforms

Authors

  • Salakram Sharma, Girdhar Gopal Ladha

Keywords:

Artificial Neural Networks (ANN), Secure Authentication, Data Sharing, Cloud Computing, White-Box Cryptography, Real-Time Security

Abstract

In the evolving landscape of cloud computing, ensuring real-time secure authentication and privacy-preserving data sharing remains a critical challenge. This paper proposes a novel Artificial Neural Network (ANN)-driven framework that integrates multi-layer authentication with encrypted data exchange, tailored for leading cloud platforms such as AWS and Azure. The framework employs lightweight ANN classifiers trained on real-time user behavior datasets to perform continuous identity verification, while simultaneously securing data through white-box cryptographic primitives. Experimental results demonstrate high authentication accuracy (98.7%), low latency (1.2 ms average per transaction), and strong resilience against common attack vectors including replay and impersonation attacks. When benchmarked against traditional token-based and rule-based systems, our approach exhibits superior performance in terms of both security and computational efficiency. This work lays the foundation for deploying intelligent, responsive, and secure systems for real-time cloud-based data operations in sectors such as healthcare, finance, and government.

Downloads

Download data is not yet available.

References

J. Jiang, M. Sun, Y. He, and Z. Li, “Crop yield prediction using CNN-LSTM with attention mechanism based on remote sensing data,” Remote Sens., vol. 13, no. 4, pp. 678–695, 2021.

X. Liu, H. Zhang, and L. Yang, “Spatiotemporal crop yield prediction with CNN-GAT-LSTM fusion model,” IEEE Trans. Geosci. Remote Sens., vol. 60, pp. 1–14, 2022.

K. Zhou, L. Fang, and Y. Li, “MMST-ViT: Multi-modal spatial-temporal vision transformer for crop yield estimation,” ISPRS J. Photogramm. Remote Sens., vol. 198, pp. 114–128, 2023.

H. Chen, Q. Wang, and Y. Wu, “MT-CYP-Net: A multi-task deep learning framework for fine-grained crop yield prediction,” IEEE Access, vol. 9, pp. 104509–104520, 2021.

D. Wang, F. Liu, and Y. Zhao, “Ensemble-based pest recognition using visual and textual modalities,” Comput. Electron. Agric., vol. 193, p. 106632, 2022.

Y. Li and Z. Zhang, “Transfer learning with ensemble deep CNNs for insect pest image classification,” Appl. Sci., vol. 12, no. 1, pp. 145–157, 2022.

L. Sun, B. Huang, and R. Zhou, “Two-stream CNN with attention blocks for insect pest detection in complex backgrounds,” Agric. For. Meteorol., vol. 322, Art. no. 109015, 2023.

T. Huang, X. Wu, and L. Ma, “Lightweight YOLOv5 for real-time agricultural pest detection on edge devices,” Sensors, vol. 22, no. 17, p. 6542, 2022.

A. Kamilaris and F. X. Prenafeta-Boldú, “Deep learning in agriculture: A survey,” Comput. Electron. Agric., vol. 147, pp. 70–90, 2018.

J. You, X. Li, M. Low, D. Lobell, and S. Ermon, “Deep Gaussian process for crop yield prediction based on remote sensing data,” in Proc. AAAI Conf. Artif. Intell., 2017.

L. Zhong, L. Hu, and H. Zhou, “Deep learning-based remote sensing image classification: A review,” ISPRS J. Photogramm. Remote Sens., vol. 195, pp. 38–52, 2022.

J. G. A. Barbedo, “A review on the use of machine learning in precision agriculture,” Comput. Electron. Agric., vol. 175, p. 105593, 2020.

A. Saxena, R. Rathi, and R. Mehta, “Smart agriculture using CNN-LSTM framework for crop monitoring,” Agric. Syst., vol. 203, p. 103515, 2023.

H. Tian, Z. Li, and F. Wang, “Crop yield estimation with attention-based deep learning,” Remote Sens., vol. 14, no. 2, p. 318, 2022.

T. M. Khoshgoftaar, E. B. Allen, and J. P. Hudepohl, “Application of neural networks to software quality modeling of a very large telecommunications system,” IEEE Trans. Neural Netw., vol. 8, no. 4, pp. 902–909, Jul. 1997.

T. Menzies, J. Greenwald, and A. Frank, “Data mining static code attributes to learn defect predictors,” IEEE Trans. Softw. Eng., vol. 33, no. 1, pp. 2–13, Jan. 2007.

Y. Zhou and H. Leung, “Predicting object-oriented software maintainability using multivariate adaptive regression splines,” J. Syst. Softw., vol. 80, no. 8, pp. 1349–1361, Aug. 2007.

S. Kim, E. J. Whitehead, and Y. Zhang, “Classifying software changes: Clean or buggy?,” IEEE Trans. Softw. Eng., vol. 34, no. 2, pp. 181–196, Mar. 2008.

F. Rahman and P. Devanbu, “How, and why, process metrics are better,” in Proc. Int. Conf. Softw. Eng. (ICSE), 2013, pp. 432–441.

J. Nam and S. Kim, “CLAMI: Defect prediction on unlabeled datasets,” in Proc. IEEE/ACM Int. Conf. Automated Software Engineering (ASE), 2015, pp. 452–463.

R. Sharma and L. M. Saini, “Software defect prediction using machine learning: A survey,” in Proc. Int. Conf. Inventive Syst. Control (ICISC), 2018, pp. 777–782.

S. Wang, T. Liu, and X. Jin, “Automatically learning semantic features for defect prediction,” Inf. Softw. Technol., vol. 106, pp. 182–194, Jan. 2019.

D. Hoang, L. Chen, and C. Meinel, “A deep learning approach for detecting defects in source code,” IEEE Access, vol. 8, pp. 13468–13481, 2020.

Y. Zhang, Z. Zhang, and H. Zhao, “Software defect prediction via graph neural network using abstract syntax tree,” Neurocomputing, vol. 489, pp. 1–13, 2022.

Y. Liu and Z. He, “CodeBERT-based transfer learning for software defect prediction,” in Proc. IEEE Int. Conf. Software Quality, Reliability and Security (QRS), 2023, pp. 110–119.

D. Kocarev and S. Lian, “Chaos-based cryptography: Principles, algorithms and applications,” IEEE Trans. Circuits Syst., vol. 51, no. 6, pp. 1239–1252, Jun. 2004.

E. Biham and A. Shamir, “Differential cryptanalysis of the data encryption standard,” Springer-Verlag, Berlin, 1993.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.

T. Sultana, A. Almogren, M. A. Jan, M. Alam, and S. M. H. Almotiri, “Cryptography-based mutual authentication and key agreement scheme for cloud-IoT,” Sensors, vol. 21, no. 3, p. 752, 2021.

M. Hussain, M. A. Jan, and F. Khan, “Privacy-preserving deep learning and federated learning for healthcare systems: A survey,” Comput. Biol. Med., vol. 137, p. 104745, 2021.

A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology (CRYPTO), 1984, pp. 47–53.

Downloads

Published

24.03.2024

How to Cite

Salakram Sharma. (2024). Enhanced ANN-Based Real-Time Secure Authentication and Data Sharing Framework for Cloud Platforms. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 1054 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7758

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.