A SECURE AND MANAGED CLOUD STORAGE SYSTEM USING ENCRYPTION WITH MACHINE LEARNING APPROACH
DOI:
https://doi.org/10.20319/mijst.2020.63.87101Keywords:
Cloud Computing, Cloud Storage, Security, Encryption, Similarity, ClassificationAbstract
Cloud storage platform is a promising architecture provided by the Cloud Service. However, the use of these services raises many doubts and concerns about the security, confidentiality, reliability and integrity of users' data and information. Because the cloud is based on a per-user payment model, it will take longer to retrieve the required document, which raises the financial burden, and hence affects the satisfaction level of cloud users. This is the major point, where presented research comes to play. The proposed work takes advantage of multi-layered neural network architecture for secure cloud storage system along with the involvement of encryption and similarity approaches such as Cosine Similarity algorithm while encryption check engrosses AES and DSA approaches. Simulation analysis offers a secure cloud platform using cloudsim simulator. Experimentation was performed against 700 text documents to evaluate the proposed work in terms of precision, recall, f-score and accuracy with an average accuracy of 92.48%. Simulation results had demonstrated that the designed algorithm proved to offer data storage in a cloud computing environment with high-end security. In future, the authors aim to involve some deep learning approaches to improve the text mining capabilities using cloud storage without challenging data security.
References
Abdel-Kader, R. F., El-Sherif, S. H., & Rizk, R. Y. (2020). Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing. International Journal of Electrical & Computer Engineering (2088-8708), 10. https://doi.org/10.11591/ijece.v10i3.pp3295-3306
Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage. In Fundamental Research in Electrical Engineering (pp. 723-731). Springer, Singapore. https://doi.org/10.1007/978-981-10-8672-4_54
Amoon, M. (2016). Adaptive framework for reliable cloud computing environment. IEEE Access, 4, 9469-9478. https://doi.org/10.1109/ACCESS.2016.2623633
Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 79, 461-472. https://doi.org/10.1016/j.future.2017.10.010
Deng, Z., Li, K., Li, K., & Zhou, J. (2017). A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Generation Computer Systems, 72, 208-218. https://doi.org/10.1016/j.future.2016.05.017
Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706-2716. https://doi.org/10.1109/TIFS.2016.2596138
Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., & Wernsing, J. (2016, June). Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning (pp. 201-210).
Gupta, V. K., Dutta, M., & Kumar, M. (2017, December). Frequent term based text document clustering using similarity measures: A novel approach. In 2017 Fourth International Conference on Image Information Processing (ICIIP) (pp. 1-6). IEEE. https://doi.org/10.1109/ICIIP.2017.8313704
Hassanzadeh, H., Nguyen, A., Karimi, S., & Chu, K. (2018). Transferability of artificial neural networks for clinical document classification across hospitals: A case study on abnormality detection from radiology reports. Journal of biomedical informatics, 85, 68-79. https://doi.org/10.1016/j.jbi.2018.07.017
Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28(11), 3113-3125. https://doi.org/10.1109/TKDE.2016.2580139
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch011
Khalique, A., Hussain, I., Alam, M. A., & Khan, T. A. (2020). Scalable Security Based on Data Classification Using Generalized RSA in Cloud Storage. In Proceedings of ICETIT 2019 (pp. 973-983). Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_86
Li, J., Shi, Y., & Zhang, Y. (2017). Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage. International Journal of Communication Systems, 30(1), e2942. https://doi.org/10.1002/dac.2942
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://doi.org/10.1016/j.ins.2016.09.005
Mahmood, G. S., Huang, D. J., & Jaleel, B. A. (2017). Data security protection in cloud using encryption and authentication. Journal of Computational and Theoretical Nanoscience, 14(4), 1801-1804. https://doi.org/10.1166/jctn.2017.6508
Mahmood, G. S., Huang, D. J., & Jaleel, B. A. (2019). A Secure Cloud Computing System by Using Encryption and Access Control Model. Journal of Information Processing Systems, 15(3).
Tyagi, M., Manoria, M., & Mishra, B. (2019a). A framework for data storage security with efficient computing in cloud. In International Conference on Advanced Computing Networking and Informatics (pp. 109-116). Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_13
Tyagi, M., Manoria, M., & Mishra, B. (2019b). Analysis and Implementation of AES and RSA for cloud. International Journal of Applied Engineering Research, 14(20), 3918-3923. https://doi.org/10.37622/IJAER/14.20.2019.3918-3923
Venkatesh, A., & Eastaff, M. S. (2018). A study of data storage security issues in cloud computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 8.
Yu, J., & Wang, H. (2017). Strong key-exposure resilient auditing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 12(8), 1931-1940. https://doi.org/10.1109/TIFS.2017.2695449
Zhou, L., Varadharajan, V., & Hitchens, M. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, 8(12), 1947-1960. https://doi.org/10.1109/TIFS.2013.2286456
Downloads
Published
How to Cite
Issue
Section
License
Copyright of Published Articles
Author(s) retain the article copyright and publishing rights without any restrictions.
All published work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.