A SECURE AND MANAGED CLOUD STORAGE SYSTEM USING ENCRYPTION WITH MACHINE LEARNING APPROACH

Authors

  • Shweta Pandey Research Scholar, Department of Computer Science & Application, Deshbhagat University Mandi, Gobindgarh, Punjab, India
  • R. K. Bathla HOD Computer Science & Application, Deshbhagat University Mandi, Gobindgarh, Punjab, India

DOI:

https://doi.org/10.20319/mijst.2020.63.87101

Keywords:

Cloud Computing, Cloud Storage, Security, Encryption, Similarity, Classification

Abstract

Cloud storage platform is a promising architecture provided by the Cloud Service. However, the use of these services raises many doubts and concerns about the security, confidentiality, reliability and integrity of users' data and information. Because the cloud is based on a per-user payment model, it will take longer to retrieve the required document, which raises the financial burden, and hence affects the satisfaction level of cloud users. This is the major point, where presented research comes to play. The proposed work takes advantage of multi-layered neural network architecture for secure cloud storage system along with the involvement of encryption and similarity approaches such as Cosine Similarity algorithm while encryption check engrosses AES and DSA approaches. Simulation analysis offers a secure cloud platform using cloudsim simulator. Experimentation was performed against 700 text documents to evaluate the proposed work in terms of precision, recall, f-score and accuracy with an average accuracy of 92.48%. Simulation results had demonstrated that the designed algorithm proved to offer data storage in a cloud computing environment with high-end security. In future, the authors aim to involve some deep learning approaches to improve the text mining capabilities using cloud storage without challenging data security.

References

Abdel-Kader, R. F., El-Sherif, S. H., & Rizk, R. Y. (2020). Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing. International Journal of Electrical & Computer Engineering (2088-8708), 10. https://doi.org/10.11591/ijece.v10i3.pp3295-3306

Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage. In Fundamental Research in Electrical Engineering (pp. 723-731). Springer, Singapore. https://doi.org/10.1007/978-981-10-8672-4_54

Amoon, M. (2016). Adaptive framework for reliable cloud computing environment. IEEE Access, 4, 9469-9478. https://doi.org/10.1109/ACCESS.2016.2623633

Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 79, 461-472. https://doi.org/10.1016/j.future.2017.10.010

Deng, Z., Li, K., Li, K., & Zhou, J. (2017). A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Generation Computer Systems, 72, 208-218. https://doi.org/10.1016/j.future.2016.05.017

Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706-2716. https://doi.org/10.1109/TIFS.2016.2596138

Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., & Wernsing, J. (2016, June). Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning (pp. 201-210).

Gupta, V. K., Dutta, M., & Kumar, M. (2017, December). Frequent term based text document clustering using similarity measures: A novel approach. In 2017 Fourth International Conference on Image Information Processing (ICIIP) (pp. 1-6). IEEE. https://doi.org/10.1109/ICIIP.2017.8313704

Hassanzadeh, H., Nguyen, A., Karimi, S., & Chu, K. (2018). Transferability of artificial neural networks for clinical document classification across hospitals: A case study on abnormality detection from radiology reports. Journal of biomedical informatics, 85, 68-79. https://doi.org/10.1016/j.jbi.2018.07.017

Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28(11), 3113-3125. https://doi.org/10.1109/TKDE.2016.2580139

Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch011

Khalique, A., Hussain, I., Alam, M. A., & Khan, T. A. (2020). Scalable Security Based on Data Classification Using Generalized RSA in Cloud Storage. In Proceedings of ICETIT 2019 (pp. 973-983). Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_86

Li, J., Shi, Y., & Zhang, Y. (2017). Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage. International Journal of Communication Systems, 30(1), e2942. https://doi.org/10.1002/dac.2942

Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://doi.org/10.1016/j.ins.2016.09.005

Mahmood, G. S., Huang, D. J., & Jaleel, B. A. (2017). Data security protection in cloud using encryption and authentication. Journal of Computational and Theoretical Nanoscience, 14(4), 1801-1804. https://doi.org/10.1166/jctn.2017.6508

Mahmood, G. S., Huang, D. J., & Jaleel, B. A. (2019). A Secure Cloud Computing System by Using Encryption and Access Control Model. Journal of Information Processing Systems, 15(3).

Tyagi, M., Manoria, M., & Mishra, B. (2019a). A framework for data storage security with efficient computing in cloud. In International Conference on Advanced Computing Networking and Informatics (pp. 109-116). Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_13

Tyagi, M., Manoria, M., & Mishra, B. (2019b). Analysis and Implementation of AES and RSA for cloud. International Journal of Applied Engineering Research, 14(20), 3918-3923. https://doi.org/10.37622/IJAER/14.20.2019.3918-3923

Venkatesh, A., & Eastaff, M. S. (2018). A study of data storage security issues in cloud computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 8.

Yu, J., & Wang, H. (2017). Strong key-exposure resilient auditing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 12(8), 1931-1940. https://doi.org/10.1109/TIFS.2017.2695449

Zhou, L., Varadharajan, V., & Hitchens, M. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, 8(12), 1947-1960. https://doi.org/10.1109/TIFS.2013.2286456

Downloads

Published

2020-12-30

How to Cite

Pandey, S., & Bathla, R. K. (2020). A SECURE AND MANAGED CLOUD STORAGE SYSTEM USING ENCRYPTION WITH MACHINE LEARNING APPROACH. MATTER: International Journal of Science and Technology, 6(3), 87–101. https://doi.org/10.20319/mijst.2020.63.87101