Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment

被引:3
作者
Suganya, M. [1 ]
Sasipraba, T. [2 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Sathyabama Inst Sci & Technol, Chennai, Tamil Nadu, India
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2023年 / 12卷 / 01期
关键词
Spatial data; Cloud computing; Cryptosystem; Cipher texts; Multi authority; Data correctness; CRYPTOSYSTEM;
D O I
10.1186/s13677-023-00442-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing rise of distributed system technologies, one of the most pressing problems facing the digital world is ensuring the security of sensitive and confidential data during transport and storage, which is also regarded as one of the most critical difficulties facing cloud computing. Numerous techniques exist for enhancing data security in the cloud computing storage environment. Encryption is the most important method of data protection. Consequently, several accessible encryption strategies are utilized to provide security, integrity, and authorized access by employing modern cryptographic algorithms. Cloud computing is an innovative paradigm widely accepted as a platform for storing and analysing user data. The cloud is accessible via the internet, exposing the data to external and internal threats. Cloud Service Providers (CSPs) must now implement a secure architecture to detect cloud intrusions and safeguard client data from hackers and attackers. This paper combines Stochastic Gradient Descent long short-term memory (SGD-LSTM) and Blow Fish encryption to detect and prevent unauthorized cloud access. User registration, intrusion detection, and intrusion prevention are the three phases of the planned system. The SGD-LSTM classifier predicts cloud data access and prevents unauthorized cloud access. In the data access phase, cloud data access is managed by authenticating the authorized user with the Blowfish encryption algorithm. Comparing the proposed classifier to existing classifiers demonstrates that it detects abnormal access accurately. The experimental outcomes enhanced data security, which can be utilized to protect cloud computing applications. The experimental results of the suggested SGD-LSTM algorithm indicated a high level of protection, as well as a considerable improvement in security and execution speed when compared to algorithms that are often used in cloud computing.
引用
收藏
页数:17
相关论文
共 35 条
  • [1] Aieh A., 2015, DEOXYRIBONUCLEIC ACI, DOI [10.1109/C3IT.2015.7060130, DOI 10.1109/C3IT.2015.7060130]
  • [2] Machine Learning-Based Models for Early Stage Detection of Autism Spectrum Disorders
    Akter, Tania
    Satu, Md Shahriare
    Khan, Md Imran
    Ali, Mohammad Hanif
    Uddin, Shahadat
    Lio, Pietro
    Quinn, Julian M. W.
    Moni, Mohammad Ali
    [J]. IEEE ACCESS, 2019, 7 : 166509 - 166527
  • [3] Machine learning to reveal an astute risk predictive framework for Gynecologic Cancer and its impact on women psychology: Bangladeshi perspective
    Asaduzzaman, Sayed
    Ahmed, Md. Raihan
    Rehana, Hasin
    Chakraborty, Setu
    Islam, Md. Shariful
    Bhuiyan, Touhid
    [J]. BMC BIOINFORMATICS, 2021, 22 (01)
  • [4] Chunka C., 2019, NOVEL APPROACH GENER, DOI [10.1007/978-981-13-1951-8_64, DOI 10.1007/978-981-13-1951-8_64]
  • [5] Groom F.M., 2018, BASICS CLOUD COMPUTI
  • [6] An extension of fuzzy TOPSIS for a group decision making with an application to tehran stock exchange
    Hatami-Marbini, Adel
    Kangi, Fatemeh
    [J]. APPLIED SOFT COMPUTING, 2017, 52 : 1084 - 1097
  • [7] A Retrieval Algorithm of Encrypted Speech based on Syllable-level Perceptual Hashing
    He, Shaofang
    Zhao, Huan
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 703 - 718
  • [8] DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation
    Kalsi, Shruti
    Kaur, Harleen
    Chang, Victor
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (01)
  • [9] Approaches and challenges of privacy preserving search over encrypted data
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    [J]. INFORMATION SYSTEMS, 2019, 81 : 63 - 81
  • [10] A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Xu, Zhoubo
    Liu, Yining
    Qian, Junyan
    [J]. IEEE ACCESS, 2017, 5 : 1137 - 1145