Symbiotic Organisms Search Optimization based Faster RCNN for Secure Data Storage in Cloud

被引:3
作者
Jeniffer, J. Thresa [1 ]
Chandrasekar, A. [2 ]
Jothi, S. [2 ]
机构
[1] Anna Univ, St Josephs Coll Engn, Dept Informat Technol, Chennai, India
[2] St Josephs Coll Engn, Dept Comp Sci & Engn, Chennai, India
关键词
Deep learning; Intrusion detection; IoT; Machine learning; Optimal homomorphic encryption; Secure storage; ENCRYPTION; INTERNET;
D O I
10.1080/03772063.2023.2173670
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of the Internet of Things (IoT) and wearable devices, information obtained is subject to cyber attacks, making intrusion detection an essential component. The increased number of attacks on IoT devices exposes them to ongoing exploitation and data theft. Mirai, denial of Service (DoS), scan, etc are the major types of attacks conducted on IoT. Traditional attack detection algorithms have more disadvantages like lack of adaptability in all scenarios, low local minima computational complexity, etc. Thus developing a method that is suitable for all environments and has good convergence speed is taken as the motivation of this study. This paper presents a novel Symbiotic Organisms Search Algorithm (SOSA) optimized Faster region-based convolutional neural network (FRCNN) for attack detection and data type classification. The data to be stored in the cloud is analyzed whether they have restricted access, confidential, or unclassified. Depending upon the variety of data, the Optimal homomorphic encryption (OHE) approach is provided for security. The key selection process is done by an Elastic Collision Seeker Optimization Algorithm (ECSOA) which offers secure access to the data owner and prevents the data from unauthorized access. The model is optimized using the algorithm which improves the feature extraction performance. The effectiveness of the proposed model in attack detection is evaluated using two datasets namely the CSE-CIC-ID2018 dataset and the IoTID20 dataset. When compared to the existing techniques, the proposed model offers optimal performance in terms of multiclass attack detection.
引用
收藏
页码:1196 / 1208
页数:13
相关论文
共 26 条
[1]   Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment [J].
Abirami, P. ;
Bhanu, S. Vijay .
SOFT COMPUTING, 2020, 24 (24) :18927-18936
[2]  
Ananthi J.V., 2022, J INF TECHNOL-UK, V4, P95, DOI [10.36548/jitdw.2022.2.004, DOI 10.36548/JITDW.2022.2.004]
[3]   MS-Faster R-CNN: Multi-Stream Backbone for Improved Faster R-CNN Object Detection and Aerial Tracking from UAV Images [J].
Avola, Danilo ;
Cinque, Luigi ;
Diko, Anxhelo ;
Fagioli, Alessio ;
Foresti, Gian Luca ;
Mecca, Alessio ;
Pannone, Daniele ;
Piciarelli, Claudio .
REMOTE SENSING, 2021, 13 (09)
[4]   Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Yahya, Khalid ;
Kumar, Neeraj ;
Alazab, Mamoun ;
Bin Zikria, Yousaf .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
[5]  
Duan S., 2022, MATH PROBL ENG
[6]   RETRACTED: Hybrid optimization with cryptography encryption for medical image security in Internet of Things (Retracted article. See DEC, 2022) [J].
Elhoseny, Mohamed ;
Shankar, K. ;
Lakshmanaprabu, S. K. ;
Maseleno, Andino ;
Arunkumar, N. .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (15) :10979-10993
[7]   A hybrid OBL-based firefly algorithm with symbiotic organisms search algorithm for solving continuous optimization problems [J].
Goldanloo, Mina Javanmard ;
Gharehchopogh, Farhad Soleimanian .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (03) :3998-4031
[8]  
Govindarajalu M., 2021, MATER TODAY P
[9]  
Guo C., 2021, EURASIP J ADV SIG PR, V1, P1
[10]   RETRACTED: Integrative optimization with Qos using multi-level security in medical cloud (Retracted Article) [J].
Jaikumar, Vinothkumar ;
Venkatachalapathy, K. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (07) :6923-6931