Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning

被引:7
作者
Bokhari, Mohammad Ubaidullah [1 ]
Shallal, Qahtan Makki [1 ]
Tamandani, Yahya Kord [2 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh, Uttar Pradesh, India
[2] Univ Sistan & Baluchestan, Dept Comp Sci, Zahedan, Iran
关键词
AES algorithm; Cloud computing; HMAC algorithm; K-NN learning machine; RSA algorithm; AUTHENTICATION;
D O I
10.1080/03772063.2017.1419835
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing allows the users to store their data in its storage and use them whenever they need. While the data of user is traveling outside its physical infrastructure through Internet, it needs to use a very strong encryption to protect them against the hackers who attempt to steal or alter the data. Thus, the data security in transmission is so important. Most of the users send the data to cloud, but all the data do not have a high sensitivity. In this paper, K nearest neighbors algorithm is used to decide whether the data is normal sensitive or high sensitive, and then according to the level of sensitivity we proposed a framework to do data encryption. In order to ensure user authentication, we used one time password to authenticate the user, and for the data which belong to normal sensitivity level we have applied AES (advanced encryption standard)-192 algorithm. Finally, for the data which belong to high sensitivity level, AES-256 algorithm has been applied, and RSA (Rivest-Shamir-Adleman) algorithm is used to encrypt the key of AES 256, then we use hash-based massage authentication code to be attached in the end of message to ensure integrity and authenticity of message.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 35 条
[1]  
[Anonymous], 2006, UTHSCSA DAT CLASS RE
[2]  
[Anonymous], INT C EL COMP TECHN
[3]  
Ayushi A., 2010, INT J COMPUT APP, V1, P1
[4]  
Bezem B., 2012, AUTHENTICATED UPLINK
[5]   Network Data Encryption Strategy for Cloud Computing [J].
Chang Xue-zhou .
2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, :693-697
[6]   A survey of mobile cloud computing: architecture, applications, and approaches [J].
Dinh, Hoang T. ;
Lee, Chonho ;
Niyato, Dusit ;
Wang, Ping .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2013, 13 (18) :1587-1611
[7]  
Hamdan OA., 2010, J COMPUTING, V2, P152
[8]   Data and Information Leakage Prevention Within the Scope of Information Security [J].
Hauer, Barbara .
IEEE ACCESS, 2015, 3 :2554-2565
[9]  
Hirani S., 2003, Energy Consumption of Encryption Schemes in Wireless Devices
[10]  
Jeeva A., 2012, International Journal of Engineering Research and Applications (IJERA), V2, P3033