Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment

被引:12
作者
Abirami, P. [1 ]
Bhanu, S. Vijay [1 ]
机构
[1] Annamalai Univ, Dept Comp Sci & Engn, Chidambaram, India
关键词
Cloud; Security; Linear algebraic equation; Neural network;
D O I
10.1007/s00500-020-05122-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The users in communication interact over cloud for data exchange. The participants are in various levels, and their expectation varies on the nature of interactions. Though building a common platform for interactions over cloud environment is difficult, there is scope for developing security solutions that can ensure confidentiality of data exchange. In the proposed model distributed secure outsourcing scheme is enhanced using crypto-deep neural network. The proposed model has cloud server, web server, data center and cloud agent. The model mainly targets in handling impersonation attack using crypto-deep neural network cloud security (CDNNCS). The proposed framework is suitable for enhancing the level of trust among cloud users in comparison to secure linear algebraic equation scheme. The performance has been presented in terms of parameters namely Delay, Jitter, Throughput and Goodput. From the results it can be observed that with CDNNCS packet loss has been reduced by 10% and the response time has been increased by 5% in comparison to existing approach.
引用
收藏
页码:18927 / 18936
页数:10
相关论文
共 29 条
[1]   Performance Analysis of Load Balancing Architectures in Cloud Computing [J].
Al-Rayis, Ektemal ;
Kurdi, Heba .
UKSIM-AMSS SEVENTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2013), 2013, :520-524
[2]  
[Anonymous], 2020, HEALTHC US CAS IBM C
[3]   Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach [J].
Chen, Juntao ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2736-2750
[4]  
Currie AR, 2014, INT CONF UTIL CLOUD, P980, DOI 10.1109/UCC.2014.161
[5]   Hierarchical Agent-based Architecture for Resource Management in Cloud Data Centers [J].
Farahnakian, Fahimeh ;
Pahikkala, Tapio ;
Liljeberg, Pasi ;
Plosila, Juha .
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, :928-929
[6]   Cloud QoS Scaling by Fuzzy Logic [J].
Frey, Stefan ;
Luethje, Claudia ;
Reich, Christoph ;
Clarke, Nathan .
2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, :343-348
[7]  
Ge Junwei, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P536, DOI 10.1109/CIS.2011.124
[8]  
Hammami O, 2012, 2012 4TH ASIA SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ASQED), P277, DOI 10.1109/ACQED.2012.6320516
[9]   Federating Web-Based Applications on a Hierarchical Cloud [J].
Han, Dan ;
Stroulia, Eleni .
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, :946-947
[10]   Deep Neural Networks Classification over Encrypted Data [J].
Hesamifard, Ehsan ;
Takabi, Hassan ;
Ghasemi, Mehdi .
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, :97-108