A NEURAL DATA SECURITY MODEL: ENSURE HIGH CONFIDENTIALITY AND SECURITY IN CLOUD DATA STORAGE ENVIRONMENT

被引:0
作者
Jegadeeswari, S. [1 ]
Dinadayalan, P. [2 ]
Gnanambigai, N. [3 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
[2] Mahatma Gandhi Govt Arts Coll, Dept Comp Sci, Mahe, India
[3] Indira Gandhi Coll Arts & Sci, Dept Comp Sci, Pondicherry, India
来源
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2015年
关键词
Cloud Computing; Confidentiality; RSA; Data security; Neural Network; Feedback Neural Network;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a computing paradigm which provides a dynamic environment for end users to guarantee Quality of Service (QoS) on data towards confidentiality on the out sourced data. Confidentiality is about accessing a set of information from a cloud database with a high security leveL This research proposes a new cloud data security model, A Neural Data Security Model to ensure high confidentiality and security in cloud data storage environment for achieving data confidentiality in the cloud database platform. This cloud Neural Data Security Model comprises Dynamic Hashing Fragmented Component and Feedback Neural Data Security Component. The data security component deals with data encryption for sensitive data using the RSA algorithm to increase the confidentiality level. The fragmented sensitive data is stored in dynamic hashing. The Feedback Neural Data Security Component is used to encrypt and decrypt the sensitive data by using Feedback Neural Network. This Feedback Neural Network is deployed using the RSA security algorithm. This work is efficient and effective for all kinds of queries requested by the user. The performance of this work is better than the conventional cloud data security models as it achieve a high data confidentiality leveL
引用
收藏
页码:400 / 406
页数:7
相关论文
共 18 条
[1]   Towards Trustworthy Resource Scheduling in Clouds [J].
Abbadi, Imad M. ;
Ruan, Anbang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :973-984
[2]  
Aggarwal G., 2005, CIDR 2005
[3]  
Anjanadevi S., 2014, Netw. Commun. Eng., V6, P124
[4]  
Arora Priyanka, 2012, INT C EM TRENDS ENG, P23
[5]   TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality [J].
Bajaj, Sumeet ;
Sion, Radu .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) :752-765
[6]  
Bonde Shaikh Akib, 2014, INT J EMERGING TECHN, V4
[7]  
Ciriani, 2013, ACM T INF SYST SECUR, V22
[8]  
Ciriani V, 2007, LECT NOTES COMPUT SC, V4734, P171
[9]  
Ciriani V, 2011, LECT NOTES COMPUT SC, V6818, P44, DOI 10.1007/978-3-642-22348-8_6
[10]   Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases [J].
Ciriani, Valentina ;
di Vimercati, Sabrina De Capitani ;
Foresti, Sara ;
Jajodia, Sushi ;
Paraboschi, Stefano ;
Samarati, Pierangela .
2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2009, :32-+