Enhanced Security Model in Cloud Using Neural Networks

Authors

  • Ms. A. Anto Viji  Assistant Professor, Department of Computer, Science and Engineering, CSI Institute of Technology, Tamil Nadu, India
  • Dr. J. Jasper  Professor, Department of Electrical and Electronics Engineering, Ponjesly College of Engineering, Tamil Nadu, India
  • Dr. T. Latha  Professor, Department of Electronics and Communication Engineering, St. Xavier’s Catholic College of Engineering, Tamil Nadu, India

Keywords:

Confidentiality, Neural Networks, Security, Redundancy, Fragmentation

Abstract

In order to improve redundancy elimination security is an important factor to be considered. To increase the security of cloud storages a new method of neural network based security enhancement has to be provided. Data confidentiality with sensitive data sets and provides data isolation. The dynamic fragmented component automatically extends and shrinks during insertion and deletion, respectively, and also provides explicit dynamic data support, including block update, delete, and append. The Neural Data Security model is used to encrypt and decrypt the sensitive data by using cryptography. It attains data security for public and private keys using cryptography using Neural Networks. The Data Security Model is more efficient and effective for all kinds of queries, and performance is high at the data confidentiality level. This model provides less expensive, higher performance and an expandable storage system to enhance the security.

References

  1. Eyal Zohar, Israel Cidon, and Osnat Mokryn “PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System” IEEE, 2014.
  2. B. Agarwal, A. Akella, A. Anand, A. Balachandran, P. Chitnis, C. Muthukrishnan, R. Ramjee, and G. Varghese, “Endre: An end-system redundancy elimination service for enterprises,” in NSDI, 2010, pp. 419– 432.
  3. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou “A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE, 2014.
  4. Lei Yu, Haiying Shen, Karan Sapra, Lin Ye and Zhipeng Cai “CoRE: Cooperative End-to-End TrafficRedundancy Elimination for Reducing Cloud Bandwidth Cost” IEEE, 2016.
  5. Swathi Kurunji, Tingjian Ge, Benyuan Liu, Cindy X. Chen “Communication Cost Optimization for Cloud Data Warehouse Queries” IEEE, 2012.
  6. Lluis Pamies-Juarez, Pedro Garc a-L_opez, Marc S_anchez-Artigas, Blas Herrera, “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures” Computer Networks, 2011.
  7. A. Gupta, A. Akella, S. Seshan, S. Shenker, and J. Wang, “Understanding and exploiting network traffic redundancy” UWMadison, Madison, WI, USA, Tech. Rep. 1592, Apr. 2007.
  8. Zhifeng Xiao and Yang Xiao, Senior Member, IEEE, “Security and Privacy in Cloud Computing”, IEEE 2013.
  9. S. Ihm, K. Park, and V. Pai. Wide-area Network Acceleration for the Developing World. 2010.
  10. E. Zohar, I. Cidon, and O. O. Mokryn, “The power of prediction: cloud bandwidth and cost reduction,” in ACM SIGCOMM, 2011, pp. 86–97.
  11. N. T. Spring and D. Wetherall, “A protocol-independent technique for eliminating redundant network traffic,” in ACM SIGCOMM, 2000, pp. 87–95.
  12. A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee, “Redundancy in network traffic: findings and implications,” in SIGMETRICS /Performance, 2009, pp. 37–48.
  13. L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web caching and zipf-like distributions: Evidence and implications. In IEEE Infocom, 1999.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
Ms. A. Anto Viji, Dr. J. Jasper, Dr. T. Latha, " Enhanced Security Model in Cloud Using Neural Networks, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.671-675, March-April-2021.