Enhanced Security Model in Cloud Using Neural Networks
Keywords:
Confidentiality, Neural Networks, Security, Redundancy, FragmentationAbstract
In order to improve redundancy elimination security is an important factor to be considered. To increase the security of cloud storages a new method of neural network based security enhancement has to be provided. Data confidentiality with sensitive data sets and provides data isolation. The dynamic fragmented component automatically extends and shrinks during insertion and deletion, respectively, and also provides explicit dynamic data support, including block update, delete, and append. The Neural Data Security model is used to encrypt and decrypt the sensitive data by using cryptography. It attains data security for public and private keys using cryptography using Neural Networks. The Data Security Model is more efficient and effective for all kinds of queries, and performance is high at the data confidentiality level. This model provides less expensive, higher performance and an expandable storage system to enhance the security.
References
- Eyal Zohar, Israel Cidon, and Osnat Mokryn “PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System” IEEE, 2014.
- B. Agarwal, A. Akella, A. Anand, A. Balachandran, P. Chitnis, C. Muthukrishnan, R. Ramjee, and G. Varghese, “Endre: An end-system redundancy elimination service for enterprises,” in NSDI, 2010, pp. 419– 432.
- Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou “A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE, 2014.
- Lei Yu, Haiying Shen, Karan Sapra, Lin Ye and Zhipeng Cai “CoRE: Cooperative End-to-End TrafficRedundancy Elimination for Reducing Cloud Bandwidth Cost” IEEE, 2016.
- Swathi Kurunji, Tingjian Ge, Benyuan Liu, Cindy X. Chen “Communication Cost Optimization for Cloud Data Warehouse Queries” IEEE, 2012.
- Lluis Pamies-Juarez, Pedro Garc a-L_opez, Marc S_anchez-Artigas, Blas Herrera, “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures” Computer Networks, 2011.
- A. Gupta, A. Akella, S. Seshan, S. Shenker, and J. Wang, “Understanding and exploiting network traffic redundancy” UWMadison, Madison, WI, USA, Tech. Rep. 1592, Apr. 2007.
- Zhifeng Xiao and Yang Xiao, Senior Member, IEEE, “Security and Privacy in Cloud Computing”, IEEE 2013.
- S. Ihm, K. Park, and V. Pai. Wide-area Network Acceleration for the Developing World. 2010.
- E. Zohar, I. Cidon, and O. O. Mokryn, “The power of prediction: cloud bandwidth and cost reduction,” in ACM SIGCOMM, 2011, pp. 86–97.
- N. T. Spring and D. Wetherall, “A protocol-independent technique for eliminating redundant network traffic,” in ACM SIGCOMM, 2000, pp. 87–95.
- A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee, “Redundancy in network traffic: findings and implications,” in SIGMETRICS /Performance, 2009, pp. 37–48.
- L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web caching and zipf-like distributions: Evidence and implications. In IEEE Infocom, 1999.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST
This work is licensed under a Creative Commons Attribution 4.0 International License.