2021
DOI: 10.1109/access.2021.3122938
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Security in Cloud Computing Using Neural Network and Encryption

Abstract: In the last five years, demand for cloud computing among businesses and individual users is increasing immensely because of numerous reasons including, improved productivity, efficiency and speed, cost savings, performance, and most importantly security. Machine learning techniques are making progress in a variety of domains of cloud computing to resolve security concerns and manage data efficiently. In cloud security, a relatively novel approach is Artificial Neural Networks (ANN). We propose a new security d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…By using (12), SC is a space complexity, SC is calculated in terms of megabytes (MB), D i is a number of data.…”
Section: Analysis Of Space Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…By using (12), SC is a space complexity, SC is calculated in terms of megabytes (MB), D i is a number of data.…”
Section: Analysis Of Space Complexitymentioning
confidence: 99%
“…An enhanced Honeypot Cryptographic Scheme was introduced in reference 11 to improve privacy Preservation while communicating or data storing in the cloud. An artificial neural network (ANN) and encryption method were performed 12 to enhance the security of communication. But, the designed method was not efficient to attain higher data confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…This research also aims to pose questions on how anonymity and encryption of data influence the application of neural networks, whether homomorphic encoding is of value not only to restore the original form of data but also to ensure that data remains confidential as it provides insightful information from the specific data set. [5] Cloud computing is widely implemented within the Information Technology sector due to such features as virtualization, scalability, cost-efficiency, and sharing on-demand. However, about data storage and transmission using cloud services, constant doubts emerge as to security.…”
Section: Introductionmentioning
confidence: 99%
“…Ciphertext cannot be understood by unauthorized persons. Converting data again into its previous form or making the understanding of encrypted information so it can be understood or read by authorized persons is termed decryption [14,15]. For information security, there are numerous encryption algorithms extensively employed.…”
Section: Introductionmentioning
confidence: 99%