We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Efficent Security Farmework Design for Cloud Computing using Artificial Neural Networks

by Anshika Negi, Mayank Singh, Sanjeev Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 4
Year of Publication: 2015
Authors: Anshika Negi, Mayank Singh, Sanjeev Kumar
10.5120/ijca2015906805

Anshika Negi, Mayank Singh, Sanjeev Kumar . An Efficent Security Farmework Design for Cloud Computing using Artificial Neural Networks. International Journal of Computer Applications. 129, 4 ( November 2015), 17-21. DOI=10.5120/ijca2015906805

@article{ 10.5120/ijca2015906805,
author = { Anshika Negi, Mayank Singh, Sanjeev Kumar },
title = { An Efficent Security Farmework Design for Cloud Computing using Artificial Neural Networks },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 4 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number4/23060-2015906805/ },
doi = { 10.5120/ijca2015906805 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:30.531638+05:30
%A Anshika Negi
%A Mayank Singh
%A Sanjeev Kumar
%T An Efficent Security Farmework Design for Cloud Computing using Artificial Neural Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 4
%P 17-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is an alluring technology which provides elasticity, scalability and cost-efficiency over a network. In recent years, Data security is considered as the measure issue leading towards a hitch in the adoption of cloud computing. Data privacy, Integrity and trust issues are few severe security concerns leading to wide adoption of cloud computing. The proposed model has sufficient functionalities and capabilities which ensures the data security and integrity. The proposed Framework focuses on the encryption and decryption approach facilitating the cloud user with data security assurance. The proposed solution only talks about the increased security but does not talk about the performance. The solution also includes the functioning of forensic virtual machine, malware detection and real time monitoring of the system. In this paper, a survey of different security issues and threats are also presented. A data security framework also provides the transparency to both the cloud service provider and the cloud user thereby reducing data security threats in cloud environment.

References
  1. D Meng, 2013. Data security in Cloud Computing, Computer Science and Education (ICCSE), 8th International conference, pp 810-813.
  2. A. Shawish and M. Salama, 2014. Cloud Computing: Paradigms and Technologies, F. Xhafa and N. Bessis (eds.), Inter-cooperative Collective Intelligence: Techniques and Applications, Studies in Computational Intelligence 495, DOI: 10.1007/9783-642-35016-0_2, Springer-Verlag Berlin Heidelberg.
  3. R. Yadav, N. Yadav, Monika and A. Seharawat, 2015. “Cloud Computing: Flowing Model in IT Services,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 3.
  4. Babcock and Charles, 2015. 9 Worst Cloud Security Threats Leading Cloud Security Group Lists the "Notorious Nine Top Threats to Cloud Computing in 2013; Most Are Already Known but Defy 100% Solution," Information Week..
  5. A.Libdeh, L. Princehouse, and H. Weatherspoon, 2010. RACS: A Case for Cloud Storage Diversity, SoCC 10:Proc. 1 First ACM Symposium on Cloud Computing, PP 209-240.
  6. S. Pearson, Y. Shen and M. Mowbray, 2009. A Privacy Manager for Cloud Computing, Cloudcom2009, LNCS 5931, PP 90-106, Springer.
  7. D.Prasad, B. R. Singh, M. Akuthota and M. Sangeetha, 2014. An Etiquette Approach for Public Audit and Preserve Data at Cloud,” International Journal of Computer Trends and Technology (IJCTT) volume 16 number.
  8. W. Itani, A. Kayssi and A. Chehab, 2009. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
  9. S. Subashini and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34(1): p. 1-11.
  10. C. Ning., et al. 2011. Privacy-preserving multi-keyword ranked search over encrypted cloud data, INFOCOM, 2011 Proceedings IEEE.
  11. B. Goswami, and Dr..S.N. Singh, 2012. Enhance security in cloud computing using public key cryptography with matrices, International Journal of Engineering Research and Applications, vol.2, issu.4, pp.339-344.
  12. S. Pearson and A. Benameur, 2010. Privacy, Security and Trust Issues Arising from Cloud Computing, 2nd IEEE International Conference on Cloud Computing Technology and Science, Cloudcom- PP 693-702.
  13. D. Chen, 2012 .Data security and Privacy Protection issues in Cloud Computing, Computer Science and Electronics Engineering (ICCSEE) International Conference, PP 647-651.
  14. D W. Chadwick and K. Fatema, 2012. A privacy preserving authorization system for the cloud, Journal of Computer and System Sciences, PP 1359-1373.
  15. C. Mont, and Pearson, 2005. An Adaptive Privacy Management System for Data Repositories, Trust, Privacy and Security in digital business, Volume 3592, pp 236-245.
  16. S. Pearson, 2009. Taking Account of Privacy when Designing Cloud Computing Services, ICSE'09 workshop, Vancouver, Canada, 978-1-4244-3713-9-09, IEEE, Page no 44-52.
  17. C.Saravanakumar and C.Arun, 2014. Survey on Interoperability, Security, Trust, Privacy Standardization of Cloud Computing, Contemporary Computing and Informatics (IC3I), pp 997-982.
  18. S. Meena, E Daniel and Dr. NA. Vasanthi, 2013. Surveyon Various Data Integrity Attacks in Cloud Environment and the Solutions, International Conference on Circuits, Power and Computing Technologies [ICCPCT], pp 1076-1081.
  19. Y. Zhu, H. Hu, G. Ahn, and M. Yu, 2012. Cooperative provable data possession for integrity verification in multi-c1oud storage, IEEE Transactions on Parallel and Distributed Systems, no. 99.
  20. A. Jaberi, 2014. M.F Data integrity and Privacy model in cloud computing, Biometrics and Security Technologies (ISBAST), PP 280-284.
  21. Sanjeev Kumar, Krishan Kumar and Anand pandey, 2014. A Comparative Study of Call Admission Control in Mobile Multimedia Networks using Soft Computing, International Journal of Computer Applications (0975 – 8887) Volume 107 – No. 16, December.
  22. Sanjeev kumar, Krishan kumar and pramod kumar, 2015.Mobility based call admission control and resource estimation in mobile multimedia networks using artificial neural networks,1st IEEE International Conference on Next Generation Computing Technologies, Dehradun
  23. Vikas sagar and krishan kumar, 2014. A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN), ACM sponsored International Conference on Information and Communication Technology for Competitive Strategies.
  24. Fi-John Chang, Yen-Chang Chen, 2001. A counter propagation fuzzy neural network modeling approach to real time stream flow prediction, journal of hydrology, ELSEVIER.
  25. Vikas Gujral, 2009. Cryptography using artificial neural network, Engineering National Institute of Technology Rourkela-769008 Orissa.
  26. Jacek M Zurada, 1992. Introduction to Artificial Neural Systems, West publishing company, St. Paul New York Los Angeles San Francisco.
Index Terms

Computer Science
Information Sciences

Keywords

Data security Privacy Integrity Trust Cloud Computing counter propagation network cryptography artificial neural network.