CFP last date
20 January 2025
Reseach Article

Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification

by Amanpreet Singh, Manju Bala, Supreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 2
Year of Publication: 2017
Authors: Amanpreet Singh, Manju Bala, Supreet Kaur
10.5120/ijca2017913129

Amanpreet Singh, Manju Bala, Supreet Kaur . Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification. International Journal of Computer Applications. 161, 2 ( Mar 2017), 48-51. DOI=10.5120/ijca2017913129

@article{ 10.5120/ijca2017913129,
author = { Amanpreet Singh, Manju Bala, Supreet Kaur },
title = { Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 2 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 48-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number2/27124-2017913129/ },
doi = { 10.5120/ijca2017913129 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:42.511791+05:30
%A Amanpreet Singh
%A Manju Bala
%A Supreet Kaur
%T Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 2
%P 48-51
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing offers numerous benefits including scalability, availability and many services. But with its wide acceptance all over the globe, new risks and vulnerabilities have appeared too. Cloud computing supplies facility of storing and accessing understanding and programs over the web without bothering the storage space on procedure. Storing the data on cloud eliminates one’s worries about space considerations, buying new storage equipment or managing their data, rather they are able to access their data any time from any place provided they have internet access. However, the rising security issues have resisted the companies from connecting with cloud computing fully. Hence security risks have appeared as the main disadvantage of cloud computing. This paper involves the efforts to research the security risk and then proposes a framework to address these risk on the authentication and storage level in cloud computing. While addressing the security issues the first and the foremost thing is to classify what data needs security and what data needn't bother with security and hence data gets classified into two classes sensitive and non-sensitive. To achieve data classification, a data classification approach based on the confidentiality of data is proposed in this paper. Following that an efficient security mechanism must be deployed by means of encryption, authentication, and authorization or by some enhanced means of security techniques to ensure the privacy of data on cloud storage.

References
  1. H. Tianfield, “Security issues in cloud computing,” 2012 IEEE Int. Conf. Syst. Man, Cybern., pp. 1082–1089, 2012.
  2. Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011) “Collaboration- Based Cloud Computing Security Management Framework” IEEE conference of cloud computing, Washington (DC), pp. 364-371
  3. D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), vol. 1, pp. 647–651, 2012.
  4. M.-H. M. Guo, H.-T. H. Liaw, L.-L. Hsiao, C.-Y. Huang, and C.-T. Yen, “Authentication using graphical password in cloud,” 2012 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), pp. 177–181, 2012.
  5. S. M. Gurav, L. S. Gawade, P. K. Rane, and N. R. Khochare, “Graphical password authentication: Cloud securing scheme,” 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, pp. 479–483, 2014.
  6. M. F. Al-jaberi and A. Zainal, “Data Integrity and Privacy Model in Cloud Computing,”2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 280–284, 2014.
  7. R. Mukundan, S. Madria, and M. Linderman, “Efficient integrity verification of replicated data in cloud using homomorphic encryption,” Distributed and Parallel Databases, vol. 32, pp. 507–534, 2014.
  8. A. N. Kang, L. Barolli, J. H. Park, and Y.-S. Jeong, “A strengthening plan for enterprise information security based on cloud computing,” Cluster Computing, pp. 1–8, 2013.
  9. R. Mukundan, S. Madria, M. Linderman, A. N. Kang, L. Barolli, J. H. Park, Y.-S. Jeong, Y. Du, R. Zhang, M. Li, D. Chen, H. Zhao, H. Banirostam, A. Hedayati, S. K. Abd, S. a R. Al-Haddad, F. Hashim, and A. Abdullah, “Research on a security mechanism for cloud computing based on virtualization,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 4, pp. 19–24, 2013.
  10. D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), vol. 1, pp. 647–651, 2012.
  11. A. Abuhussein, H. Bedi, and S. Shiva, “Evaluating Security and Privacy in Cloud Computing Services: A Stakeholder’s Perspective,” 2012 International Conference forInternet Technology And Secured Transactions, pp. 388–395, 2012.
  12. M. Almorsy, J. Grundy, and A. S. Ibrahim, “Collaboration-based cloud computing security management framework,”4th International. Conference Cloud ComputingIEEE, pp. 364–371, 2011
  13. A. Singh and H. Singh, “An improved LSB based image steganography technique for RGB images,”2015 IEEE International Conference onElectrical, Computer and Communication Technologies (ICECCT), pp. 1–4, 2015.
  14. H. Banirostam and a Hedayati, “A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure,” UKSim 15th IEEE Int. Conf. Compuer Model. Simul., pp. 717–721, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data confidentiality Security Data Hiding Machine learning Cloudsim Datacenter Resource Data Privacy