Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      02 June 2023, Volume 38 Issue 3
    Article

    INTELLIGENT DATA SECURITY FOR CLOUD COMPUTING USING PARTIAL HOMOMORPHIC ENCRYPTION
    Sindhu V, Rajeswari Mukesh
    Journal of Data Acquisition and Processing, 2023, 38 (3): 2453-2467 . 

    Abstract

    Security problems in computer networks are common nowadays due to various attacks that are initiated from outsiders and internal users. Cloud network resources are widely utilized for the benefit of customers to build their own services or products without having physical infrastructures. The massive count of cloud customers from public and private sectors is growing day by day to utilize the services. Notably, the distributed cloud networks are more convenient to manage the resources with optimal computation cost. At the same time, the customers need efficient security principles and secure cloud perimeter conditions to proceed with particular service. On the base, various research works are developed to provide appropriate distributed information security models in distributed cloud environment. Yet these research works are not significant in terms of providing content aware encryption models, data optimized confidentiality models and light weight intelligent encryption solutions. In this case, the proposed Intelligent Data Security for Cloud Computing using Partial Homomorphic Encryption (IDSHE) model is created to solve the issues. Under this proposed IDSHE model, procedures such as novel network modelling principles, data modelling principles, deduplication phases, Long Short Term Memory (LSTM) based data analysis principles and distributed and restricted homomorphic encryption algorithms are developed. The proposed model has been implemented and results are compared with crucial existing techniques. The result section shows that the proposed model overcomes the performance of exiting techniques by nearly 14% of growth rate.

    Keyword

    cloud network, security, homomorphic encryption, deduplication and LSTM.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved