Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July-September 2023, Volume 38 Issue 4
    Article

    OPTIMIZING ENCRYPTION ALGORITHMS THROUGH DATA CLASSIFICATION TECHNIQUES
    Dr. Neelima Guntupalli1, Dr.Vasantha Rudramalla 2, Medida Anupama 3, Dr Bhashyam Krishna Mohan4, Dr. Naga Malleswara Rao Purimetla5
    Journal of Data Acquisition and Processing, 2023, 38 (4): 1265-1278 . 

    Abstract

    Abstract: Cloud computing and Machine learning are the widely used technologies that are grabbing the attention of every user of technology. The cloud users are under constant threat of losing crucial data to the unauthorized users. With the advent of machine learning, learning based approaches like supervised and unsupervised are becoming more popular in building security framework for clouds. Machine learning algorithms used for the purpose of security are trained with the datasets and they are tested with different datasets. For this part of research work we have used comprehensive datasets to provide robustness to the models. Confidentiality and Integrity are the two major concerns of data security. In this paper we have compared five supervised machine learning algorithms to classify the data before providing data confidentiality. Logistic Regression, Decision Tree, Random Forests, Extra Trees, KNN are the five ML algorithms that are applied on the data sets to classify the data. Data is classified as critical or non critical in order to reduce the computational time for data encryption. Not all the data is encrypted but only the critical data which means to be secured should be converted to cipher. To increase security of the data and reduce computational complexity of the security framework, our work focuses on using ML algorithms for data classification.

    Keyword

    Logistic Regression, Decision Tree, Random Forests, Extra Trees, KNN, AES


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved
.