CLASSIFICATION OF DATA USING MULTI-LEVEL AUTHENTICATION IN CLOUD COMPUTING

Amanpreet Singh, Dr. Manju Bala, Supreet Kaur

Abstract


Cloud computing is a new class of network based computing that provides the customers with computing resources as a service over a network on their demand. Cloud computing offers scalability, availability and different services as important benefits. Privacy-preserving information in cloud permits an information owner to send its encrypted information to a cloud server. Hence, security and privacy of knowledge is that the major concern within the cloud computing. To overcome this, various security aspects has been analyzed and then a framework to mitigate security issues at the level authentication and storage level in cloud computing is proposed. Encryption is a security technique which is widely used for data security. Also, a data classification approach based on data confidentiality is proposed. and implemented. Confidentiality, Integrity and Availability are the three main concepts which are taken into consideration while proposing the work. So, basically the main aim of this research work is to enhance the authentication security, to classify the data using machine learning algorithm, To Increase the confidentiality and security of the cloud computing and at last comparing the proposed ensemble learning scheme with KNN on the basis of Classification Accuracy, Precision, Recall, Data Encryption time, Data Decryption time.

Keywords


Cloud Computing; security issues, privacy preserving, Integrity, confidentiality, availability, graphical passwords, Data classification, Machine Learning

Full Text:

PDF

References


Stuti Srivastava,Prem Sewak Sudhish, “Security in cloud computing systems: A review of challenges and solutions for security in distributed computing environments,”2015 39th National Systems Conference (NSC), pp. 1 - 5, 2015.

Abdullah, A., Hashim, F., & Al-Haddad, S., “A review of cloud security based on cryptographic mechanisms”, IEEE, Kuala Lumpur, pp. 106-111,2014.

Shigeaki Tanimoto, Manami Hiramoto, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai (2011), “Risk Management on the Security Problem in Cloud Computing”, Chiba Institute of Technology, Japan; The University of Tokyo, Japan; Hosei University, Japan

Bokefode Jayant D., UbaleSwapnaja A., Pingale Subhash V., Karande Kailash J. and ApateSulabha S... “Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model”, International Journal of Computer Applications 118(12):46-52, May 2015.

Xuefeng Liu, Yuqing Zhang (2013), “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, National Key Laboratory of Integrated Services Networks, Xidian University, No. 2, Taibai Road, Xian city, China; National Computer Network Intrusion Protection Center, Graduate University of Chinese Academy of Sciences, No. 19, Yuquan road, Beijing, China

Frank Simorjay (2014), “Data classification ffor cloud readiness”, Microsoft Trustworthy Computing

Gaurav, S. M., Khochare, N., &Rane, P. (2014) “Graphical Password Authentication”. International Conference on signal processing systems, IEEE, Nagpur pp. 479-483.

Liu Hao and Dezhi Han, “The study and design on secure-cloud storage system”,International Conference on Electrical and Control Engineering (ICECE),pp. 5126-5129, 2011.

Chen, D., & Zhao, H., “Data Security and Privacy Protection in cloud computing.” IEEE, Hangzhou, pp. 647-651,2012.

Mohammed Faez Al-Jaberi and Anazida Zainal, “Data Integrity and Privacy Model in Cloud Computing” International Symposium on Biometrics and Security Technologies, IEEE, pp.280-284, 2014


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2017 INTERNATIONAL EDUCATION AND RESEARCH JOURNAL