CLASSIFICATION OF DATA USING MULTI-LEVEL AUTHENTICATION IN CLOUD COMPUTING
Keywords:
Cloud Computing, security issues, privacy preserving, Integrity, confidentiality, availability, graphical passwords, Data classification, Machine LearningAbstract
Cloud computing is a new class of network based computing that provides the customers with computing resources as a service over a network on their demand. Cloud computing offers scalability, availability and different services as important benefits. Privacy-preserving information in cloud permits an information owner to send its encrypted information to a cloud server. Hence, security and privacy of knowledge is that the major concern within the cloud computing. To overcome this, various security aspects has been analyzed and then a framework to mitigate security issues at the level authentication and storage level in cloud computing is proposed. Encryption is a security technique which is widely used for data security. Also, a data classification approach based on data confidentiality is proposed. and implemented. Confidentiality, Integrity and Availability are the three main concepts which are taken into consideration while proposing the work. So, basically the main aim of this research work is to enhance the authentication security, to classify the data using machine learning algorithm, To Increase the confidentiality and security of the cloud computing and at last comparing the proposed ensemble learning scheme with KNN on the basis of Classification Accuracy, Precision, Recall, Data Encryption time, Data Decryption time.
References
Stuti Srivastava,Prem Sewak Sudhish, “Security in cloud computing systems: A review of challenges and solutions for security in distributed computing environments,”2015 39th National Systems Conference (NSC), pp. 1 - 5, 2015.
Abdullah, A., Hashim, F., & Al-Haddad, S., “A review of cloud security based on cryptographic mechanisms”, IEEE, Kuala Lumpur, pp. 106-111,2014.
Shigeaki Tanimoto, Manami Hiramoto, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai (2011), “Risk Management on the Security Problem in Cloud Computing”, Chiba Institute of Technology, Japan; The University of Tokyo, Japan; Hosei University, Japan
Bokefode Jayant D., UbaleSwapnaja A., Pingale Subhash V., Karande Kailash J. and ApateSulabha S... “Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model”, International Journal of Computer Applications 118(12):46-52, May 2015.
Xuefeng Liu, Yuqing Zhang (2013), “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, National Key Laboratory of Integrated Services Networks, Xidian University, No. 2, Taibai Road, Xian city, China; National Computer Network Intrusion Protection Center, Graduate University of Chinese Academy of Sciences, No. 19, Yuquan road, Beijing, China
Frank Simorjay (2014), “Data classification ffor cloud readiness”, Microsoft Trustworthy Computing
Gaurav, S. M., Khochare, N., &Rane, P. (2014) “Graphical Password Authentication”. International Conference on signal processing systems, IEEE, Nagpur pp. 479-483.
Liu Hao and Dezhi Han, “The study and design on secure-cloud storage system”,International Conference on Electrical and Control Engineering (ICECE),pp. 5126-5129, 2011.
Chen, D., & Zhao, H., “Data Security and Privacy Protection in cloud computing.” IEEE, Hangzhou, pp. 647-651,2012.
Mohammed Faez Al-Jaberi and Anazida Zainal, “Data Integrity and Privacy Model in Cloud Computing” International Symposium on Biometrics and Security Technologies, IEEE, pp.280-284, 2014
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 International Education and Research Journal (IERJ)

This work is licensed under a Creative Commons Attribution 4.0 International License.