Cloud data security with deep maxout assisted data sanitization and restoration process

Shrikant D. Dhamdhere , M. Sivakkumar , V. Subramanian

High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (1) : 100238

PDF (1734KB)
High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (1) : 100238 DOI: 10.1016/j.hcc.2024.100238
Research Articles
research-article

Cloud data security with deep maxout assisted data sanitization and restoration process

Author information +
History +
PDF (1734KB)

Abstract

The potential of cloud computing, an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers. The fast advancements in cloud computing techniques led to the amazing arrival of cloud services. But data security is a challenging issue for modern civilization. The main issues with cloud computing are cloud security as well as effective cloud distribution over the network. Increasing the privacy of data with encryption methods is the greatest approach, which has highly progressed in recent times. In this aspect, sanitization is also the process of confidentiality of data. The goal of this work is to present a deep learning-assisted data sanitization procedure for data security. The proposed data sanitization process involves the following steps: data preprocessing, optimal key generation, deep learning-assisted key fine-tuning, and Kronecker product. Here, the data preprocessing considers original data as well as the extracted statistical feature. Key generation is the subsequent process, for which, a self-adaptive Namib beetle optimization (SANBO) algorithm is developed in this research. Among the generated keys, appropriate keys are fine-tuned by the improved Deep Maxout classifier. Then, the Kronecker product is done in the sanitization process. Reversing the sanitization procedure will yield the original data during the data restoration phase. The study part notes that the suggested data sanitization technique guarantees cloud data security against malign attacks. Also, the analysis of proposed work in terms of restoration effectiveness and key sensitivity analysis is also done.

Keywords

Adopted data sanitization / Cloud data security / Restoration / Improved deep maxout / Optimal key generation

Cite this article

Download citation ▾
Shrikant D. Dhamdhere, M. Sivakkumar, V. Subramanian. Cloud data security with deep maxout assisted data sanitization and restoration process. High-Confidence Computing, 2025, 5(1): 100238 DOI:10.1016/j.hcc.2024.100238

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Shrikant D. Dhamdhere: Writing - original draft, Conceptualization, Methodology. M. Sivakkumar: Validation, Data curation, Investigation. V. Subramanian: Supervision.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

B. Liang, X. Dong, Y. Wang, X. Zhang, Memory-aware resource management algorithm for low-energy cloud data centers, Future Gener. Comput. Syst. 113 (2020) 329-342.

[2]

M. Thangavel, P. Varalakshmi, Enabling ternary hash tree based integrity verification for secure cloud data storage, IEEE Trans. Knowl. Data Eng. 32 (12) (2019) 2351-2362.

[3]

J. Zhang, B. Wang, D. He, X.A. Wang, Improved secure fuzzy auditing protocol for cloud data storage, Soft Comput. 23 (2019) 3411-3422.

[4]

M. Ananthi, R. Sabitha, S. Karthik, J. Shanthini, FSS-sdd: fuzzy-based semantic search for secure data discovery from outsourced cloud data, Soft Comput. 24 (2020) 12633-12642.

[5]

P.L. Kalyampudi, P.V. Krishna, S. Kuppani, V. Saritha, A work load prediction strategy for power optimization on cloud based data centre using deep machine learning, Evolutionary Intelligence 14 (2021) 519-527.

[6]

S. El Motaki, A. Yahyaouy, H. Gualous, J. Sabor, A new weighted fuzzy Cmeans clustering for workload monitoring in cloud datacenter platforms, Cluster Comput. 24 (4) (2021) 3367-3379.

[7]

C. Yang, X. Xu, K. Ramamohanarao, J. Chen, A scalable multi-data sources based recursive approximation approach for fast error recovery in big sensing data on cloud, IEEE Trans. Knowl. Data Eng. 32 (5) (2019) 841-854.

[8]

C.I. Fan, J.J. Huang, S.W. Tseng, I.T. Chen, Dependable data outsourcing scheme based on cloud-of-clouds approach with fast recovery, IEEE Trans. Cloud Comput. 9 (2) (2018) 546-561.

[9]

H. Zhu, Y. Yuan, Y. Chen, Y. Zha, W. Xi, B. Jia, Y. Xin, A secure and efficient data integrity verification scheme for cloud-IoT based on short signature, IEEE Access 7 (2019) 90036-90044.

[10]

A. Yang, J. Xu, J. Weng, J. Zhou, D.S. Wong, Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage, IEEE Trans. Cloud Comput. 9 (1) (2018) 212-225.

[11]

Y. Tao, P. Xu, H. Jin, Secure data sharing and search for cloud-edge-collaborative storage, IEEE Access 8 (2019) 15963-15972.

[12]

K. Gai, L. Qiu, H. Zhao, M. Qiu, Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing, IEEE transactions on cloud computing 8 (4) (2016) 1212-1222.

[13]

D. Shen, J. Luo, F. Dong, J. Zhang, VirtCo: joint coflow scheduling and virtual machine placement in cloud data centers, Tsinghua Sci. Technol. 24 (5) (2019) 630-644.

[14]

J. Feng, L.T. Yang, Q. Zhu, K.K.R. Choo, Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment, IEEE Trans. Dependable Secure Comput. 17 (4) (2018) 857-868.

[15]

S.Y. Hsieh, C.S. Liu, R. Buyya, A.Y. Zomaya, Utilization-prediction-aware virtual machine consolidation approach for energy-efficient cloud data centers, J. Parallel Distrib. Comput. 139 (2020) 99-109.

[16]

S. Namasudra, S. Sharma, G.C. Deka, P. Lorenz, DNA computing and table based data accessing in the cloud environment, J. Netw. Comput. Appl. 172 (2020a) 102835.

[17]

N. Garg, S. Bawa, N. Kumar, An efficient data integrity auditing protocol for cloud computing, Future Gener. Comput. Syst. 109 (2020) 306-316.

[18]

K.R. Sajay, S.S. Babu, Y. Vijayalakshmi, Enhancing the security of cloud data using hybrid encryption algorithm, J. Ambient Intell. Humaniz. Comput. (2019) 1-10.

[19]

Z. Wang, N. Wang, X. Su, S. Ge, An empirical study on business analytics affordances enhancing the management of cloud computing data security, Int. J. Inf. Manage. 50 (2020) 387-394.

[20]

S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, A. Shanthini, Towards DNA based data security in the cloud computing environment, Comput. Commun. 151 (2020b) 539-547.

[21]

N. Indira, S. Rukmani Devi, A.V. Kalpana, R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment, J. Ambient Intell. Humaniz. Comput. 12 (2021) 4643-4654.

[22]

S. Xue, C. Ren, Security protection of system sharing data with improved CP-ABE encryption algorithm under cloud computing environment, Autom. Control Comput. Sci. 53 (2019) 342-350.

[23]

F. Kong, Y. Zhou, B. Xia, L. Pan, L. Zhu, A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing environment, IEEE Access 7 (2019) 161822-161830.

[24]

L. Kumar, V. Rishiwal, Design of retrievable data perturbation approach and TPA for public cloud data security, Wirel. Pers. Commun. 108 (1) (2019) 235-251.

[25]

I. Hababeh, A. Gharaibeh, S. Nofal, I. Khalil, An integrated methodology for big data classification and security for improving cloud systems data mobility, IEEE Access 7 (2018) 9153-9163.

[26]

M. Shivashankar, S.A. Mary, Privacy preservation of data using modified rider optimization algorithm: Optimal data sanitization and restoration model, Expert Syst. 38 (3) (2021) e12663.

[27]

G.S. Navale, S.N. Mali, Self-adaptive optimization for improved data sanitization and restoration, Internat. J. Uncertain. Fuzziness Knowledge-Based Systems 28 (03) (2020) 391-420.

[28]

S. Dhamdhere, Modified apriori based data sanitization for cloud data security: An optimization assisted model.in communication, 2022.

[29]

https://en.wikipedia.org/wiki/Statistic.

[30]

https://en.wikipedia.org/wiki/Standard_deviation.

[31]

https://www.itl.nist.gov/div898/handbook/eda/section3/eda35b.htm#:-:text=Skewness%20is%20a%20measure%20of, relative%20to%20a%20normal%20distribution.

[32]

L. Tóth, Phone recognition with hierarchical convolutional deep maxout networks, EURASIP J. Audio, Speech, Music. Process. 2015 (2015) 1-13.

[33]

M. Chahardoli, N.O. Eraghi, S. Nazari, Namib beetle optimization algorithm: a new meta-heuristic method for feature selection and dimension reduction, Concurr. Comput.: Pract. Exper. (34) (2022) e6524.

[34]

R. Reynolds, An introduction to cultural algorithms, 1994.

[35]

S.H.S. Moosavi, V.K. Bardsiri, Satin bowerbird optimizer: A new optimization algorithm to optimize ANFIS for software development effort estimation, Eng. Appl. Artif. Intell. 60 (2017) 1-15.

[36]

C. Reeves, Genetic algorithms, 2010.

[37]

https://archive.ics.uci.edu/ml/datasets/heart+disease.

[38]

https://archive.ics.uci.edu/dataset/523/exasens.

AI Summary AI Mindmap
PDF (1734KB)

280

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/