Enhanced Security in Cloud Computing Using Neural Network and Encryption

被引:6
|
作者
Sana, Muhammad Usman [1 ]
Li, Zhanli [1 ]
Javaid, Fawad [2 ]
Bin Liaqat, Hannan [3 ]
Ali, Muhammad Usman [4 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Shaanxi, Peoples R China
[2] Xian Univ Sci & Technol, Dept Commun & Informat Engn, Xian 710054, Shaanxi, Peoples R China
[3] Univ Gujrat, Dept Informat Technol, Gujrat 50700, Punjab, Pakistan
[4] Univ Gujrat, Dept Comp Sci, Gujrat 50700, Punjab, Pakistan
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Cloud computing; Computational modeling; Data privacy; Biological neural networks; Privacy; Data models; Tools; Ciphertext; cloud computing; homomorphic encryption; matrix operation-based randomization and encipherment; neural network; CLASSIFICATION; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2021.3122938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast advancement in cloud computing, progressively more users store their applications and data on the cloud. Cloud computing has lots of features, e.g. virtualization, multi-user, efficiency, cost savings, and most importantly security. Machine learning approaches based on neural networks are being widely applied in cloud infrastructure when training is performed however this may produce possible privacy and security risk as direct access to raw data is required. To address this problem, we propose a new security design using Artificial Neural Networks (ANN) and encryption to confirm a safe communication system in the cloud environment, by letting the third parties access the data in an encrypted form for processing without disclosing the data of the provider party to secure important information. In this paper, to train neural networks using encrypted data we considered the Matrix Operation-based Randomization and Encipherment (MORE) technique, based on Fully Homomorphic Encryption (FHE). This technique allows the computations to be performed directly on floating-point data within a neural network with a minor computational overhead. We examined the speech and voice recognition problem and the performance of the proposed method has been validated in MATLAB simulation. Results showed that applying neural network training with MORE offers improved accuracy, runtime, and performance. These results highlight the potential of the proposed method to protect privacy and provide high accuracy in a reasonable amount of time when compared to other state-of-the-art techniques.
引用
收藏
页码:145785 / 145799
页数:15
相关论文
共 50 条
  • [21] Enhanced Data Integrity Encryption Algorithm for Cloud Computing
    Mothlabeng, Moloko P.
    Muchenje, Tonderai
    Mathonsi, Topside E.
    Du Plessis, Deon P.
    5TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS (ICABCD2022), 2022,
  • [22] Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing
    Almiani, Muder
    Abughazleh, Alia
    Jararweh, Yaser
    Razaque, Abdul
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 118
  • [23] Federated Cloud Computing Security using Forward-Secure Broadcast Encryption HIBE
    Rekaby, Fayza
    Abd El-Aziz, A. A.
    Mahmood, Mahmood A.
    Hefny, Hesham A.
    2015 11TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2015, : 13 - 18
  • [24] Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms
    Khan, Abdul Hannan
    Hasnain, Syed Anwer
    Siddiqui, Shahan Yamin
    Irshad, Muhammad Sohail
    Sajid, Muhammad
    Iqbal, Shahid
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (28) : 1 - 17
  • [25] Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing
    Shabbir, Maryam
    Shabbir, Ayesha
    Iwendi, Celestine
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Herencsar, Norbert
    Lin, Jerry Chun-Wei
    IEEE ACCESS, 2021, 9 : 8820 - 8834
  • [26] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [27] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [28] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [29] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [30] Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
    Puri, Neha A.
    Karare, Ajay R.
    Dharmik, Rajesh. C.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1667 - 1671