Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification
![]() |
10.5120/ijca2017913129 |
Amanpreet Singh, Manju Bala and Supreet Kaur. Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification. International Journal of Computer Applications 161(2):48-51, March 2017. BibTeX
@article{10.5120/ijca2017913129, author = {Amanpreet Singh and Manju Bala and Supreet Kaur}, title = {Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification}, journal = {International Journal of Computer Applications}, issue_date = {March 2017}, volume = {161}, number = {2}, month = {Mar}, year = {2017}, issn = {0975-8887}, pages = {48-51}, numpages = {4}, url = {http://www.ijcaonline.org/archives/volume161/number2/27124-2017913129}, doi = {10.5120/ijca2017913129}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Cloud computing offers numerous benefits including scalability, availability and many services. But with its wide acceptance all over the globe, new risks and vulnerabilities have appeared too. Cloud computing supplies facility of storing and accessing understanding and programs over the web without bothering the storage space on procedure. Storing the data on cloud eliminates one’s worries about space considerations, buying new storage equipment or managing their data, rather they are able to access their data any time from any place provided they have internet access. However, the rising security issues have resisted the companies from connecting with cloud computing fully. Hence security risks have appeared as the main disadvantage of cloud computing. This paper involves the efforts to research the security risk and then proposes a framework to address these risk on the authentication and storage level in cloud computing. While addressing the security issues the first and the foremost thing is to classify what data needs security and what data needn't bother with security and hence data gets classified into two classes sensitive and non-sensitive. To achieve data classification, a data classification approach based on the confidentiality of data is proposed in this paper. Following that an efficient security mechanism must be deployed by means of encryption, authentication, and authorization or by some enhanced means of security techniques to ensure the privacy of data on cloud storage.
References
- H. Tianfield, “Security issues in cloud computing,” 2012 IEEE Int. Conf. Syst. Man, Cybern., pp. 1082–1089, 2012.
- Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011) “Collaboration- Based Cloud Computing Security Management Framework” IEEE conference of cloud computing, Washington (DC), pp. 364-371
- D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), vol. 1, pp. 647–651, 2012.
- M.-H. M. Guo, H.-T. H. Liaw, L.-L. Hsiao, C.-Y. Huang, and C.-T. Yen, “Authentication using graphical password in cloud,” 2012 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), pp. 177–181, 2012.
- S. M. Gurav, L. S. Gawade, P. K. Rane, and N. R. Khochare, “Graphical password authentication: Cloud securing scheme,” 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, pp. 479–483, 2014.
- M. F. Al-jaberi and A. Zainal, “Data Integrity and Privacy Model in Cloud Computing,”2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 280–284, 2014.
- R. Mukundan, S. Madria, and M. Linderman, “Efficient integrity verification of replicated data in cloud using homomorphic encryption,” Distributed and Parallel Databases, vol. 32, pp. 507–534, 2014.
- A. N. Kang, L. Barolli, J. H. Park, and Y.-S. Jeong, “A strengthening plan for enterprise information security based on cloud computing,” Cluster Computing, pp. 1–8, 2013.
- R. Mukundan, S. Madria, M. Linderman, A. N. Kang, L. Barolli, J. H. Park, Y.-S. Jeong, Y. Du, R. Zhang, M. Li, D. Chen, H. Zhao, H. Banirostam, A. Hedayati, S. K. Abd, S. a R. Al-Haddad, F. Hashim, and A. Abdullah, “Research on a security mechanism for cloud computing based on virtualization,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 4, pp. 19–24, 2013.
- D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), vol. 1, pp. 647–651, 2012.
- A. Abuhussein, H. Bedi, and S. Shiva, “Evaluating Security and Privacy in Cloud Computing Services: A Stakeholder’s Perspective,” 2012 International Conference forInternet Technology And Secured Transactions, pp. 388–395, 2012.
- M. Almorsy, J. Grundy, and A. S. Ibrahim, “Collaboration-based cloud computing security management framework,”4th International. Conference Cloud ComputingIEEE, pp. 364–371, 2011
- A. Singh and H. Singh, “An improved LSB based image steganography technique for RGB images,”2015 IEEE International Conference onElectrical, Computer and Communication Technologies (ICECCT), pp. 1–4, 2015.
- H. Banirostam and a Hedayati, “A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure,” UKSim 15th IEEE Int. Conf. Compuer Model. Simul., pp. 717–721, 2013.
Keywords
Cloud Computing, Data confidentiality, Security, Data Hiding, Machine learning, Cloudsim, Datacenter, Resource, Data Privacy