Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2024 | Article Id: DSM-V1I1P104 DOI: https://doi.org/10.59232/DSM-V1I1P104
IoT-Centric Data Protection Using Deep Learning Technique for Preserving Security and Privacy in Cloud
J. Abitha, R. Sadhana
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 21 Oct 2023 | 20 Nov 2023 | 13 Dec 2023 | 22 Jan 2024 |
Citation
J. Abitha, R. Sadhana. “IoT-Centric Data Protection Using Deep Learning Technique for Preserving Security and Privacy in Cloud.” DS Journal of Multidisciplinary, vol. 1, no. 1, pp. 23-30, 2024.
Abstract
Keywords
Cloud computing, Internet of Things, Support Vector Machine, Okamato Uchiyama.
References
[1] Ashutosh Kumar Singh, and Ishu Gupta, “Online Information Leaker Identification Scheme for Secure Data Sharing,” Multimedia Tools and Applications, vol. 79, pp. 31165–31182, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ishu Gupta et al., “Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions,” IEEE Access, vol. 10, pp. 71247–71277, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Deepika Saxena et al., “A Fault Tolerant Elastic Resource Management Framework toward High Availability of Cloud Services,” IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 3048–3061, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Rishabh Gupta et al., “Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications,” IEEE Networking Letters, vol. 4, no. 4, pp. 174-178, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ishu Gupta, and Ashutosh Kumar Singh, “SELI: Statistical Evaluation Based Leaker Identification Stochastic Scheme for Secure Data Sharing,” IET Communications, vol. 14, no. 20, pp. 3607–3618, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] IBM Ponemon, Cost of a Data Breach Study, 2022. [Online] Available: https://www.ibm.com/security/data-breach
[7] Ishu Gupta, and Ashutosh Kumar Singh, “Dynamic Threshold Based Information Leaker Identification Scheme,” Information Processing Letters, vol. 147, pp. 69–73, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Xindi Ma et al., “PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys,” IEEE Transactions on Services Computing, vol. 14, no. 4, pp. 1251–1263, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Ping Li et al., “Privacy-Preserving Outsourced Classification in Cloud Computing,” Cluster Computing, vol. 21, no. 1, pp. 277–286, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Maoguo Gong, Jialun Feng, and Yu Xie, “Privacy-Enhanced Multi-Party Deep Learning,” Neural Networks, vol. 121, pp. 484–496, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Rishabh Gupta et al., “Differential and Triphase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment,” IEEE Networking Letters, vol. 4, no. 4, pp. 217-221, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Ping Li et al., “Privacy-Preserving Machine Learning with Multiple Data Providers,” Future Generation Computer Systems, vol. 87, pp. 341–350, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Rishabh Gupta et al., “A Differential Approach and Deep Neural Network Based Data Privacy-Preserving Model in Cloud Environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 4659-4674, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ishu Gupta et al., “MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment,” IEEE Systems Journal, vol. 15, no. 3, pp. 4248–4259, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Shulan Wang et al., “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1265–1277, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hai Liu et al., “A Fair Data Access Control Towards Rational Users in Cloud Storage,” Information Sciences, vol. 418, pp. 258–271, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Zechao Liu et al., “Practical Attribute-Based Encryption: Outsourcing Decryption, Attribute Revocation and Policy Updating,” Journal of Network and Computer Applications, vol. 108, pp. 112–123, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Hong Zhong et al., “Multi-Authority Attribute-Based Encryption Access Control Scheme with Policy Hidden for Cloud Storage,” Soft Computing, vol. 22, no. 1, pp. 243–251, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Leyou Zhang, Yilei Cui, and Yi Mu, “Improving Security and Privacy Attribute-Based Data Sharing in Cloud Computing,” IEEE Systems Journal, vol. 14, no. 1, pp. 387–397, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Jianqiang Li et al., “An Efficient Attribute-Based Encryption Scheme with Policy Update and File Update in Cloud Computing,” IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6500–6509, 2019.