[{“box”:0,”content”:”[if 992 equals=”Open Access”]n
n
Open Access
nn
n
n[/if 992]n
n
n
n
n
n
Padma Bhogaraju, D. Deepthi,
n
- n t
n
n
n[/foreach]
n
n[if 2099 not_equal=”Yes”]n
- [foreach 286] [if 1175 not_equal=””]n t
- Associate Professor,, Assistant Professor, Gayatri Vidya Parishad College for Degree and PG Courses (Autonomous), Visakhapatnam,, Rayapati Venkata Rangarao and Jagarlamudi Chandramouli (RVR&JC) College of Engineering (Autonomous), Guntur, Andhra Pradesh,, Andhra Pradesh, India, India
n[/if 1175][/foreach]
n[/if 2099][if 2099 equals=”Yes”][/if 2099]n
Abstract
nIn modern technological landscapes, private cloud security is of paramount concern due to the ever-increasing volume and complexity of cyber threats. This research work explores the integration of machine learning and cryptography to enhance security within private cloud environments. This study aims to mitigate vulnerabilities that may compromise data integrity, confidentiality, and availability in private cloud infrastructures by using machine learning algorithms and strong cryptography. By detecting anomalous cloud patterns and behaviours, machine learning algorithms enable proactive threat detection. Machine learning models can distinguish normal network activity from malicious incursions by analysing large datasets, improving early threat detection and response. By using cryptographic protocols like homomorphic encryption and multi-party computation, private clouds can protect sensitive data while maintaining computational capabilities. This study examines how machine learning and cryptography can strengthen private cloud security against sophisticated cyber-attacks. Industry practitioners, academic scholars, and cyber security professionals seeking innovative private cloud asset protection strategies will benefit from the findings. As organizations move to private cloud infrastructures for flexibility and scalability, advanced security paradigms are needed to adapt to changing threats. This study suggests that combining cutting-edge technologies like machine learning and cryptography can enhance private cloud defences, both theoretically and practically.
n
Keywords: Homomorphic encryption, multi-party computations, machine learning models, cryptography and private cloud Security
n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Advanced Control and System Engineering(ijacse)]
n
n
n
n
n
nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n
nn[if 379 not_equal=””]n
Browse Figures
n
n
n[/if 379]n
References
n[if 1104 equals=””]n
- Gu L, Wang L, Ota K, Dong M, Cao Z, Yang New public key cryptosystems based on non-abelian factorization problems. Secur Commun Netw. 2013; 6(7): 912–922.
- Au MH, Liang K, Liu JK, Lu R, Ning J. Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat. Future Gener Comput Syst. 2018 Feb 1; 79: 337–
- Chou D, Jiang M. A survey on data-driven network intrusion detection. ACM Comput Surv (CSUR). 2021 Oct 7; 54(9): 1–
- Ouyang L, Yuan Y, Wang FY. Learning markets: An AI collaboration framework based on blockchain and smart contracts. IEEE Internet Things J. 2020 Oct 21; 9(16): 14273–
- Mahmood ALGS. Data Security Protection in Cloud Computing by using Encryption. Kirkuk Univ Journal/Scientific Stud. 2017; 12(4): 849–1992.
- Gentry C, et al. Fully homomorphic encryption using ideal lattices. In: Stoc’09: Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009; 9: 169–178.
- Al-Attab BS, Fadewar HS. Hybrid data encryption technique for data security in cloud computing. Sinhgad Inst Manag Comput Appl. 2018; 221–224.
- Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978; 21(2): 120–126.
- Uçtu G, Alkan M, Doğru İA, Dörterler M. A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls. Futur Gener Comput Syst. 2021; 124: 56–67. doi: 10.1016/j.future.2021.05.013.
- Vora U, Mahato J, Dasgupta H, Kumar A, Ghosh SK. Machine Learning–Based Security in Cloud Database—A Survey. In: IEEE Mach Learn Tech Anal Cloud Secur. 2021; 239–269. doi: 10.1002/9781119764113.ch12.
- Gu L, Zheng S. Conjugacy systems based on nonabelian factorization problems and their applications in cryptography. J Appl Math. 2014; 2(2014): 1–10.
- Kolli R, Mile S, Shetty S, SJB, CBM. Improved Data Security Protection Mechanism for Cloud Storage using Two Factors.Int J Adv Res Comput Commun Eng (Ijarcce). 2017; 6(5): 24–29. doi:10.17148/ijarcce.2017.6505.
- Pandeeswari N, Kumar G. Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob Networks Appl. 2016; 21(3): 494–505. doi: 10.1007/s11036-015-0644-x.
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
nn
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n
n
International Journal of Advanced Control and System Engineering
n
n
n
n
n
n
Volume | 02 | |
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] | 01 | |
Received | May 21, 2024 | |
Accepted | June 25, 2024 | |
Published | July 22, 2024 |
n
n
n
n
n
n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]