A Fuzzy Optimal Lightweight Convolutional Neural Network for Deduplication Detection in Cloud Server

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 20

This Paper With 17 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJFS-21-1_003

تاریخ نمایه سازی: 7 اسفند 1402

Abstract:

Nowadays the cloud computing environment is widely utilized for transmitting and receiving data securely. Inorder to secure the data the encryption method is used but still due to some limitations the security process is diminished. Therefore, this paper proposes a new algorithm to provide better security while transmitting data through the network. At first, the sensitivity of data is determined using a lightweight convolutional neural network (LWCNN) model which is used to categorize the unclassified data into two categories normal sensitive data and highly sensitive data. After determining the level of data sensitivity, the encryption process is performed further. The efficient hash function-based duplication detection approach is employed to maintain confidential information before outsourcing it to a cloud server. Subsequently, the ideal keys are generated for each data based on its sensitivity level using the proposed fuzzy tuna swarm (FTS) algorithm. Finally, the data is encrypted by converting plain text into ciphertext which is only visible to authorized users. The experimental results show that the LWCNN model utilized for data sensitivity classification achieved ۹۴% accuracy and the FTS algorithm proposed for optimal key generation took much less communication time of about ۱۸۰۰μs than other compared techniques.

Keywords:

Security , Encryption , Key generation , Lightweight convolutional neural network , fuzzy logic system , Tuna swarm optimization algorithm

Authors

Periasamy JK

Sri Sairam Engineering College, chennai

Selvam L

K S R Institute for Engineering and Technology

Anuradha M

S A Engineering college

R Kennady

Rajalakshmi Institute of Technology Kuthambakkam

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. T. Ahmed, L. E. George, Lightweight hash-based de-duplication system ...
  • B. Arpac, E. Kurt, K. C elik, B. Ciylan, Colored ...
  • E. Y. Baagyere, P. A. N. Agbedemnab, Z. Qin, M. ...
  • M. U. Bokhari, Q. M. Shallal, Y. K. Tamandani, Reducing ...
  • R. Chen, X. Li, S. Li, A lightweight CNN model ...
  • Y. Ding, F. Tan, Z. Qin, M. Cao, K. K. ...
  • Y. Ding, G. Wu, D. Chen, N. Zhang, L. Gong, ...
  • C. Feng, K. Yu, M. Aloqaily, M. Alazab, Z. Lv, ...
  • O. A. Imran, S. F. Yousif, I. S. Hameed, W. ...
  • P. Li, L. Han, X. Tao, X. Zhang, C. Grecos, ...
  • D. Liu, J. Shen, A. Wang, C. Wang, Secure real-time ...
  • A. C. Mert, E.  Ozturk, E. Sava, Design and ...
  • J. K. Periasamy, B. Latha, An enhanced secure content de-duplication ...
  • J. K. Periasamy, B. Latha, Ecient hash function-based duplication detection ...
  • K. Shankar, S. K. Lakshmanaprabu, D. Gupta, A. Khanna, V. ...
  • X. Wu, J. Gao, G. Ji, T. Wu, Y. Tian, ...
  • L. Xie, T. Han, H. Zhou, Z. R. Zhang, B. ...
  • S. R. Zeebaree, DES encryption and decryption algorithm implementation based ...
  • نمایش کامل مراجع