A Fuzzy Optimal Lightweight Convolutional Neural Network for Deduplication Detection in Cloud Server

سال انتشار: 1403
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 27

فایل این مقاله در 17 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJFS-21-1_003

تاریخ نمایه سازی: 7 اسفند 1402

چکیده مقاله:

Nowadays the cloud computing environment is widely utilized for transmitting and receiving data securely. Inorder to secure the data the encryption method is used but still due to some limitations the security process is diminished. Therefore, this paper proposes a new algorithm to provide better security while transmitting data through the network. At first, the sensitivity of data is determined using a lightweight convolutional neural network (LWCNN) model which is used to categorize the unclassified data into two categories normal sensitive data and highly sensitive data. After determining the level of data sensitivity, the encryption process is performed further. The efficient hash function-based duplication detection approach is employed to maintain confidential information before outsourcing it to a cloud server. Subsequently, the ideal keys are generated for each data based on its sensitivity level using the proposed fuzzy tuna swarm (FTS) algorithm. Finally, the data is encrypted by converting plain text into ciphertext which is only visible to authorized users. The experimental results show that the LWCNN model utilized for data sensitivity classification achieved ۹۴% accuracy and the FTS algorithm proposed for optimal key generation took much less communication time of about ۱۸۰۰μs than other compared techniques.

کلیدواژه ها:

Security ، Encryption ، Key generation ، Lightweight convolutional neural network ، fuzzy logic system ، Tuna swarm optimization algorithm

نویسندگان

Periasamy JK

Sri Sairam Engineering College, chennai

Selvam L

K S R Institute for Engineering and Technology

Anuradha M

S A Engineering college

R Kennady

Rajalakshmi Institute of Technology Kuthambakkam

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • S. T. Ahmed, L. E. George, Lightweight hash-based de-duplication system ...
  • B. Arpac, E. Kurt, K. C elik, B. Ciylan, Colored ...
  • E. Y. Baagyere, P. A. N. Agbedemnab, Z. Qin, M. ...
  • M. U. Bokhari, Q. M. Shallal, Y. K. Tamandani, Reducing ...
  • R. Chen, X. Li, S. Li, A lightweight CNN model ...
  • Y. Ding, F. Tan, Z. Qin, M. Cao, K. K. ...
  • Y. Ding, G. Wu, D. Chen, N. Zhang, L. Gong, ...
  • C. Feng, K. Yu, M. Aloqaily, M. Alazab, Z. Lv, ...
  • O. A. Imran, S. F. Yousif, I. S. Hameed, W. ...
  • P. Li, L. Han, X. Tao, X. Zhang, C. Grecos, ...
  • D. Liu, J. Shen, A. Wang, C. Wang, Secure real-time ...
  • A. C. Mert, E.  Ozturk, E. Sava, Design and ...
  • J. K. Periasamy, B. Latha, An enhanced secure content de-duplication ...
  • J. K. Periasamy, B. Latha, Ecient hash function-based duplication detection ...
  • K. Shankar, S. K. Lakshmanaprabu, D. Gupta, A. Khanna, V. ...
  • X. Wu, J. Gao, G. Ji, T. Wu, Y. Tian, ...
  • L. Xie, T. Han, H. Zhou, Z. R. Zhang, B. ...
  • S. R. Zeebaree, DES encryption and decryption algorithm implementation based ...
  • نمایش کامل مراجع