ijct
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • conference
  • Submission
  • IRG Journals
  • Contact Us

ijct Submit Your Article : editorijctjournal@gmail.com

international journal of computer techniques(ijct)

Paper Title : An enhanced security model on classifed data in cloud computing using cryptography and digital watermarking

ISSN : 2394-2231
Year of Publication : 2020

10.29126/23942231/IJCT-v7i4p1
Authors: Alpha Baba Garba, Souley Boukari

         



MLA Style: Alpha Baba Garba, Souley Boukari " An enhanced security model on classifed data in cloud computing using cryptography and digital watermarking " Volume 7 - Issue 4 July-August,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

APA Style: Alpha Baba Garba, Souley Boukari " An enhanced security model on classifed data in cloud computing using cryptography and digital watermarking " Volume 7 - Issue 4 July-August,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

Abstract
- Cloud Computing provides different services to users on request basis through the use of the internet. One major concern of the cloud is the security risks of the data; this has posed serious issues in trusting the security and integrity of data when exposed to the cloud. This work proposed an enhanced security model on classified data using different cryptographic techniques using Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA) and digital watermarking to improve the security of data stored in the cloud. The proposed system was implemented and simulated using Java programming toolkits with Netbeans IDE and cloudsim simulator. The work piloted a performance analysis of the existing system using K-NN and Improved Naïve Bayes algorithms and proposed system using improved Naïve Bayes and Modified K-NN algorithms. The results of the simulated system show that Modified K-NN algorithm performed significantly better than Improved Naïve Bayes algorithm in respect to data classification time of 665.60ms and 600.00ms and accuracy of the classified data having 97% and 98.26% respectively. Encryption time comparison of different cryptographic techniquesfor both the existing and proposed system depicts that Improved Naïve Bayes algorithm has RSA algorithm as 147462.40ms and AES algorithm with 2782.20ms. The Modified K-NN algorithm has 145692.80ms for RSA algorithm while AES algorithm has 2656.40ms. On the other hand the decryption time comparison of Improved Naïve Bayes algorithm has RSA algorithm as 36918.00ms with AES algorithm having 1070.40ms. The Modified K-NN algorithm has 36528.00ms for RSA algorithm and AES algorithm has 965.40ms. This work recommends that the proposed methodology and other machine learning algorithms be adopted by cloud service providers to improve on the classified data stored in cloud considering their security needs and sensitivity level. This will increase the confidence of their client and guaranteeing secured security in terms of data transfer and security of data store in cloud devoid of any enticing attack or mutilation on the data from malicious users.

Reference
[1] I. A. Adamu and B. Souley, "An Enhanced Cloud Based Security System Using RSA as Digital Signature and Image Steganography," International Journal of Scientific & Engineering Research, vol. 8, no. 7, pp. 1512-1517, 2017. [2] M Boussif, N.Aloui,& A. Cherif, “Secured cloud computing for medical data based on watermarking and encryption”, IET Networks, pp 1-5, 2018. [3] Chandrika &E. Dalwal "Data Security in Cloud Computing using Cryptographic Algorithms: A Review",International Journal of Innovative Research in Computer and Communication Engineering, 7(1), pp. 89-94, 2019 [4] Dubey, S. K., & Chandra, V. (2017). Steganography, Cryptography and Watermarking: A review. International Journal of Innovation Research in Science, Engineering and Technology, 6(2), pp. 2595-2599. [5] G. Garikapati, D. Yakobu, G. Nitta and l. J. Amudhave, "AN ANALYSIS OF CLOUD DATA SECURITY ISSUES AND MECHANISMS," International Journal of Pure and Applied Mathematics, vol. 116, no. 6, pp. 141-147, 2017. [6] S. Gunavathy& C. Meena, “A Survey: Data Security in Cloud Using Cryptography and Steganography”, International Research Journal of Engineering and Technology, 6(5) pp 6792-6797, 2019. [7] O. Harfoushi, B. Alfawwaz, N. A. Ghatasheh, R. Obiedat, M. M. Abu-Faraj and H. Faris, "Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review," Communications and Network, vol. 6, pp. 15-21, 2014. [8] K. B. Hari, S. Kiran, G. Murali and K. P. Reddy, "Security Issues in Services Model of Cloud Computing", International Conference on Computational Science, pp. 246-251, 2016. [9] B. Jagadeesh, & K. L. Reddy, “Image Security using Digital Image and Visual Cryptography Techniques”,International Journal of Innovative Technology and Exploring Engineering, 9(4), pp. 2386-2391, 2020 [10] J. Kaur, & S. Sharma, ”HESSIS: Hybrid Encryption Scheme for Secure Image Sharingin a Cloud Environment”, Springer, pp. 204-216, 2019. [11] K.Kaur, &V.Zandu, "A Secure Data Classification Model for achieving Data Confidentiality and Integrity in Cloud Environment",International Journal on Computer Science and Engineering, 8(9), pp 362-369, 2016. [12] M. Kaur, S. Baghla and S. Kumar, "A Review on Watermarking of Digital Images," International Journal of Advances in Science Engineering and Technology, vol. 3, no. 3, pp. 149-153, 2015. [13] N. Khajanchi, & V. Nagrale “To Apply Watermarking Technique in Cloud Computing To Enhance Cloud Data Security”,International Journal of Scientific Development and Research, 4(7), pp. 237-244,2019 [14] B. H. Krishna, S. Kiranb, G. Muralia and R. P. K. Reddy, "Security Issues In Service Model Of Cloud Computing Environment," in International Conference on Computational Science, pp. 246 – 251,2016. [15] M. Marwan, A. Kartit, & H. Ouahmane, “ Security Enhancement in Healthcare Cloud using Machine Learning”, Procedia Computer Science 127 (2018), pp 388–397, 2018 [16] E. Mehraeen, M. Ghazisaeedi, J. Farzi and S. Mirshekari, "Security Challenges in Healthcare Cloud Computing: A Systematic Review," Global Journal of Health Science, vol. 9, no. 3, pp. 157-166, 2017. [17] P. More, K. Temgire, P. Kamble and D. Chavan, "A Survey: Data Security in Cloud Computing Based on RSA," International Engineering Research Journa, vol. 2, no. 5, pp. 1968-1970, 2016. [18] R. Patel and S. Dehariya, "Secure Model for Cloud Computing by using Data Classification Methodology," International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 12, pp. 21036-21045, 2016. [19] P. Ratha, D. Swain, B. Paikaray, & S. Sahoo, “An optimized encryption technique using an arbitrary matrix with probabilistic encryption”, 3rd International Conference on Recent Trends in Computing 2015. Elsevier B.V. pp. 1235-1241, 2015. [20] M.O.Rahman,M.K. Hossen, G.Morsad, A.C. Roy, & S.A. Chowdhury, “An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E - LSB Encoding Technique”,IJCSNS International Journal of Computer Science and Network Security, (18)9, pp. 85-93, 2018. [21] S. Ramalakshmi and J. Rexy, "Enhancing Cloud Security with Automatic Data Classification and Appropriate Encryption Algorithms," International Journal of Innovative Research in Computer and Communication Engineering, vol. 5, no. 1, pp. 1027-1032, 2017. [22] G. Rathi, M. Abinaya, M. Deepika and T. Kavyasri, "Healthcare Data Security in Cloud Computing," International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 3, pp. 1807-1815, 2017 [23] M. A. Razzaq, M. A. Baig, R. A. Shaikh and A. A. Memon, "Digital Image Security: Fusion of Encryption, Steganography and Watermarking," International Journal of Advance Computer Science and Application, vol. 8, no. 5, pp. 224-228, 2017. [24] H. M. Said, I. E. Emary, B. A. Alyoubi and A. A. Alyoubi, "Application of Intelligent Data Mining Approach in Securing the Cloud Computing," International Journal of Advanced Computer Science and Applications, vol. 7, no. 9, pp. 151-159, 2016. [25] M. S.Sarma, Y.Srinivas, M.Abhiram,M. S.Prasanthi, &M.S.Ramya, "KNN File Classification for Securing Cloud Infrastructure",IEEE International Conference On Recent Trends In Electronics Information & Communication Technology. India: IEEE. pp. 5-9 2017. [26] P.Sawle,&T.Baraskar, "Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing",International Journal of Computer Applications, 135(12), pp 35-40, 2016. [27] R. Shaikh and M. Sasikumarb, "Trust Model for Measuring Security Strength of Cloud Computing Service," in International Conference on Advanced Computing Technologies and Applications, pp. 380-389, 2015. [28] K.P. Singh, V. Rishiwal, & P. Kumar, “Classification of Data to Enhance Data Security in Cloud Computing”, IEEE. pp. 1-5, 2018 [29] T. Tamanna and K. Rajeev, "Secure Cloud Model Using Classification and Cryptography," International Journal of Computer Application, vol. 159, no. 6, pp. 8-13, 2017. [30] L. Tawalbeh, N. S, Darwazeh, R. S, Al-Qassas and F. AlDosari, "A Secure Cloud Computing Model based on Data Classification," Procedia Computer Science, pp. 1153-1159, 2015. [31] F. Yahya, R. J. Walters and G. B. Wills, "Protecting Data in Personal Cloud Storage with Security Classifications," in Science and Information Conference, London, pp. 838-843, 2015

Keywords
Cloud computing, Data classification, Machine learning, Modified K-NN, Naïve Bayes, Cryptographic and Digital watermarking.

IJCT Management

  • Home
  • Aim & Scope
  • Indexing
  • Author instruction
  • Call for paper IJCT JOURNAL
  • Current Issues
  • special issue
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright Infringement
  • Join as a Reviewer
  • FAQ
  • Downloads

  • CopyrightForm
  • Paper Template
  • IJCT Policy

  • Terms & Conditions
  • Cancellation & Refund
  • Privacy Policy
  • Shipping &Delivery
  • Publication Rights
  • Plagiarism Policy
Copyright ©2015 IJCT- International Journal of Computer Techniques Published By International Research Group , All rights reserved

This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)