International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249- 8958, Volume-8, Issue-6, August 2019
2728
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number F8395088619/2019©BEIESP
DOI: 10.35940/ijeat.F8395.088619
Abstract: The term cloud computing is referred as the shared
pool of customizable computer resources and high quantity
services which can easily be provisioned with less management
endeavours via internet. It transfigured the mode associations
reach IT, which enables them to be more perceptive, launch new
business models, and minimise the IT costs. These technologies
are to be administrated in an interdisciplinary collection of
architectures, characterized into various deployment and service
models, and can synchronize with other related technologies.
The widespread issues with cloud computing are security,
reliability, data privacy and anonymity. Cloud computing
provides a way to share distributed sources and services that are
owned by different organizations or sites. Since it shares
distributed resources via network in open environment that
results in security issues. In this paper, our aim is to upgrade the
security of data in the cloud and also to annihilate the difficulties
related to the data security with encipher algorithm. In our
proposed plan, some key services of security like authentication
and cryptographic techniques are assigned in cloud computing
environment.
Index Terms: Cloud computing, cryptography, data
classification, decryption, encryption.
I. INTRODUCTION
Cloud Computing is a transpiring virtual distributed
environment that utilizes the ideas of sharing, power
processing, storing, connectivity, and virtualization.
Communicating through broad network i.e., Internet cloud
facilitate a large pool of resources, storage media and sharing
media that helps to supply on-demand services. This will
help the end-users to follow the ideas of distribution, security,
elasticity and isolation. Security issues are the foremost
difficult problems in cloud domain and the vital hurdle for
aggrandize of IT based companies that provide users
on-demand services. These security issues can be visualized
at application phase, network phase, authentication phase,
authorization phase and virtualization phaseThere are two
reasons for the security concerns in the cloud computing:
Nowadays, many are storing their data on Cloud database.
So, the main attention is on the safeguard of user’s data and
the vital information shouldn’t get tampered when shifting
across the network. It is necessary that Integrity,
Revised Manuscript Received on August 25, 2019
Adnaan Arbaaz Ahmed, Scholar, Department of Information Technology,
Guru Nanak Institutions Technical Campus, Hyderabad, India.
Dr.M.I.Thariq Hussan, Professor & Head, Department of Information
Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India.
Venkateswarlu Bollapalli, Assistant Professor, Department of Information
Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India.
Confidentiality and Availability of user data must be ensured.
The unauthenticated user tries to access the authenticated
user’s data. We can apply cryptographic algorithms in cloud
servers to solve these threats. However when a user is
revoked, usage of a single cryptographic algorithm is not
adequate to assure the security of data and to manage the
Access Control methods in Cloud Computing environment.
For data security these techniques are applied on encryption.
Encrypting complete data can turn to be very expensive in
terms of memory as well as for time. So, to solve this problem
it would be better if we first separate our sensitive data and
then apply encryption algorithms. It would address reliable
results if we reorganize the data depending to its
confidentiality level. In machine learning field, the data
classification is a method of distinguishing the category of
unclassified data sample set with the help of build classifier.
The classifier is constructed by constructing a training set of
familiar data samples. To dsevelop an appropriate classifier,
large range of justified training data samples are required.
This advancement invites a new paradigm of services where
data classification is offered by servers in a cloud to its
various clients/users. Specifically, the server will process the
data automatically and hence, cat egorise the client’s data
samples present on remote private servers. However
un-trusted third party-servers can access the private data.
Moreover, any vital detail or training data set specifications
may not be disclosed by the servers even if it provides the
classification services to its client. Thus, a mechanism that
ensures the privacy of the server’s training set and client data
samples is required. Therefore, a decipher model is essential
to forestall the invalidated user from accessing the
enciphered information as well as to produce authentic keys
for validated users.
II. INTENTION OF PROPOSED SYSTEM
To design a system which can render privacy and security
in terms of cloud storage.
To collocate an encipher depended environment for
protecting the confidential data on the Cloud and to architect
how the user and the storage service provider performs
operations on enciphered data.
To design an architecture where a user can be able to store
the data on the Cloud in the encrypted form which is not
vulnerable. (In normal cases in Cloud Computing, the data
which is stored on the Cloud
Upgrade-Data Security in Cloud by Machine
Learning and Cryptography Techniques
Adnaan Arbaaz Ahmed, M.I.Thariq Hussan, Venkateswarlu Bollapalli