• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm
¿µ¹®Á¦¸ñ(English Title) An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm
ÀúÀÚ(Author) N. P. Ponnuviji   M. Vigilson Prem  
¿ø¹®¼ö·Ïó(Citation) VOL 15 NO. 11 PP. 4011 ~ 4027 (2021. 11)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.
Å°¿öµå(Keyword) Cloud computing   Data security   Attack detection   Malicious user detection   Secure authentication   SHA256 hashing   Rivest Shamir Adleman (RSA) encryption   Kernel Extreme Learning Machine (KELM)  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå