NUYA: An encrypted mechanism for securing cloud data from data mining attacks

N. Singh, Yashwant Singh Patel, Utpalendu Das, Ananya Chatterjee
{"title":"NUYA: An encrypted mechanism for securing cloud data from data mining attacks","authors":"N. Singh, Yashwant Singh Patel, Utpalendu Das, Ananya Chatterjee","doi":"10.1109/ICDMIC.2014.6954254","DOIUrl":null,"url":null,"abstract":"Cloud Computing is a vast infrastructural and rising pool, which provides huge storage of data in one sphere. Organizations, now a days are in the marathon of equipping the whole system in a cloud form. The attackers evaluating data for a long time to extract the valued information to perform data mining based attacks on the cloud. In the recent architectures the data is sited in a single or distributed cloud provider. It gives the opportunity to the cloud providers and attackers to unauthorized access from cloud and also gives the chance to analyze the client data for a long time to extract the sensitive information, which is responsible for the privacy violation of clients. This paper proposes an approach that firstly maintains the confidentiality, integrity, and authentication for the stored data in cloud. Secondly, it presents distributed storage cloud architecture, which includes the description of trusted computing work group (TCG) and trusted platform module (TPM). It provides hardware authentication for trustworthy computing platform and also uses Kerberos authentication to avoid software attacks. This proposed approach establishes file locality by clustering the related data based on their physical distance and effective matching with client applications. It supports efficient clustering and reduces communication cost in large-scale cloud computing applications.","PeriodicalId":138199,"journal":{"name":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Data Mining and Intelligent Computing (ICDMIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDMIC.2014.6954254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Cloud Computing is a vast infrastructural and rising pool, which provides huge storage of data in one sphere. Organizations, now a days are in the marathon of equipping the whole system in a cloud form. The attackers evaluating data for a long time to extract the valued information to perform data mining based attacks on the cloud. In the recent architectures the data is sited in a single or distributed cloud provider. It gives the opportunity to the cloud providers and attackers to unauthorized access from cloud and also gives the chance to analyze the client data for a long time to extract the sensitive information, which is responsible for the privacy violation of clients. This paper proposes an approach that firstly maintains the confidentiality, integrity, and authentication for the stored data in cloud. Secondly, it presents distributed storage cloud architecture, which includes the description of trusted computing work group (TCG) and trusted platform module (TPM). It provides hardware authentication for trustworthy computing platform and also uses Kerberos authentication to avoid software attacks. This proposed approach establishes file locality by clustering the related data based on their physical distance and effective matching with client applications. It supports efficient clustering and reduces communication cost in large-scale cloud computing applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
NUYA:保护云数据免受数据挖掘攻击的加密机制
云计算是一个巨大的基础设施和不断上升的池,它在一个领域提供了巨大的数据存储。组织,现在每天都在以云的形式装备整个系统。攻击者对数据进行长时间的评估,从中提取有价值的信息,在云上进行基于数据挖掘的攻击。在最近的体系结构中,数据位于单个或分布式云提供商中。它为云提供商和攻击者提供了从云进行未经授权访问的机会,也为长期分析客户端数据提取敏感信息提供了机会,这对客户端的隐私侵犯负有责任。本文提出了一种首先维护云存储数据的机密性、完整性和身份验证的方法。其次,提出了分布式存储云架构,包括可信计算工作组(TCG)和可信平台模块(TPM)的描述;它为可信计算平台提供硬件认证,并使用Kerberos认证来避免软件攻击。该方法基于物理距离对相关数据进行聚类,并与客户端应用程序进行有效匹配,从而确定文件的局部性。在大规模云计算应用中,支持高效集群,降低通信成本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Interactive image segmentation by dynamic region merging Effective intrusion detection system using semi-supervised learning An approach to generate students' response on learning environment using Association Rule Mining Visual and textual summarization of webpages Handling data incompleteness using Rough Sets on multiple decision systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1