{"title":"Cloud Data Transfer and Harmful Activity Detection using","authors":"K. Venkatesan, V. M. Jothiprakash, T.Nalini","doi":"10.58599/ijsmem.2023.1401","DOIUrl":null,"url":null,"abstract":"Many sectors have begun adopting cloud computing. The hazards associated with virtualization and the dispersed nature of the cloud have resulted in a number of reported security threats and attacks. The complicated system and robust design necessitate a foundation of the fundamentals. In this paper, we introduce a fool proof system for authenticating and exchanging cloud data. An effective IPSO-KELM can identify malicious actions taken by users. The origin of the data is verified first. The IPSO-KELM then decides whether the data was malicious or authentic once the sender has been verified and before it is sent to the cloud. The SHA256-RSA technique protects normal data in transit. In this article, we compare and contrast the suggested IPSO-KELM and SHA256-RSA technique to identifying fraudulent users and sharing data in the cloud with other methods.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Methods in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58599/ijsmem.2023.1401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Many sectors have begun adopting cloud computing. The hazards associated with virtualization and the dispersed nature of the cloud have resulted in a number of reported security threats and attacks. The complicated system and robust design necessitate a foundation of the fundamentals. In this paper, we introduce a fool proof system for authenticating and exchanging cloud data. An effective IPSO-KELM can identify malicious actions taken by users. The origin of the data is verified first. The IPSO-KELM then decides whether the data was malicious or authentic once the sender has been verified and before it is sent to the cloud. The SHA256-RSA technique protects normal data in transit. In this article, we compare and contrast the suggested IPSO-KELM and SHA256-RSA technique to identifying fraudulent users and sharing data in the cloud with other methods.