Cloud Data Transfer and Harmful Activity Detection using

K. Venkatesan, V. M. Jothiprakash, T.Nalini
{"title":"Cloud Data Transfer and Harmful Activity Detection using","authors":"K. Venkatesan, V. M. Jothiprakash, T.Nalini","doi":"10.58599/ijsmem.2023.1401","DOIUrl":null,"url":null,"abstract":"Many sectors have begun adopting cloud computing. The hazards associated with virtualization and the dispersed nature of the cloud have resulted in a number of reported security threats and attacks. The complicated system and robust design necessitate a foundation of the fundamentals. In this paper, we introduce a fool proof system for authenticating and exchanging cloud data. An effective IPSO-KELM can identify malicious actions taken by users. The origin of the data is verified first. The IPSO-KELM then decides whether the data was malicious or authentic once the sender has been verified and before it is sent to the cloud. The SHA256-RSA technique protects normal data in transit. In this article, we compare and contrast the suggested IPSO-KELM and SHA256-RSA technique to identifying fraudulent users and sharing data in the cloud with other methods.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Methods in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58599/ijsmem.2023.1401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Many sectors have begun adopting cloud computing. The hazards associated with virtualization and the dispersed nature of the cloud have resulted in a number of reported security threats and attacks. The complicated system and robust design necessitate a foundation of the fundamentals. In this paper, we introduce a fool proof system for authenticating and exchanging cloud data. An effective IPSO-KELM can identify malicious actions taken by users. The origin of the data is verified first. The IPSO-KELM then decides whether the data was malicious or authentic once the sender has been verified and before it is sent to the cloud. The SHA256-RSA technique protects normal data in transit. In this article, we compare and contrast the suggested IPSO-KELM and SHA256-RSA technique to identifying fraudulent users and sharing data in the cloud with other methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云数据传输和有害活动检测使用
许多行业已经开始采用云计算。与虚拟化和云的分散性相关的危险导致了许多安全威胁和攻击。复杂的系统和稳健的设计需要一个基础的基础。在本文中,我们介绍了一个验证和交换云数据的防傻瓜系统。有效的IPSO-KELM可以识别用户的恶意行为。首先验证数据的来源。IPSO-KELM在发送者被验证后,在发送者被发送到云端之前,决定数据是恶意的还是真实的。SHA256-RSA技术保护传输中的正常数据。在本文中,我们比较和对比了建议的IPSO-KELM和SHA256-RSA技术,以识别欺诈用户并与其他方法共享云中的数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementation of small cell antenna based massive MIMO system for high spectrum and energy efficiencies Information Preservation and Restore Strategies for the Cloud Era Energy-Saving Smart-Home Automation System Based on the Internet of Things Content based word image retrieval using multi-layer perception based convolutional neural networks A Review on low-Power VLSI CMOS and CNTFET Circuits
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1