Voice-Authentication Model Based on Deep Learning for Cloud Environment

Ethar Abdul Wahhab Hachim, Methaq Talib Gaata, Thekra Abbas
{"title":"Voice-Authentication Model Based on Deep Learning for Cloud Environment","authors":"Ethar Abdul Wahhab Hachim, Methaq Talib Gaata, Thekra Abbas","doi":"10.30630/joiv.7.3.1303","DOIUrl":null,"url":null,"abstract":"Cloud computing is becoming an essential technology for many organizations that are dynamically scalable and employ virtualized resources as a service done over the Internet. The security and privacy of the data stored in the cloud is cloud providers' main target. Every person wants to keep his data safe and store it in a secure place. The user considers cloud storage the best option to keep his data confidential without losing it. Authentication in the trusted cloud environment allows making knowledgeable authorization decisions for access to the protected individual's data. Voice authentication, also known as voice biometrics, depends on an individual's unique voice patterns for identification to access personal and sensitive data. The essential principle for voice authentication is that every person's voice differs in tone, pitch, and volume, which is adequate to make it uniquely distinguishable. This paper uses voice metric as an identifier to determine the authorized customers that can access the data in a cloud environment without risk. The Convolution Neural Network (CNN) architecture is proposed for identifying and classifying authorized and unauthorized people based on voice features. In addition, the 3DES algorithm is used to protect the voice features during the transfer between the client and cloud sides. In the testing, the experimental results of the proposed model achieve a high level of accuracy, reaching about 98%, and encryption efficiency metrics prove the proposed model's robustness against intended attacks to obtain the data.","PeriodicalId":32468,"journal":{"name":"JOIV International Journal on Informatics Visualization","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOIV International Journal on Informatics Visualization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30630/joiv.7.3.1303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud computing is becoming an essential technology for many organizations that are dynamically scalable and employ virtualized resources as a service done over the Internet. The security and privacy of the data stored in the cloud is cloud providers' main target. Every person wants to keep his data safe and store it in a secure place. The user considers cloud storage the best option to keep his data confidential without losing it. Authentication in the trusted cloud environment allows making knowledgeable authorization decisions for access to the protected individual's data. Voice authentication, also known as voice biometrics, depends on an individual's unique voice patterns for identification to access personal and sensitive data. The essential principle for voice authentication is that every person's voice differs in tone, pitch, and volume, which is adequate to make it uniquely distinguishable. This paper uses voice metric as an identifier to determine the authorized customers that can access the data in a cloud environment without risk. The Convolution Neural Network (CNN) architecture is proposed for identifying and classifying authorized and unauthorized people based on voice features. In addition, the 3DES algorithm is used to protect the voice features during the transfer between the client and cloud sides. In the testing, the experimental results of the proposed model achieve a high level of accuracy, reaching about 98%, and encryption efficiency metrics prove the proposed model's robustness against intended attacks to obtain the data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云环境下基于深度学习的语音认证模型
云计算正在成为许多组织的基本技术,这些组织可以动态伸缩,并将虚拟化资源作为在Internet上完成的服务来使用。存储在云中的数据的安全性和隐私性是云提供商的主要目标。每个人都想保证自己的数据安全,并将其存储在一个安全的地方。用户认为云存储是保持数据机密而不丢失的最佳选择。可信云环境中的身份验证允许为访问受保护个人的数据做出明智的授权决策。声音认证,也被称为声音生物识别,依靠个人独特的声音模式来识别个人和敏感数据。声音认证的基本原则是,每个人的声音在音调、音高和音量上都是不同的,这足以使它成为唯一的区分。本文使用语音度量作为标识符来确定在云环境中可以无风险访问数据的授权客户。提出了一种基于语音特征的卷积神经网络(CNN)架构,用于识别和分类授权人员和未授权人员。此外,在客户端与云端传输过程中,采用3DES算法保护语音特征。在测试中,所提模型的实验结果达到了较高的准确率,达到98%左右,并且加密效率指标证明了所提模型对于获取数据的预期攻击的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
JOIV International Journal on Informatics Visualization
JOIV International Journal on Informatics Visualization Decision Sciences-Information Systems and Management
CiteScore
1.40
自引率
0.00%
发文量
100
审稿时长
16 weeks
期刊最新文献
Composition Model of Organic Waste Raw Materials Image-Based To Obtain Charcoal Briquette Energy Potential Visualization Mapping of the Socio-Technical Architecture based on Tongkonan Traditional House Skew Correction and Image Cleaning Handwriting Recognition Using a Convolutional Neural Network 433Mhz based Robot using PID (Proportional Integral Derivative) for Precise Facing Direction Closer Look at Image Classification for Indonesian Sign Language with Few-Shot Learning Using Matching Network Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1