{"title":"评估区块链、深度学习和加密算法在云安全中的作用","authors":"H. Andi","doi":"10.36548/jtcsst.2021.4.006","DOIUrl":null,"url":null,"abstract":"Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security\",\"authors\":\"H. Andi\",\"doi\":\"10.36548/jtcsst.2021.4.006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.\",\"PeriodicalId\":107574,\"journal\":{\"name\":\"Journal of Trends in Computer Science and Smart Technology\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Trends in Computer Science and Smart Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36548/jtcsst.2021.4.006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Trends in Computer Science and Smart Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36548/jtcsst.2021.4.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.