Investigation of Machine Learning Approaches on Security Analysis of Cryptographic Algorithms

Investigation of Machine Learning Approaches on Security Analysis of Cryptographic Algorithms

DOI: 10.4018/979-8-3693-4159-9.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The distributed denial of service (DDoS) assault was a kind of intrusion in the cloud computing environment that severely affects the end user by injecting illegitimate packets. To obtain performance, a hybrid improved wolf optimizer with asymmetric key Goldwasser cryptography (IWO-AKGC) algorithm was proposed based on combining the exploitation ability of security and exploration capability of machine learning. In addition to the selection of parameters, a proposed hybrid IWO-AKGC technique is used for weighting and bias coefficients in neural network models. This has led to an immediate improvement in communication security for the delivery of different types of data services via clouds, thanks to the proposed IWO-AKGC method. The recommended hybrid optimizer successfully addresses the drawbacks of conventional methods, such as local stagnation problems, delayed convergence problems, and local and global optimal trapping problems. Thus, secured data communication is obtained for cloud service provisioning. The proposed model proved to be a better model for DDoS intrusion detection.
Chapter Preview
Top

Introduction

Cloud computing was a promising technology based on the internet and its environment. It offers various services to users. From all the Storage-as-a-Service (StaaS), cloud services, enable the users and associations to accumulate data on remote disks and utilize it at any time from any place. It also supports the cloud applications to adapt their functions within the restricted servers, but the storage of data includes new security threats towards the exactness of data in the cloud. In addition, the self-control of user data creates various viability hazards to cloud data correctness (Thabit et al., 2023)

The term “cloud storage” refers to the Internet space that stores private data or information. It is also possible to store files from physical storage devices in the cloud. The exercise of data security has been essential to ensure that the shared information is confidential and safe.The security of storage helps to verify that the uploaded data is on unreliable cloud servers (Patil et al.,2023). Cloud data storage attains much reputation for individual, project, and organizational data backup and synchronization. Cloud storage systems are projected to experience different rigorous necessities for retaining the user's data and information with high accessibility, consistency, replication, and consistency (Jabbar et al., 2023).

Cryptography is a technique of sustaining message security by altering the data into non-recognizable forms. The major contribution of Crypto CC was to offer cyber resource sharing with high data privacy and security. Security management of CC was also provided by approving the signatures of each element. When data gets altered or modified by any illegal access, special attention is to be provided to secure sensitive data (Wankhade et al., 2023). Therefore, cryptographic approaches are developed for performing secure cloud storage. The cryptographic approach encrypts the data before uploading it to the cloud. Figure 1 shows the architecture of cryptography-based Secure Cloud Storage.

Figure 1.

Architecture of cryptography-based secure cloud storage

979-8-3693-4159-9.ch005.f01

As seen in Figure 1, a data owner uses cryptographic techniques to protect sensitive data from unauthorized access. Data encryption offers security to the data before being moved to the cloud (Nam.Y et al., 2023). When an illegal user wants to access sensitive data, decrypting data creates much complexity for unauthorized users to perform the wrong inception. Cryptography involves two types of process

  • Symmetric encryption

  • Asymmetric encryption

Figure 2.

Diagrammatic representation of symmetric cryptography

979-8-3693-4159-9.ch005.f02

Symmetrical encryption employs one secret key. It is added to a message's plain text to transform the contents into a certain format. For all messages to be encrypted and decrypted, both the sender and the recipient must be aware of the secret key (Rafi S et al., n.d.). Figure 2 shows the Diagrammatic representation of Symmetric cryptography involves only a single key which is exploited for encrypting the data before being transmitted. It is to improve the security against third-party users, but issues such as speed, cost factor, and optimization for data sizes are identified in symmetric encryption (Al Zamily et al., 2023).

Complete Chapter List

Search this Book:
Reset