تعداد نشریات | 31 |
تعداد شمارهها | 710 |
تعداد مقالات | 6,925 |
تعداد مشاهده مقاله | 11,392,044 |
تعداد دریافت فایل اصل مقاله | 7,763,143 |
A fuzzy optimal lightweight convolutional neural network for deduplication detection in cloud server | ||
Iranian Journal of Fuzzy Systems | ||
دوره 21، شماره 1، فروردین و اردیبهشت 2024، صفحه 33-49 اصل مقاله (1.23 M) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22111/ijfs.2023.45797.8070 | ||
نویسندگان | ||
Periasamy JK* 1؛ Selvam L2؛ Anuradha M3؛ R Kennady4 | ||
1Sri Sairam Engineering College, chennai | ||
2K S R Institute for Engineering and Technology | ||
3S A Engineering college | ||
4Rajalakshmi Institute of Technology Kuthambakkam | ||
چکیده | ||
Nowadays the cloud computing environment is widely utilized for transmitting and receiving data securely. Inorder to secure the data the encryption method is used but still due to some limitations the security process is diminished. Therefore, this paper proposes a new algorithm to provide better security while transmitting data through the network. At first, the sensitivity of data is determined using a lightweight convolutional neural network (LWCNN) model which is used to categorize the unclassified data into two categories normal sensitive data and highly sensitive data. After determining the level of data sensitivity, the encryption process is performed further. The efficient hash function-based duplication detection approach is employed to maintain confidential information before outsourcing it to a cloud server. Subsequently, the ideal keys are generated for each data based on its sensitivity level using the proposed fuzzy tuna swarm (FTS) algorithm. Finally, the data is encrypted by converting plain text into ciphertext which is only visible to authorized users. The experimental results show that the LWCNN model utilized for data sensitivity classification achieved 94% accuracy and the FTS algorithm proposed for optimal key generation took much less communication time of about 1800μs than other compared techniques. | ||
کلیدواژهها | ||
Security؛ Encryption؛ Key generation؛ Lightweight convolutional neural network؛ Fuzzy logic system؛ Tuna swarm optimization algorithm | ||
مراجع | ||
[1] S. T. Ahmed, L. E. George, Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors, Journal of King Saud University-Computer and Information Sciences, 34(7) (2022), 4669-4678. [2] B. Arpac, E. Kurt, K. C elik, B. Ciylan, Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit, Journal of Electrical Engineering and Technology, 15(3) (2020), 1413-1429. [3] E. Y. Baagyere, P. A. N. Agbedemnab, Z. Qin, M. I. Daabo, Z. Qin, A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers, IEEE Access, 8 (2020), 100438-100447. [4] M. U. Bokhari, Q. M. Shallal, Y. K. Tamandani, Reducing the required time and power for data encryption and decryption using K-NN machine learning, IETE Journal of Research, 65(2) (2019), 227-235. [5] R. Chen, X. Li, S. Li, A lightweight CNN model for re ning moving vehicle detection from satellite videos, IEEE Access, 8 (2020), 221897-221917. [6] Y. Ding, F. Tan, Z. Qin, M. Cao, K. K. R. Choo, Z. Qin, DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption, IEEE Transactions on Neural Networks and Learning Systems, 2021. [7] Y. Ding, G. Wu, D. Chen, N. Zhang, L. Gong, M. Cao, Z. Qin, DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things, IEEE Internet of Things Journal, 8(3) (2020), 1504-1518. [8] C. Feng, K. Yu, M. Aloqaily, M. Alazab, Z. Lv, S. Mumtaz, Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV, IEEE Transactions on Vehicular Technology, 69(11) (2020), 13784-13795. [9] O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. A. D. Abed, A. T. Hammid, Implementation of El-Gamal algorithm for speech signals encryption and decryption, Procedia Computer Science, 167 (2020), 1028-1037. [10] P. Li, L. Han, X. Tao, X. Zhang, C. Grecos, A. Plaza, P. Ren, Hashing nets for hashing: A quantized deep learning to hash framework for remote sensing image retrieval, IEEE Transactions on Geoscience and Remote Sensing, 58(10) (2020), 7331-7345. [11] D. Liu, J. Shen, A. Wang, C. Wang, Secure real-time image protection scheme with near-duplicate detection in cloud computing, Journal of Real-Time Image Processing, 17(1) (2020), 175-184. [12] A. C. Mert, E. Ozturk, E. Sava, Design and implementation of encryption/decryption architectures for BFV homomorphic encryption scheme, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 28(2) (2019), 353-362. [13] S. Patel, K. P. Bharath, R. Kumar, Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique, Multimedia Tools and Applications, 79(43) (2020), 31739-31757. [14] J. K. Periasamy, B. Latha, An enhanced secure content de-duplication identi cation and prevention (ESCDIP) algorithm in cloud environment, Neural Computing and Applications, 32(2) (2020), 485-494. [15] J. K. Periasamy, B. Latha, Ecient hash function-based duplication detection algorithm for data deduplication deduction and reduction, Concurrency and Computation: Practice and Experience, 33(3) (2021), 5213. [16] K. Shankar, S. K. Lakshmanaprabu, D. Gupta, A. Khanna, V. H. C. de Albuquerque, Adaptive optimal multi key based encryption for digital image security, Concurrency and Computation: Practice and Experience, 32(4) (2020), 5122. [17] Q. Song, Q. Zhao, S. Wang, Q. Liu, X. Chen, Dynamic path planning for unmanned vehicles based on fuzzy logic and improved ant colony optimization, IEEE Access, 8 (2020), 62107-62115. [18] X. Wu, J. Gao, G. Ji, T. Wu, Y. Tian, N. Al-Nabhan, A feature-based intelligent deduplication compression system with extreme resemblance detection, Connection Science, 33(3) (2021), 576-604. [19] L. Xie, T. Han, H. Zhou, Z. R. Zhang, B. Han, A. Tang, Tuna swarm optimization: A novel swarm-based meta- heuristic algorithm for global optimization, Computational Intelligence and Neuroscience, 2021. [20] S. R. Zeebaree, DES encryption and decryption algorithm implementation based on FPGA, Indonesian Journal of Electrical Engineering and Computer Science, 18(2) (2020), 774-781. | ||
آمار تعداد مشاهده مقاله: 487 تعداد دریافت فایل اصل مقاله: 560 |