Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security

Abstract For the cloud security or intrusion detection system (IDS) an effective scheme for prediction and privacy preservation is employed with the use of enhanced Honeypot algorithm. At first, the dataset is preprocessed with the use of normalization method at which the missing values were replaced and an unwanted data will be removed. After that, features are extracted and best features were selected with the use of GLCM algorithm. The classifier is then accountable for the prediction of target and a novel CNN classifier is used for this which in turn offers high rate of accuracy in the prediction of attack. The data is then kept in the server of cloud for monitoring and maintenance purpose. It is vital to keep and secure the data from an intrusion or any other attack. In order tocontent this scheme of privacy reservation, a technique of cryptography isused in this approach. The Honeypot algorithm of cryptography is utilized for the use of encryption. As, the data owner requests for the file, the cloud server is then responsible for key generation and to verify this key with user for the purpose of authentication. After the provision of key, the file is decrypted using Honeypot algorithm and a decrypted file will be retrieved by the user. In conclusion, the performance analysis is carried and the comparative analysis of existing and proposed techniques is made for proving the proposed scheme effectiveness.

[1]  Aderemi Oluyinka Adewumi,et al.  Improved Instance Selection Methods for Support Vector Machine Speed Optimization , 2017, Secur. Commun. Networks.

[2]  Shahzad Qaiser,et al.  Text Mining: Use of TF-IDF to Examine the Relevance of Words to Documents , 2018, International Journal of Computer Applications.

[3]  Donald E. Brown,et al.  HDLTex: Hierarchical Deep Learning for Text Classification , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[4]  Hassan N. Noura,et al.  Cyber-physical systems security: Limitations, issues and future trends , 2020, Microprocessors and Microsystems.

[5]  M. K. Kavitha Devi,et al.  A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks , 2020, Wireless Personal Communications.

[6]  S ManoharNaik,et al.  A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System , 2016 .

[7]  Hao Chen,et al.  Mitosis Detection in Breast Cancer Histology Images via Deep Cascaded Networks , 2016, AAAI.

[8]  Jong Hyuk Park,et al.  A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing , 2017, Microprocess. Microsystems.

[9]  Shasha Wang,et al.  Deep feature weighting for naive Bayes and its application to text classification , 2016, Eng. Appl. Artif. Intell..

[10]  Pratistha Mathur,et al.  Efficient image steganography using graph signal processing , 2018, IET Image Process..

[11]  K. Thenmozhi,et al.  Quantum polarized image encryption — A secure communication , 2017, 2017 International Conference on Computer Communication and Informatics (ICCCI).

[12]  Yogesh Palanichamy,et al.  Securing VPN from insider and outsider bandwidth flooding attack , 2020, Microprocess. Microsystems.

[13]  Binod Kumar Pattanayak,et al.  Prevention of Replay Attack Using Intrusion Detection System Framework , 2019 .

[14]  Kartik Shankar,et al.  An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm , 2016 .

[15]  Kichun Lee,et al.  Opinion mining using ensemble text hidden Markov models for text classification , 2018, Expert Syst. Appl..

[16]  R. Santhana Krishnan,et al.  Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks , 2019, Wireless Networks.

[17]  Bhaskar Mondal,et al.  Cryptographic Image Scrambling Techniques , 2018, Cryptographic and Information Security.

[18]  S. O. Abdulsalam Text Classification Using Data Mining Techniques: A Review , 2018 .

[19]  Athanasios V. Vasilakos,et al.  Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.

[20]  Yilong Yin,et al.  Deep learning model based breast cancer histopathological image classification , 2017, 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).

[21]  Junqi Yang,et al.  Observer-Based Synchronization of Chaotic Systems Satisfying Incremental Quadratic Constraints and Its Application in Secure Communication , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[22]  Virginijus Marcinkevičius,et al.  Comparison of Naive Bayes, Random Forest, Decision Tree, Support Vector Machines, and Logistic Regression Classifiers for Text Reviews Classification , 2017, Balt. J. Mod. Comput..

[23]  Sunil Kumar Khatri,et al.  A Security Model for the Enhancement of Data Privacy in Cloud Computing , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).

[24]  Suyel Namasudra,et al.  An improved attribute‐based encryption technique towards the data security in cloud computing , 2019, Concurr. Comput. Pract. Exp..

[25]  Rajendra Gupta,et al.  Experimental Analysis of Browser based Novel Anti-Phishing System Tool at Educational Level , 2016 .