A machine learning application for reducing the security risks in hybrid cloud networks

Слайд 2

Outline: Introduction Objectives Methodology Results and conclusion References

Outline:

Introduction
Objectives
Methodology
Results and conclusion
References

Слайд 3

Слайд 4

Introduction Cloud computing facilitates enormous support of the public, business and emerging applications.

Introduction

Cloud computing facilitates enormous support of the public, business and emerging

applications.
Слайд 5

Introduction In cloud network environment, the data security is playing crucial roles.

Introduction

In cloud network environment, the data security is playing crucial roles.


Слайд 6

Deduplication process

Deduplication process

Слайд 7

Objectives Introduce a new access control mechanism which is working dynamic

Objectives

Introduce a new access control mechanism which is working dynamic

in nature that is based on time and place.
Create a new deduplication process for storing the data securely and also for avoiding the data duplication during the retrieval process
Слайд 8

System architecture

System architecture

Слайд 9

Proposed work DDPA DSRBACA

Proposed work

DDPA

DSRBACA

Слайд 10

DDPA:

DDPA:

Слайд 11

DDPA:

DDPA:

Слайд 12

Dynamic spatial role based access control algorithm

Dynamic spatial role based access control algorithm

Слайд 13

DSRBACA:

DSRBACA:

Слайд 14

Слайд 15

Слайд 16

Results and conclusion A new machine learning application has been developed

Results and conclusion

A new machine learning application has been developed for

providing security to the hybrid cloud networks while storing the data and retrieving or accessing the data from cloud databases.


Слайд 17

References 1. Alabdulatif A, Kumarage H, Khalil I, Yi X (2017)

References

1. Alabdulatif A, Kumarage H, Khalil I, Yi X (2017)

Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J Comput Syst Sci 90:28–45
2. Elumalaivasan P, Kulothungan K, Ganapathy S, Kannan A (2016) Trust based Ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Aust J Basic Appl Sci 10(2):18–26
3. Gordon A (2016) The hybrid cloud security professional. IEEE Cloud Comput 3(1):82–86
4. Helmi AM, Farhan MS, Nasr MM (2018) A framework for integrating geospatial information systems and hybrid cloud computing. Comput Electr Eng 67:145–158
5. Hudic A, Smith P, Weippl ER (2017) Security assurance assessment methodology for hybrid clouds. Comput Sec 70:723–743