Skip to main content
Top
Published in: Wireless Networks 2/2023

03-10-2022 | Original Paper

Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security

Authors: V. Balamurugan, R. Karthikeyan, B. Sundaravadivazhagan, Robin Cyriac

Published in: Wireless Networks | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing refers to a set of hardware and software that are connected to provide various computing services. Cloud consists of services to deliver software, infrastructure and platform over the internet depending on user demand. However, various categories of vulnerabilities and threats are increased, due to the improved demand and development of cloud computing. In cloud computing, data integrity and security are the main issues, which is reduced the system performance. Therefore, an Enhanced Elman Spike Neural Network (EESNN) based Fractional Order Discrete Tchebyshev moments (FrDTMs) encryption fostered big data analytical method is proposed in this manuscript for enhancing cloud data security. Initially, the input data is pre-processed using a Z-score normalization process. Also, the optimal features are implemented by Uni-variate ensemble feature selection technique, which can improve the quality and reliability of data. The proposed EESNN model is used to classify the attack types in cloud databases and the security is improved by FrDTMs model. The proposed EESNN-FrDTMs approach has achieved high data security and performance. The simulation of this model is done using JAVA. From the simulation, the proposed model attains 11.58%, 26.6%, 25.5%, 45.75%, 36.88% high accuracy, 7.37%, 15.43%, 8.68%, 11.42%, 16.88% lower information loss than the existing approaches, like PSO-PNN, eHIPF, GSNN-FEO, and BISNN-BO respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kobusińska, A., Leung, C., Hsu, C. H., Raghavendra, S., & Chang, V. (2018). Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing. Future Generation Computer Systems, 87, 416–419.CrossRef Kobusińska, A., Leung, C., Hsu, C. H., Raghavendra, S., & Chang, V. (2018). Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing. Future Generation Computer Systems, 87, 416–419.CrossRef
2.
go back to reference Awaysheh, F. M., Aladwan, M. N., Alazab, M., Alawadi, S., Cabaleiro, J. C. & Pena, T. F. (2021). Security by design for big data frameworks over cloud computing. IEEE Transactions on Engineering Management. Awaysheh, F. M., Aladwan, M. N., Alazab, M., Alawadi, S., Cabaleiro, J. C. & Pena, T. F. (2021). Security by design for big data frameworks over cloud computing. IEEE Transactions on Engineering Management.
3.
go back to reference Liu, C., Feng, Y., Lin, D., Wu, L., & Guo, M. (2020). Iot based laundry services: An application of big data analytics, intelligent logistics management, and machine learning techniques. International Journal of Production Research, 58(17), 5113–5131.CrossRef Liu, C., Feng, Y., Lin, D., Wu, L., & Guo, M. (2020). Iot based laundry services: An application of big data analytics, intelligent logistics management, and machine learning techniques. International Journal of Production Research, 58(17), 5113–5131.CrossRef
4.
go back to reference Alabdulatif, A., Khalil, I., & Yi, X. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137, 192–204.CrossRef Alabdulatif, A., Khalil, I., & Yi, X. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137, 192–204.CrossRef
5.
go back to reference Wen, Y., Liu, J., Dou, W., Xu, X., Cao, B., & Chen, J. (2020). Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Generation Computer Systems, 108, 1084–1091.CrossRef Wen, Y., Liu, J., Dou, W., Xu, X., Cao, B., & Chen, J. (2020). Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Generation Computer Systems, 108, 1084–1091.CrossRef
6.
go back to reference Stergiou, C., & Psannis, K. E. (2017). Efficient and secure big data delivery in cloud computing. Multimedia Tools and Applications, 76(21), 22803–22822.CrossRef Stergiou, C., & Psannis, K. E. (2017). Efficient and secure big data delivery in cloud computing. Multimedia Tools and Applications, 76(21), 22803–22822.CrossRef
7.
go back to reference Sun, Y., Liu, Q., Chen, X., & Du, X. (2020). An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Transactions on Information Forensics and Security, 15, 3295–3310.CrossRef Sun, Y., Liu, Q., Chen, X., & Du, X. (2020). An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Transactions on Information Forensics and Security, 15, 3295–3310.CrossRef
8.
go back to reference Ji, Y., Shao, B., Chang, J., & Bian, G. (2020). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Applied Mathematics and Computation, 386, 125478.CrossRefMATH Ji, Y., Shao, B., Chang, J., & Bian, G. (2020). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Applied Mathematics and Computation, 386, 125478.CrossRefMATH
9.
go back to reference Han, W., & Xiao, Y. (2020). Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1697–1708.CrossRef Han, W., & Xiao, Y. (2020). Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1697–1708.CrossRef
10.
go back to reference Muheidat, F. & Tawalbeh, L. A. (2021). Mobile and cloud computing security. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 461–483). Springer, Cham. Muheidat, F. & Tawalbeh, L. A. (2021). Mobile and cloud computing security. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 461–483). Springer, Cham.
11.
go back to reference Rajesh, P., Shajin, F. H., & Cherukupalli, K. (2021). An efficient hybrid tunicate swarm algorithm and radial basis function searching technique for maximum power point tracking in wind energy conversion system. Journal of Engineering, Design and Technology. Rajesh, P., Shajin, F. H., & Cherukupalli, K. (2021). An efficient hybrid tunicate swarm algorithm and radial basis function searching technique for maximum power point tracking in wind energy conversion system. Journal of Engineering, Design and Technology.
12.
go back to reference Shajin, F. H., & Rajesh, P. (2022). FPGA realization of a reversible data hiding scheme for 5G MIMO-OFDM system by chaotic key generation-based paillier cryptography along with LDPC and its side channel estimation using machine learning technique. Journal of Circuits, Systems and Computers, 31(05), 2250093.CrossRef Shajin, F. H., & Rajesh, P. (2022). FPGA realization of a reversible data hiding scheme for 5G MIMO-OFDM system by chaotic key generation-based paillier cryptography along with LDPC and its side channel estimation using machine learning technique. Journal of Circuits, Systems and Computers, 31(05), 2250093.CrossRef
13.
go back to reference Rajesh, P., Muthubalaji, S., Srinivasan, S., & Shajin, F. H. (2022). Leveraging a dynamic differential annealed optimization and recalling enhanced recurrent neural network for maximum power point tracking in wind energy conversion system. Technology and Economics of Smart Grids and Sustainable Energy, 7(1), 1–15.CrossRef Rajesh, P., Muthubalaji, S., Srinivasan, S., & Shajin, F. H. (2022). Leveraging a dynamic differential annealed optimization and recalling enhanced recurrent neural network for maximum power point tracking in wind energy conversion system. Technology and Economics of Smart Grids and Sustainable Energy, 7(1), 1–15.CrossRef
14.
go back to reference Shajin, F. H., Rajesh, P., & Raja, M. R. (2022). An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits, Systems, and Signal Processing, 41(3), 1751–1774.CrossRef Shajin, F. H., Rajesh, P., & Raja, M. R. (2022). An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits, Systems, and Signal Processing, 41(3), 1751–1774.CrossRef
15.
go back to reference Premkamal, P. K., Pasupuleti, S. K., Singh, A. K., & Alphonse, P. J. A. (2021). Enhanced attribute based access control with secure deduplication for big data storage in cloud. Peer-to-Peer Networking and Applications, 14(1), 102–120.CrossRef Premkamal, P. K., Pasupuleti, S. K., Singh, A. K., & Alphonse, P. J. A. (2021). Enhanced attribute based access control with secure deduplication for big data storage in cloud. Peer-to-Peer Networking and Applications, 14(1), 102–120.CrossRef
16.
go back to reference Wang, L., & Jones, R. (2021). Big data analytics in cyber security: Network traffic and attacks. Journal of Computer Information Systems, 61(5), 410–417.CrossRef Wang, L., & Jones, R. (2021). Big data analytics in cyber security: Network traffic and attacks. Journal of Computer Information Systems, 61(5), 410–417.CrossRef
17.
go back to reference Rjoub, G., Bentahar, J., & Wahab, O. A. (2020). BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments. Future Generation Computer Systems, 110, 1079–1097.CrossRef Rjoub, G., Bentahar, J., & Wahab, O. A. (2020). BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments. Future Generation Computer Systems, 110, 1079–1097.CrossRef
18.
go back to reference Gudditti, V. & Krishna, P. V. (2021). Light weight encryption model for map reduce layer to preserve security in the big data and cloud. Materials Today: Proceedings. Gudditti, V. & Krishna, P. V. (2021). Light weight encryption model for map reduce layer to preserve security in the big data and cloud. Materials Today: Proceedings.
19.
go back to reference Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387–394.CrossRef Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387–394.CrossRef
20.
go back to reference Hongsong, C., Yongpeng, Z., Yongrui, C., & Bhargava, B. (2021). Security threats and defensive approaches in machine learning system under big data environment. Wireless Personal Communications, 117(4), 3505–3525.CrossRef Hongsong, C., Yongpeng, Z., Yongrui, C., & Bhargava, B. (2021). Security threats and defensive approaches in machine learning system under big data environment. Wireless Personal Communications, 117(4), 3505–3525.CrossRef
21.
go back to reference Mondal, A., & Goswami, R. T. (2021). Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocessors and Microsystems, 81, 103719.CrossRef Mondal, A., & Goswami, R. T. (2021). Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocessors and Microsystems, 81, 103719.CrossRef
22.
go back to reference Krishnaveni, S., Sivamohan, S., Sridhar, S. S., & Prabakaran, S. (2021). Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, 1–19. Krishnaveni, S., Sivamohan, S., Sridhar, S. S., & Prabakaran, S. (2021). Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, 1–19.
23.
go back to reference Al-Jamali, N. A. S., & Al-Raweshidy, H. S. (2020). Modified Elman spike neural network for identification and control of dynamic system. IEEE Access, 8, 61246–61254.CrossRef Al-Jamali, N. A. S., & Al-Raweshidy, H. S. (2020). Modified Elman spike neural network for identification and control of dynamic system. IEEE Access, 8, 61246–61254.CrossRef
24.
go back to reference Xiao, B., Luo, J., Bi, X., Li, W., & Chen, B. (2020). Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Information Sciences, 516, 545–559.CrossRefMATH Xiao, B., Luo, J., Bi, X., Li, W., & Chen, B. (2020). Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Information Sciences, 516, 545–559.CrossRefMATH
25.
go back to reference Mohammad, A. S., & Pradhan, M. R. (2021). Machine learning with big data analytics for cloud security. Computers & Electrical Engineering, 96, 107527.CrossRef Mohammad, A. S., & Pradhan, M. R. (2021). Machine learning with big data analytics for cloud security. Computers & Electrical Engineering, 96, 107527.CrossRef
26.
go back to reference Lo’ai, A. T., & Saldamli, G. (2021). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences, 33(7), 810–819.CrossRef Lo’ai, A. T., & Saldamli, G. (2021). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences, 33(7), 810–819.CrossRef
27.
go back to reference Narayanan, U., Paul, V., & Joseph, S. (2020). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University-Computer and Information Sciences. Narayanan, U., Paul, V., & Joseph, S. (2020). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University-Computer and Information Sciences.
28.
go back to reference Viswanath, G., & Krishna, P. V. (2021). Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence, 14(2), 691–698.CrossRef Viswanath, G., & Krishna, P. V. (2021). Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence, 14(2), 691–698.CrossRef
29.
go back to reference Stergiou, C. L., Plageras, A. P., Psannis, K. E., & Gupta, B. B. (2020). Secure machine learning scenario from big data in cloud computing via internet of things network. In Handbook of computer networks and cyber security (pp. 525–554). Springer. Stergiou, C. L., Plageras, A. P., Psannis, K. E., & Gupta, B. B. (2020). Secure machine learning scenario from big data in cloud computing via internet of things network. In Handbook of computer networks and cyber security (pp. 525–554). Springer.
30.
go back to reference Rabbani, M., Wang, Y. L., Khoshkangini, R., Jelodar, H., Zhao, R., & Hu, P. (2020). A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, 151, 102507.CrossRef Rabbani, M., Wang, Y. L., Khoshkangini, R., Jelodar, H., Zhao, R., & Hu, P. (2020). A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, 151, 102507.CrossRef
31.
go back to reference Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. (2019). Intelligent approach to build a deep neural network based IDS for cloud environment using combination of machine learning algorithms. Computers & Security, 86, 291–317.CrossRef Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. (2019). Intelligent approach to build a deep neural network based IDS for cloud environment using combination of machine learning algorithms. Computers & Security, 86, 291–317.CrossRef
33.
go back to reference Phan, T. V., & Park, M. (2019). Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access, 7, 18701–18714.CrossRef Phan, T. V., & Park, M. (2019). Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access, 7, 18701–18714.CrossRef
34.
go back to reference Pitti, A., Quoy, M., Lavandier, C., & Boucenna, S. (2020). Gated spiking neural network using Iterative free-energy optimization and rank-order coding for structure learning in memory sequences (INFERNO GATE). Neural Networks, 121, 242–258.CrossRef Pitti, A., Quoy, M., Lavandier, C., & Boucenna, S. (2020). Gated spiking neural network using Iterative free-energy optimization and rank-order coding for structure learning in memory sequences (INFERNO GATE). Neural Networks, 121, 242–258.CrossRef
35.
go back to reference Kim, S., Park, S., Na, B., Kim, J., & Yoon, S. (2020). Towards fast and accurate object detection in bio-inspired spiking neural networks through Bayesian optimization. IEEE Access, 9, 2633–2643.CrossRef Kim, S., Park, S., Na, B., Kim, J., & Yoon, S. (2020). Towards fast and accurate object detection in bio-inspired spiking neural networks through Bayesian optimization. IEEE Access, 9, 2633–2643.CrossRef
Metadata
Title
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
Authors
V. Balamurugan
R. Karthikeyan
B. Sundaravadivazhagan
Robin Cyriac
Publication date
03-10-2022
Publisher
Springer US
Published in
Wireless Networks / Issue 2/2023
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-03142-2

Other articles of this Issue 2/2023

Wireless Networks 2/2023 Go to the issue