Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2024

06-02-2024

MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system

Authors: Anuradha M, Jean Justus J, Mary Immaculate Sheela L

Published in: Peer-to-Peer Networking and Applications | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing (CC) is a rapidly growing technology that is deployed by various organizations due to the high level of scalability, elasticity, and virtualization it offers. However, security-related challenges arise due to insecure access control points. Security models in the cloud such as authentication, data recovery, confidentiality, accessibility, and data integrity. This includes the deployment model, barriers in cloud computing, cloud services, and security issues. Data security can be improved via the usage of encryption and decryption keys during transmission. However, the existing techniques often suffered from improved time consumption and complexity in handling more users. This paper mainly focuses on the data security issue with the outsourced sensitive data in the cloud server by designing a novel Modified Multi-scale Convolutional Neural Network-based Zebra Optimization (MMCNN-ZO) approach to improve the cloud data sharing system. The proposed MMCNN-ZO approach safeguards the crucial data effectively and outputs in the form of cipher text/image. Here, the weight functions of the MMCNN are tuned mechanically using the ZO algorithm for the enhanced encryption process. The decryption process is performed to obtain the data in user understandable format. These procedures make the proposed system effectively secure the data content by protecting against intrusions. The efficacy of the proposed MMCNN-ZO method is investigated using diverse evaluation indicators namely throughput, decryption, and encryption time. The proposed MMCNN-ZO algorithm achieved improvements in terms of throughput, encryption time, and decryption time of 7450 bits/sec, 4.82 ms, and 4.86 ms respectively compared to other existing methods of SVM, ANN, BPPSVC, and GBCRP. The experimental results inherit the better performances of the suggested MMCNN-ZO approach over other methods in terms of all metrics.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rehman MU, Shafique A, Khan KH, Hazzazi MM (2023) Efficient and secure image encryption using key substitution process with discrete wavelet transform. J King Saud Univ-Comput Inform Sci 101613 Rehman MU, Shafique A, Khan KH, Hazzazi MM (2023) Efficient and secure image encryption using key substitution process with discrete wavelet transform. J King Saud Univ-Comput Inform Sci 101613
2.
go back to reference Hazzazi MM, Attuluri S, Bassfar Z, Joshi K (2023) A novel cipher-based data encryption with galois field theory. Sensors 23(6):3287CrossRef Hazzazi MM, Attuluri S, Bassfar Z, Joshi K (2023) A novel cipher-based data encryption with galois field theory. Sensors 23(6):3287CrossRef
3.
go back to reference Nadeem M, Arshad A, Riaz S, Zahra SW, Dutta AK, Al Moteri M, Almotairi S (2023) An efficient technique to prevent data misuse with matrix cipher encryption algorithms. Comput Mater Contin 74(2) Nadeem M, Arshad A, Riaz S, Zahra SW, Dutta AK, Al Moteri M, Almotairi S (2023) An efficient technique to prevent data misuse with matrix cipher encryption algorithms. Comput Mater Contin 74(2)
4.
go back to reference Sutradhar S, Karforma S, Bose R, Roy S (2023) A dynamic step-wise tiny encryption algorithm with fruit fly optimization for quality of service improvement in healthcare. Healthc Anal 3:100177CrossRef Sutradhar S, Karforma S, Bose R, Roy S (2023) A dynamic step-wise tiny encryption algorithm with fruit fly optimization for quality of service improvement in healthcare. Healthc Anal 3:100177CrossRef
5.
go back to reference Sodhro AH, Pirbhulal S, Muzammal M, Zongwei L (2020) Towards blockchain-enabled security technique for industrial internet of things based decentralized applications. J Grid Comput 18(4):615–628CrossRef Sodhro AH, Pirbhulal S, Muzammal M, Zongwei L (2020) Towards blockchain-enabled security technique for industrial internet of things based decentralized applications. J Grid Comput 18(4):615–628CrossRef
6.
go back to reference Kumar P, Gupta GP, Tripathi R (2021) TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning. J Syst Architect 115:101954CrossRef Kumar P, Gupta GP, Tripathi R (2021) TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning. J Syst Architect 115:101954CrossRef
7.
go back to reference Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2020) Integration of blockchain and cloud of things: Architecture, applications and challenges. IEEE Commun Surv Tutor 22(4):2521–2549CrossRef Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2020) Integration of blockchain and cloud of things: Architecture, applications and challenges. IEEE Commun Surv Tutor 22(4):2521–2549CrossRef
8.
go back to reference Ahmad S, Mehfuz S (2023) Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Secur Appl 100027 Ahmad S, Mehfuz S (2023) Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Secur Appl 100027
9.
go back to reference Oktian YE, Witanto EN, Lee SG (2021) A conceptual architecture in decentralizing computing, storage, and networking aspect of IoT infrastructure. IoT 2(2):205–221CrossRef Oktian YE, Witanto EN, Lee SG (2021) A conceptual architecture in decentralizing computing, storage, and networking aspect of IoT infrastructure. IoT 2(2):205–221CrossRef
10.
go back to reference Kadry H, Farouk A, Zanaty EA, Reyad O (2023) Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security. Alex Eng J 71:491–500CrossRef Kadry H, Farouk A, Zanaty EA, Reyad O (2023) Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security. Alex Eng J 71:491–500CrossRef
11.
go back to reference Samanta D, Alahmadi AH, Karthikeyan MP, Khan MZ, Banerjee A, Dalapati GK, Ramakrishna S (2021) Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture. IEEE Access 9:98013–98025CrossRef Samanta D, Alahmadi AH, Karthikeyan MP, Khan MZ, Banerjee A, Dalapati GK, Ramakrishna S (2021) Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture. IEEE Access 9:98013–98025CrossRef
12.
go back to reference Mrabet H, Alhomoud A, Jemai A, Trentesaux D (2022) A secured industrial Internet-of-Things architecture based on blockchain technology and machine learning for sensor access control systems in smart manufacturing. Appl Sci 12(9):4641CrossRef Mrabet H, Alhomoud A, Jemai A, Trentesaux D (2022) A secured industrial Internet-of-Things architecture based on blockchain technology and machine learning for sensor access control systems in smart manufacturing. Appl Sci 12(9):4641CrossRef
13.
go back to reference Singh AK, Saxena D (2022) A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment. J Appl Secur Res 17(3):385–412CrossRef Singh AK, Saxena D (2022) A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment. J Appl Secur Res 17(3):385–412CrossRef
14.
go back to reference Sana MU, Li Z, Javaid F, Liaqat HB, Ali MU (2021) Enhanced security in cloud computing using neural network and encryption. IEEE Access 9:145785–145799CrossRef Sana MU, Li Z, Javaid F, Liaqat HB, Ali MU (2021) Enhanced security in cloud computing using neural network and encryption. IEEE Access 9:145785–145799CrossRef
15.
go back to reference Meena U, Sharma P (2023) An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique. Trans Emerg Telecommun Technol 34(3):e4713CrossRef Meena U, Sharma P (2023) An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique. Trans Emerg Telecommun Technol 34(3):e4713CrossRef
16.
go back to reference Gupta R, Saxena D, Gupta I, Singh AK (2022) Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw Lett 4(4):217–221CrossRef Gupta R, Saxena D, Gupta I, Singh AK (2022) Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw Lett 4(4):217–221CrossRef
17.
go back to reference Saxena D, Singh AK (2022) A high availability management model based on VM significance ranking and resource estimation for cloud applications. IEEE Trans Serv Comput Saxena D, Singh AK (2022) A high availability management model based on VM significance ranking and resource estimation for cloud applications. IEEE Trans Serv Comput
18.
go back to reference Smahi A, Xia Q, Xia H, Sulemana N, Fateh AA, Gao J, Du X, Guizani M (2020) A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data. Pervasive Mob Comput 66:101195CrossRef Smahi A, Xia Q, Xia H, Sulemana N, Fateh AA, Gao J, Du X, Guizani M (2020) A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data. Pervasive Mob Comput 66:101195CrossRef
19.
go back to reference Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J 6(5):7702–7712CrossRef Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J 6(5):7702–7712CrossRef
20.
go back to reference Singh SK, Rathore S, Park JH (2020) Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Futur Gener Comput Syst 110:721–743CrossRef Singh SK, Rathore S, Park JH (2020) Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Futur Gener Comput Syst 110:721–743CrossRef
21.
go back to reference Ghazal TM, Hasan MK, Abdullah SNHS, Bakar KAA, Al Hamadi H (2020) Private blockchain-based encryption framework using computational intelligence approach. Egypt Inform J Ghazal TM, Hasan MK, Abdullah SNHS, Bakar KAA, Al Hamadi H (2020) Private blockchain-based encryption framework using computational intelligence approach. Egypt Inform J
23.
go back to reference Chen X, Zhang H, Song J, Guan J, Li J, He Z (2022) Micro-motion classification of flying bird and rotor drones via data augmentation and modified multi-scale CNN. Remote Sens 14(5):1107CrossRef Chen X, Zhang H, Song J, Guan J, Li J, He Z (2022) Micro-motion classification of flying bird and rotor drones via data augmentation and modified multi-scale CNN. Remote Sens 14(5):1107CrossRef
24.
go back to reference Trojovská E, Dehghani M, Trojovský P (2022) Zebra optimization algorithm: A new bio-inspired optimization algorithm for solving optimization algorithm. IEEE Access 10:49445–49473CrossRef Trojovská E, Dehghani M, Trojovský P (2022) Zebra optimization algorithm: A new bio-inspired optimization algorithm for solving optimization algorithm. IEEE Access 10:49445–49473CrossRef
Metadata
Title
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system
Authors
Anuradha M
Jean Justus J
Mary Immaculate Sheela L
Publication date
06-02-2024
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01592-9

Other articles of this Issue 2/2024

Peer-to-Peer Networking and Applications 2/2024 Go to the issue

Premium Partner