Skip to main content
Top

2020 | OriginalPaper | Chapter

Secure Data Processing System Using Decision Tree Architecture

Authors : T. M. Nived, Juhi Jyotsna Tiru, N. Jayapandian, K. Balachandran

Published in: New Trends in Computational Vision and Bio-inspired Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The recent cloud computing sector has introduced multiple cloud service provider, which provides cloud storage to the consumers through a wireless or device less method of storing data. However, it has been difficult for the consumers to choose providers who are more secured and cheaper at the same time. Recently, there have been lot of security issues found in cloud storages by different consumers and their respective providers. However, calculating the security issues and security level for any provider plays a crucial role for the consumer to select the cloud service. It has been found that data breaching is the most common security issue faced by cloud storages which has swayed to the concept of cloud computing technology. This paper suggests a method to detect data breaching in any cloud service which can detect the breach with the help of a decision making tree. This decision making tree will have many constraints which include from the password to the location of access. Once a breaching is detected it will take further steps with terminating the connection. The tree based method is exploited. It can be measure and find all the practicable attack structure. This is the main concept of data breach on any particular cloud service and will help in reducing the growing rate of this attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jayapandian, N., Md Zubair Rahman, A. M. J.: Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space. Brazilian Archives of Biology and Technology. 61, 01–13 (2018) Jayapandian, N., Md Zubair Rahman, A. M. J.: Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space. Brazilian Archives of Biology and Technology. 61, 01–13 (2018)
2.
go back to reference Jayapandian, N., Zubair Rahman, A.M.J. Md.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Computing, Springer. 20, 1561–1573 (2017) Jayapandian, N., Zubair Rahman, A.M.J. Md.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Computing, Springer. 20, 1561–1573 (2017)
3.
go back to reference Abdallah, I., Dertimanis, V., Mylonas, H., Tatsis, K., Chatzi, E., Dervili, N., Maguire, E.: Fault diagnosis of wind turbine structures using decision tree learning algorithms with big data. Proceedings in Safety and Reliability—Safe Societies in a Changing World, pp. 3053–3061. CRC Press, Norway (2018) Abdallah, I., Dertimanis, V., Mylonas, H., Tatsis, K., Chatzi, E., Dervili, N., Maguire, E.: Fault diagnosis of wind turbine structures using decision tree learning algorithms with big data. Proceedings in Safety and Reliability—Safe Societies in a Changing World, pp. 3053–3061. CRC Press, Norway (2018)
4.
go back to reference Jayapandian N.: Parallel Queue Scheduling in Dynamic Cloud Environment Using Backfilling Algorithm. International Journal of Intelligent Engineering and Systems. 11, 39–48 (2018)CrossRef Jayapandian N.: Parallel Queue Scheduling in Dynamic Cloud Environment Using Backfilling Algorithm. International Journal of Intelligent Engineering and Systems. 11, 39–48 (2018)CrossRef
5.
go back to reference Mościcki, J. T., Mascetti, L..: Cloud storage services for file synchronization and sharing in science, education and research. Future Generation Computer Systems 78, 1052–1054 (2018)CrossRef Mościcki, J. T., Mascetti, L..: Cloud storage services for file synchronization and sharing in science, education and research. Future Generation Computer Systems 78, 1052–1054 (2018)CrossRef
6.
go back to reference Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems. 29, 1721–1735 (2018)CrossRef Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems. 29, 1721–1735 (2018)CrossRef
7.
go back to reference Jayapandian, N., Zubairrahman, A.M.J.Md., Nandhini, I.: A novel approach for handling sensitive data with deduplication method in hybrid cloud. In: International Conference on Green Engineering and Technologies (IC-GET), pp. 1–6. IEEE, Coimbatore (2015) Jayapandian, N., Zubairrahman, A.M.J.Md., Nandhini, I.: A novel approach for handling sensitive data with deduplication method in hybrid cloud. In: International Conference on Green Engineering and Technologies (IC-GET), pp. 1–6. IEEE, Coimbatore (2015)
8.
go back to reference Majumder, A., Nath, S., Bhattacharjee, A., Choudhury, R.: Trust Relationship Establishment Among Multiple Cloud Service Provider. In Cloud Computing Technologies for Green Enterprises. 351–384 (2018) Majumder, A., Nath, S., Bhattacharjee, A., Choudhury, R.: Trust Relationship Establishment Among Multiple Cloud Service Provider. In Cloud Computing Technologies for Green Enterprises. 351–384 (2018)
9.
go back to reference Baset, S. A.: Cloud SLAs: present and future. ACM SIGOPS Operating Systems Review. 46, 57–66 (2012)CrossRef Baset, S. A.: Cloud SLAs: present and future. ACM SIGOPS Operating Systems Review. 46, 57–66 (2012)CrossRef
10.
go back to reference Bian, P., Liang, B., Zhang, Y., Yang, C., Shi, W., Cai, Y.: Detecting Bugs by Discovering Expectations and Their Violations. IEEE Transactions on Software Engineering. 1–14 (2018) Bian, P., Liang, B., Zhang, Y., Yang, C., Shi, W., Cai, Y.: Detecting Bugs by Discovering Expectations and Their Violations. IEEE Transactions on Software Engineering. 1–14 (2018)
11.
go back to reference Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. International Journal of Information Security. 11, 167–188 (2012)CrossRef Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. International Journal of Information Security. 11, 167–188 (2012)CrossRef
12.
go back to reference Bertino, E., & Ferrari, E.: Big data security and privacy. In A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years. 425–439, Springer (2018) Bertino, E., & Ferrari, E.: Big data security and privacy. In A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years. 425–439, Springer (2018)
Metadata
Title
Secure Data Processing System Using Decision Tree Architecture
Authors
T. M. Nived
Juhi Jyotsna Tiru
N. Jayapandian
K. Balachandran
Copyright Year
2020
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-41862-5_16

Premium Partner