Skip to main content

2020 | OriginalPaper | Buchkapitel

Secure Data Processing System Using Decision Tree Architecture

verfasst von : T. M. Nived, Juhi Jyotsna Tiru, N. Jayapandian, K. Balachandran

Erschienen in: New Trends in Computational Vision and Bio-inspired Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The recent cloud computing sector has introduced multiple cloud service provider, which provides cloud storage to the consumers through a wireless or device less method of storing data. However, it has been difficult for the consumers to choose providers who are more secured and cheaper at the same time. Recently, there have been lot of security issues found in cloud storages by different consumers and their respective providers. However, calculating the security issues and security level for any provider plays a crucial role for the consumer to select the cloud service. It has been found that data breaching is the most common security issue faced by cloud storages which has swayed to the concept of cloud computing technology. This paper suggests a method to detect data breaching in any cloud service which can detect the breach with the help of a decision making tree. This decision making tree will have many constraints which include from the password to the location of access. Once a breaching is detected it will take further steps with terminating the connection. The tree based method is exploited. It can be measure and find all the practicable attack structure. This is the main concept of data breach on any particular cloud service and will help in reducing the growing rate of this attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jayapandian, N., Md Zubair Rahman, A. M. J.: Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space. Brazilian Archives of Biology and Technology. 61, 01–13 (2018) Jayapandian, N., Md Zubair Rahman, A. M. J.: Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space. Brazilian Archives of Biology and Technology. 61, 01–13 (2018)
2.
Zurück zum Zitat Jayapandian, N., Zubair Rahman, A.M.J. Md.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Computing, Springer. 20, 1561–1573 (2017) Jayapandian, N., Zubair Rahman, A.M.J. Md.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Computing, Springer. 20, 1561–1573 (2017)
3.
Zurück zum Zitat Abdallah, I., Dertimanis, V., Mylonas, H., Tatsis, K., Chatzi, E., Dervili, N., Maguire, E.: Fault diagnosis of wind turbine structures using decision tree learning algorithms with big data. Proceedings in Safety and Reliability—Safe Societies in a Changing World, pp. 3053–3061. CRC Press, Norway (2018) Abdallah, I., Dertimanis, V., Mylonas, H., Tatsis, K., Chatzi, E., Dervili, N., Maguire, E.: Fault diagnosis of wind turbine structures using decision tree learning algorithms with big data. Proceedings in Safety and Reliability—Safe Societies in a Changing World, pp. 3053–3061. CRC Press, Norway (2018)
4.
Zurück zum Zitat Jayapandian N.: Parallel Queue Scheduling in Dynamic Cloud Environment Using Backfilling Algorithm. International Journal of Intelligent Engineering and Systems. 11, 39–48 (2018)CrossRef Jayapandian N.: Parallel Queue Scheduling in Dynamic Cloud Environment Using Backfilling Algorithm. International Journal of Intelligent Engineering and Systems. 11, 39–48 (2018)CrossRef
5.
Zurück zum Zitat Mościcki, J. T., Mascetti, L..: Cloud storage services for file synchronization and sharing in science, education and research. Future Generation Computer Systems 78, 1052–1054 (2018)CrossRef Mościcki, J. T., Mascetti, L..: Cloud storage services for file synchronization and sharing in science, education and research. Future Generation Computer Systems 78, 1052–1054 (2018)CrossRef
6.
Zurück zum Zitat Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems. 29, 1721–1735 (2018)CrossRef Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems. 29, 1721–1735 (2018)CrossRef
7.
Zurück zum Zitat Jayapandian, N., Zubairrahman, A.M.J.Md., Nandhini, I.: A novel approach for handling sensitive data with deduplication method in hybrid cloud. In: International Conference on Green Engineering and Technologies (IC-GET), pp. 1–6. IEEE, Coimbatore (2015) Jayapandian, N., Zubairrahman, A.M.J.Md., Nandhini, I.: A novel approach for handling sensitive data with deduplication method in hybrid cloud. In: International Conference on Green Engineering and Technologies (IC-GET), pp. 1–6. IEEE, Coimbatore (2015)
8.
Zurück zum Zitat Majumder, A., Nath, S., Bhattacharjee, A., Choudhury, R.: Trust Relationship Establishment Among Multiple Cloud Service Provider. In Cloud Computing Technologies for Green Enterprises. 351–384 (2018) Majumder, A., Nath, S., Bhattacharjee, A., Choudhury, R.: Trust Relationship Establishment Among Multiple Cloud Service Provider. In Cloud Computing Technologies for Green Enterprises. 351–384 (2018)
9.
Zurück zum Zitat Baset, S. A.: Cloud SLAs: present and future. ACM SIGOPS Operating Systems Review. 46, 57–66 (2012)CrossRef Baset, S. A.: Cloud SLAs: present and future. ACM SIGOPS Operating Systems Review. 46, 57–66 (2012)CrossRef
10.
Zurück zum Zitat Bian, P., Liang, B., Zhang, Y., Yang, C., Shi, W., Cai, Y.: Detecting Bugs by Discovering Expectations and Their Violations. IEEE Transactions on Software Engineering. 1–14 (2018) Bian, P., Liang, B., Zhang, Y., Yang, C., Shi, W., Cai, Y.: Detecting Bugs by Discovering Expectations and Their Violations. IEEE Transactions on Software Engineering. 1–14 (2018)
11.
Zurück zum Zitat Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. International Journal of Information Security. 11, 167–188 (2012)CrossRef Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. International Journal of Information Security. 11, 167–188 (2012)CrossRef
12.
Zurück zum Zitat Bertino, E., & Ferrari, E.: Big data security and privacy. In A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years. 425–439, Springer (2018) Bertino, E., & Ferrari, E.: Big data security and privacy. In A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years. 425–439, Springer (2018)
Metadaten
Titel
Secure Data Processing System Using Decision Tree Architecture
verfasst von
T. M. Nived
Juhi Jyotsna Tiru
N. Jayapandian
K. Balachandran
Copyright-Jahr
2020
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-41862-5_16

Premium Partner