Abstract
This paper presents an innovative approach to strengthening Key Management Systems (KMS) against the escalating landscape of cyber threats by integrating advanced cryptographic technologies, machine learning, deep learning, and the Internet of Things (IoT). As digital reliance and cyber-attacks surge, strengthening KMS security becomes paramount. Our research provides a comprehensive overview of the state-of-the-art in cloud data security, identifying key vulnerabilities in existing KMS. The paper also outlines a distinctive framework based on the combined application of advanced cryptography, machine learning, deep learning, and IoT, which represents a novel approach in the quest for robust KMS security. Our experimental results substantiate the efficacy of this unique blend of technologies, providing solid empirical evidence that such a fusion can successfully strengthen KMS against potential threats. As technologies and threat landscapes continue to evolve, our framework can serve as a benchmark for future research and practical implementations. It highlights the potential of integrated technological solutions to counter complex cybersecurity issues. Moreover, the approach we've developed can be adapted and expanded to cater to the specific needs of different sectors, such as finance, healthcare, and e-commerce, which are particularly vulnerable to cyber threats. The novelty of our work lies in the amalgamation of the four technologies and the creation of an empirically backed, robust framework, marking a significant stride in KMS security.
Similar content being viewed by others
References
Abdul S, Faheem M, Alqahtani F, Zomaya AY. Deep learning-based intrusion detection system for cloud computing: A survey. IEEE Access. 2021;9:100170–96.
Abu-Elkheir M, Kim J. Machine learning techniques for security enhancement in cloud computing: a survey. IEEE Access. 2020;8:201297–318.
Aljawarneh SA, Tawalbeh LA. Internet of things-based key management system: a comprehensive review. IEEE Int Things J. 2019;6(2):2246–62.
Alzahrani A, Alharthi A. Cloud computing security issues and challenges: a survey. Int J Comp Sci Informat Sec. 2020;18(1):55–61.
Carrara E, Tsiatsis V. The role of IoT in cyber security. In: In the internet of things. Cham: Springer; 2019. p. 357–86.
Chen H, Zhao Y. Machine learning for cybersecurity: a survey. In: Cybersecurity and applied mathematics. Cham: Springer; 2019. p. 89–105.
Chou YC, Wang HY, Chang YC. A deep learning-based attack prediction system for cloud computing. IEEE Transact Cloud Comput. 2019;7(1):59–69.
Garg V, Chugh R, Singh A. Machine learning techniques for cloud security: a survey. J Ambient Intellig Humanized Comput. 2020;11(5):1975–93.
Gupta S, Anand S, Bhatnagar R. A survey of cloud security attacks and their mitigation techniques. J Ambient Intellig Humanized Comput. 2020;11(9):3919–45.
Huang Y, Sun X, Xie S, Liu C, Li X. Deep learning-based anomaly detection for cloud computing. IEEE Access. 2019;7:58154–64.
Jain S, Kumar S, Chaudhary S (2021) A review of key management system for cloud computing. In: Proceedings of the 3rd International Conference on Inventive Systems and Control p. 1197–1201
Kaur P, Singh H. Deep learning techniques for cybersecurity applications: a review. IEEE Access. 2020;8:22113–33.
Kumar P, Khurana S, Singh K. A novel framework for enhancing key management system security using elliptic curve cryptography and digital signatures. J Informat Security Appl. 2021;61:102753.
Li X, Wang X, Chen C, Zhang M, Tang M. Blockchain-based key management system for cloud storage security. J Parallel Distribut Comput. 2019;128:108–17.
Li Y, Li L, Xu J, Liu Y. An attribute-based data sharing scheme with data confidentiality and traceability in cloud storage. J Ambient Intellig Humanized Comput. 2020;11(10):4437–51.
Liu J, Zhao J, Wu L, Wu J, Shao J. An efficient and secure key management scheme for cloud storage. Future Generat Comp Syst. 2020;105:187–95.
Liu X, Zhang T, Huang X. The application of cryptography in the protection of cloud data security. IEEE Access. 2021;9:202–13.
Mukherjee S, Sengupta S. Cryptographic algorithms and techniques for cloud security: a review. IEEE Access. 2019;7:43728–45.
Moustafa N, Slay J. The landscape of research on artificial intelligence for cybersecurity. IEEE Access. 2019;7:34477–97.
Raza S, Nazir B, Gani A. A survey on deep learning in cloud computing. J Network Comput Applicat. 2018;103:1–19.
Rathore V, Jain S, Kumar S (2021) Cloud computing security using machine learning techniques.
Singh P, Gupta R, Tyagi S. Machine learning techniques for cloud security: a systematic review. Comput Secur. 2021;105:102275.
Sun J, Zhu Y, Zhang C, Wang X. A deep learning-based approach for intrusion detection in cloud computing. IEEE Access. 2016;4:6914–24.
Vaidya S, Hiremath S (2020) Review of Key Management Systems: A Security Perspective. In: Proceedings of the 2nd International Conference on Inventive Research in Computing Applications (pp. 936–943). IEEE
Wang S, Chen Y, Zhang X, Yu F. Machine learning-assisted cloud computing model for enhancing key management system security. IEEE Access. 2020;8:65479–87.
Xu J, Yan L, Huang J, Zhang Y, Liu L, Huang W. IoT-based intrusion detection system for cloud computing key management system. IEEE Access. 2021;9:36732–41.
Hinton GE, Simon O. Yee-whye T a fast learning algorithm for deep belief nets. Neural Comput. 2006;18:1527–54.
Cipher (An Entrusted Datacard Company), 2020 Global Encryption Trends Study. Ponemon Institute Research Report (2020). https://www.secureage.com/secureage/pdf/2020-Ponemon-Global-Encryption-Trends-Study-ar.pdf
Sinha VS et al. Detecting and mitigating secret-key leaks in source code repositories. In: 12th Working Conference on Mining Software Repositories (MSR), pp. 396–400. IEEE/ACM, Florence (2015)
Björkqvist M et al. Design and Implementation of a Key-Lifecycle Management System. In: Sion R (eds) Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6052. Springer, Berlin, Heidelberg (2010) Selecting the right key management system. Cryptomathic White Paper (2019)
Li J, Nazir Jan M, Faisal M. Big data, scientific programming, and its role in the internet of industrial things: a decision support system. Scient Program. 2020;2020:7.
Liao X, Faisal M, Qing Chang Q, Ali A. Evaluating the role of big data in IIOT-industrial internet of things for executing ranks using the analytic network process approach. Scient Program 2020;2020:8859454. https://doi.org/10.1155/2020/8859454.
Shakeel I, Mehfuz S, Ahmad S (2022) Securing Data in Cloud: Major Threats and Recent Strategies. In: 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2022, pp. 1602–1607, doi: https://doi.org/10.1109/SMART55829.2022.10047308.
Ahmad S, Shakeel I, Mehfuz S, Ahmad J. Deep learning models for cloud, edge, fog, and IoT computing paradigms: survey, recent advances, and future directions. Comput Sci Rev. 2023. https://doi.org/10.1016/j.cosrev.2023.100568.
Ahmad S, Mehfuz S, Beg J. An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr Computat Pract Exp. 2023. https://doi.org/10.1002/cpe.7806.
Ahmad S, Mehfuz S, Mebarek-Oudina F, et al. RSM analysis-based cloud access security broker: a systematic literature review. Cluster Comput. 2022;25:3733–63. https://doi.org/10.1007/s10586-022-03598-z.
Ahmad S, Mehfuz S, Beg J. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment. J Supercomput. 2022. https://doi.org/10.1007/s11227-022-04964-9.
Urooj S, Lata S, Ahmad S, Shabana Mehfuz S, Kalathil, S. Cryptographic data security for reliable wireless sensor network. Alexandria Eng J. 2023;72:37–50. https://doi.org/10.1016/j.aej.2023.03.061.
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ogala, J.O., Ahmad, S., Shakeel, I. et al. Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies. SN COMPUT. SCI. 4, 530 (2023). https://doi.org/10.1007/s42979-023-02073-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02073-9