Skip to main content
Log in

Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies

  • Survey Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

This paper presents an innovative approach to strengthening Key Management Systems (KMS) against the escalating landscape of cyber threats by integrating advanced cryptographic technologies, machine learning, deep learning, and the Internet of Things (IoT). As digital reliance and cyber-attacks surge, strengthening KMS security becomes paramount. Our research provides a comprehensive overview of the state-of-the-art in cloud data security, identifying key vulnerabilities in existing KMS. The paper also outlines a distinctive framework based on the combined application of advanced cryptography, machine learning, deep learning, and IoT, which represents a novel approach in the quest for robust KMS security. Our experimental results substantiate the efficacy of this unique blend of technologies, providing solid empirical evidence that such a fusion can successfully strengthen KMS against potential threats. As technologies and threat landscapes continue to evolve, our framework can serve as a benchmark for future research and practical implementations. It highlights the potential of integrated technological solutions to counter complex cybersecurity issues. Moreover, the approach we've developed can be adapted and expanded to cater to the specific needs of different sectors, such as finance, healthcare, and e-commerce, which are particularly vulnerable to cyber threats. The novelty of our work lies in the amalgamation of the four technologies and the creation of an empirically backed, robust framework, marking a significant stride in KMS security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdul S, Faheem M, Alqahtani F, Zomaya AY. Deep learning-based intrusion detection system for cloud computing: A survey. IEEE Access. 2021;9:100170–96.

    Google Scholar 

  2. Abu-Elkheir M, Kim J. Machine learning techniques for security enhancement in cloud computing: a survey. IEEE Access. 2020;8:201297–318.

    Google Scholar 

  3. Aljawarneh SA, Tawalbeh LA. Internet of things-based key management system: a comprehensive review. IEEE Int Things J. 2019;6(2):2246–62.

    Google Scholar 

  4. Alzahrani A, Alharthi A. Cloud computing security issues and challenges: a survey. Int J Comp Sci Informat Sec. 2020;18(1):55–61.

    Google Scholar 

  5. Carrara E, Tsiatsis V. The role of IoT in cyber security. In: In the internet of things. Cham: Springer; 2019. p. 357–86.

    Google Scholar 

  6. Chen H, Zhao Y. Machine learning for cybersecurity: a survey. In: Cybersecurity and applied mathematics. Cham: Springer; 2019. p. 89–105.

    Google Scholar 

  7. Chou YC, Wang HY, Chang YC. A deep learning-based attack prediction system for cloud computing. IEEE Transact Cloud Comput. 2019;7(1):59–69.

    Google Scholar 

  8. Garg V, Chugh R, Singh A. Machine learning techniques for cloud security: a survey. J Ambient Intellig Humanized Comput. 2020;11(5):1975–93.

    Google Scholar 

  9. Gupta S, Anand S, Bhatnagar R. A survey of cloud security attacks and their mitigation techniques. J Ambient Intellig Humanized Comput. 2020;11(9):3919–45.

    Google Scholar 

  10. Huang Y, Sun X, Xie S, Liu C, Li X. Deep learning-based anomaly detection for cloud computing. IEEE Access. 2019;7:58154–64.

    Google Scholar 

  11. Jain S, Kumar S, Chaudhary S (2021) A review of key management system for cloud computing. In: Proceedings of the 3rd International Conference on Inventive Systems and Control p. 1197–1201

  12. Kaur P, Singh H. Deep learning techniques for cybersecurity applications: a review. IEEE Access. 2020;8:22113–33.

    Google Scholar 

  13. Kumar P, Khurana S, Singh K. A novel framework for enhancing key management system security using elliptic curve cryptography and digital signatures. J Informat Security Appl. 2021;61:102753.

    Google Scholar 

  14. Li X, Wang X, Chen C, Zhang M, Tang M. Blockchain-based key management system for cloud storage security. J Parallel Distribut Comput. 2019;128:108–17.

    Google Scholar 

  15. Li Y, Li L, Xu J, Liu Y. An attribute-based data sharing scheme with data confidentiality and traceability in cloud storage. J Ambient Intellig Humanized Comput. 2020;11(10):4437–51.

    Google Scholar 

  16. Liu J, Zhao J, Wu L, Wu J, Shao J. An efficient and secure key management scheme for cloud storage. Future Generat Comp Syst. 2020;105:187–95.

    Google Scholar 

  17. Liu X, Zhang T, Huang X. The application of cryptography in the protection of cloud data security. IEEE Access. 2021;9:202–13.

    Google Scholar 

  18. Mukherjee S, Sengupta S. Cryptographic algorithms and techniques for cloud security: a review. IEEE Access. 2019;7:43728–45.

    Google Scholar 

  19. Moustafa N, Slay J. The landscape of research on artificial intelligence for cybersecurity. IEEE Access. 2019;7:34477–97.

    Google Scholar 

  20. Raza S, Nazir B, Gani A. A survey on deep learning in cloud computing. J Network Comput Applicat. 2018;103:1–19.

    Google Scholar 

  21. Rathore V, Jain S, Kumar S (2021) Cloud computing security using machine learning techniques.

  22. Singh P, Gupta R, Tyagi S. Machine learning techniques for cloud security: a systematic review. Comput Secur. 2021;105:102275.

    Google Scholar 

  23. Sun J, Zhu Y, Zhang C, Wang X. A deep learning-based approach for intrusion detection in cloud computing. IEEE Access. 2016;4:6914–24.

    Google Scholar 

  24. Vaidya S, Hiremath S (2020) Review of Key Management Systems: A Security Perspective. In: Proceedings of the 2nd International Conference on Inventive Research in Computing Applications (pp. 936–943). IEEE

  25. Wang S, Chen Y, Zhang X, Yu F. Machine learning-assisted cloud computing model for enhancing key management system security. IEEE Access. 2020;8:65479–87.

    Google Scholar 

  26. Xu J, Yan L, Huang J, Zhang Y, Liu L, Huang W. IoT-based intrusion detection system for cloud computing key management system. IEEE Access. 2021;9:36732–41.

    Google Scholar 

  27. Hinton GE, Simon O. Yee-whye T a fast learning algorithm for deep belief nets. Neural Comput. 2006;18:1527–54.

    Article  MathSciNet  MATH  Google Scholar 

  28. Cipher (An Entrusted Datacard Company), 2020 Global Encryption Trends Study. Ponemon Institute Research Report (2020). https://www.secureage.com/secureage/pdf/2020-Ponemon-Global-Encryption-Trends-Study-ar.pdf

  29. Sinha VS et al. Detecting and mitigating secret-key leaks in source code repositories. In: 12th Working Conference on Mining Software Repositories (MSR), pp. 396–400. IEEE/ACM, Florence (2015)

  30. Björkqvist M et al. Design and Implementation of a Key-Lifecycle Management System. In: Sion R (eds) Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6052. Springer, Berlin, Heidelberg (2010) Selecting the right key management system. Cryptomathic White Paper (2019)

  31. Li J, Nazir Jan M, Faisal M. Big data, scientific programming, and its role in the internet of industrial things: a decision support system. Scient Program. 2020;2020:7.

    Article  Google Scholar 

  32. Liao X, Faisal M, Qing Chang Q, Ali A. Evaluating the role of big data in IIOT-industrial internet of things for executing ranks using the analytic network process approach. Scient Program 2020;2020:8859454. https://doi.org/10.1155/2020/8859454.

    Article  Google Scholar 

  33. Shakeel I, Mehfuz S, Ahmad S (2022) Securing Data in Cloud: Major Threats and Recent Strategies. In: 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2022, pp. 1602–1607, doi: https://doi.org/10.1109/SMART55829.2022.10047308.

  34. Ahmad S, Shakeel I, Mehfuz S, Ahmad J. Deep learning models for cloud, edge, fog, and IoT computing paradigms: survey, recent advances, and future directions. Comput Sci Rev. 2023. https://doi.org/10.1016/j.cosrev.2023.100568.

    Article  MathSciNet  Google Scholar 

  35. Ahmad S, Mehfuz S, Beg J. An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr Computat Pract Exp. 2023. https://doi.org/10.1002/cpe.7806.

    Article  Google Scholar 

  36. Ahmad S, Mehfuz S, Mebarek-Oudina F, et al. RSM analysis-based cloud access security broker: a systematic literature review. Cluster Comput. 2022;25:3733–63. https://doi.org/10.1007/s10586-022-03598-z.

    Article  Google Scholar 

  37. Ahmad S, Mehfuz S, Beg J. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment. J Supercomput. 2022. https://doi.org/10.1007/s11227-022-04964-9.

    Article  Google Scholar 

  38. Urooj S, Lata S, Ahmad S, Shabana Mehfuz S, Kalathil, S. Cryptographic data security for reliable wireless sensor network. Alexandria Eng J. 2023;72:37–50. https://doi.org/10.1016/j.aej.2023.03.061.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Justin Onyarin Ogala.

Ethics declarations

Conflict of Interest

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ogala, J.O., Ahmad, S., Shakeel, I. et al. Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies. SN COMPUT. SCI. 4, 530 (2023). https://doi.org/10.1007/s42979-023-02073-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02073-9

Keywords

Navigation