Skip to main content

Hybrid Cloud Data Protection Using Machine Learning Approach

  • Chapter
  • First Online:
Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing

Part of the book series: Studies in Big Data ((SBD,volume 89))

Abstract

In today’s digital world, information created by Internet of Things (IoT) devices has expanded drastically. This expansion is due to an increase in the number of IoT devices associated with the internet. Hybrid cloud computing provides enormous support to these emerging IoT devices in processing vast data. However, security is a challenging issue because of the integration of IoT and hybrid cloud. To achieve a sufficient level of hybrid cloud IoT security, a combination of Enhanced C4.5 machine learning algorithm and Dynamic Spatio Role-Based Access Control Algorithm is introduced. In this approach, the data users are classified using the Enhanced C4.5 algorithm and the user’s level of cloud data access is restricted using the Dynamic Spatio Role-Based Access Control Algorithm. As a result, the major security issues pertaining to IoT cloud are addressed. The security framework also uses a deduplication algorithm for eliminating redundant data and significantly improving IoT data storage requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Praveena, D., Rangarajan, P.: Analysis of trend, service and deployment models in cloud computing with focus on hybrid cloud and its implementation. Res. J. Appl. Sci. 9(4), 181–186 (2014)

    Google Scholar 

  2. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message locked encryption and secure deduplication. In: Proceedings in 32nd Annual International Conference on Theory Application Cryptographic Technology, pp. 296–312 (2013)

    Google Scholar 

  3. Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., Xiang, Y.: DedupDUM: secure and scalable data deduplication with dynamic user management. Inf. Sci. 456, 159–173 (2018)

    Google Scholar 

  4. Praveena, D., Rangarajan, P.: Improving the security in web application cloud service Karatsuba Montgomery multiplier ECC algorithm. J. Web Eng. 17(6), 3078–3094 (2018)

    Google Scholar 

  5. Thanga Ramya, S., Arunagiri, B., Rangarajan, P.: Novel effective X-path particle swarm optimization based deprived video data retrieval for smart city. Clust. Comput. 13085–13094 (2019)

    Google Scholar 

  6. Shete, A., Patil, B.M.: Deduplication in hybrid cloud with secure data. Int. J. Comput. Appl. 148(8), 32–36 (2016)

    Google Scholar 

  7. Raji, L., Thanga Ramya, S., Thilagavathy, A.: Reducing cloud storage space consumption using PRCR. Int. J. Innov. Technol. Explor. Eng. (TM) 46, 287–289 (2019)

    Google Scholar 

  8. Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (2013)

    Article  Google Scholar 

  9. Akhila, K., Ganesh, A., Sunitha, C.: A study on deduplication techniques over encrypted data. Procedia Comput. Sci. 87, 38–43 (2016)

    Google Scholar 

  10. Meyer, D.T, Bolosky, W.J.: A study of practical deduplication. ACM Transactions on Storage (TOS) 7(4), 1–20 (2012)

    Google Scholar 

  11. Gapat, P., Khillare, S., Khiste, A., Pise, R., Gapat, P.: Securing data deduplication on hybrid cloud using asymmetric key algorithm. J. Innov. Res. Sci. Technol. 2, 759–763 (2017)

    Google Scholar 

  12. Praveena, D., Rangarajan, P.: A machine learning application for reducing the security risks in hybrid cloud networks. Multimedia Tools Appl. 79(7), 5161–5173 (2020)

    Google Scholar 

  13. Qiu, M., Gai, K., Singham, B.T., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80, 421–429 (2018)

    Google Scholar 

  14. Prema Rajeswari, L., Arputharaj, K.: An active rule approach for network intrusion detection with enhanced C4.5 Algorithm. Int. J. Commun. Netw. Syst. Sci. 1(4), 314–321 (2008)

    Google Scholar 

  15. Yan, Z., Wang, M., Li, Y., Vasilakos, A.V.: Encrypted data management with deduplication in cloud computing. J. Cloud Comput. 3(2), 28–35 (2016)

    Google Scholar 

  16. Zhenhua, L., Yaqian, K., Chen, L., Yaqing, F.: Hybrid cloud approach for block-level deduplication and searchable encryption in a large universe. J. China Univ. Posts Telecommun. 24(5), 23–34 (2017)

    Google Scholar 

  17. Helmi, A.M., Farhan, M.S., Nasr, M.M.: A framework for integrating geospatial information systems and hybrid cloud computing. Comput. Electr. Eng. 67, 145–158 (2018)

    Google Scholar 

  18. Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206–1216 (2014)

    Google Scholar 

  19. Zhou, Y., Dan Feng, Yu., Hua, W.X., Min, F., Huang, F., Zhang, Y.: A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Future Gener. Comput. Syst. 84, 177–189 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Praveena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Praveena, D., Thanga Ramya, S., Gladis Pushparathi, V.P., Bethi, P., Poopandian, S. (2021). Hybrid Cloud Data Protection Using Machine Learning Approach. In: Dash, S., Pani, S.K., Abraham, A., Liang, Y. (eds) Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing. Studies in Big Data, vol 89. Springer, Cham. https://doi.org/10.1007/978-3-030-75657-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-75657-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-75656-7

  • Online ISBN: 978-3-030-75657-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics