Abstract
In today’s digital world, information created by Internet of Things (IoT) devices has expanded drastically. This expansion is due to an increase in the number of IoT devices associated with the internet. Hybrid cloud computing provides enormous support to these emerging IoT devices in processing vast data. However, security is a challenging issue because of the integration of IoT and hybrid cloud. To achieve a sufficient level of hybrid cloud IoT security, a combination of Enhanced C4.5 machine learning algorithm and Dynamic Spatio Role-Based Access Control Algorithm is introduced. In this approach, the data users are classified using the Enhanced C4.5 algorithm and the user’s level of cloud data access is restricted using the Dynamic Spatio Role-Based Access Control Algorithm. As a result, the major security issues pertaining to IoT cloud are addressed. The security framework also uses a deduplication algorithm for eliminating redundant data and significantly improving IoT data storage requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Praveena, D., Rangarajan, P.: Analysis of trend, service and deployment models in cloud computing with focus on hybrid cloud and its implementation. Res. J. Appl. Sci. 9(4), 181–186 (2014)
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message locked encryption and secure deduplication. In: Proceedings in 32nd Annual International Conference on Theory Application Cryptographic Technology, pp. 296–312 (2013)
Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., Xiang, Y.: DedupDUM: secure and scalable data deduplication with dynamic user management. Inf. Sci. 456, 159–173 (2018)
Praveena, D., Rangarajan, P.: Improving the security in web application cloud service Karatsuba Montgomery multiplier ECC algorithm. J. Web Eng. 17(6), 3078–3094 (2018)
Thanga Ramya, S., Arunagiri, B., Rangarajan, P.: Novel effective X-path particle swarm optimization based deprived video data retrieval for smart city. Clust. Comput. 13085–13094 (2019)
Shete, A., Patil, B.M.: Deduplication in hybrid cloud with secure data. Int. J. Comput. Appl. 148(8), 32–36 (2016)
Raji, L., Thanga Ramya, S., Thilagavathy, A.: Reducing cloud storage space consumption using PRCR. Int. J. Innov. Technol. Explor. Eng. (TM) 46, 287–289 (2019)
Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (2013)
Akhila, K., Ganesh, A., Sunitha, C.: A study on deduplication techniques over encrypted data. Procedia Comput. Sci. 87, 38–43 (2016)
Meyer, D.T, Bolosky, W.J.: A study of practical deduplication. ACM Transactions on Storage (TOS) 7(4), 1–20 (2012)
Gapat, P., Khillare, S., Khiste, A., Pise, R., Gapat, P.: Securing data deduplication on hybrid cloud using asymmetric key algorithm. J. Innov. Res. Sci. Technol. 2, 759–763 (2017)
Praveena, D., Rangarajan, P.: A machine learning application for reducing the security risks in hybrid cloud networks. Multimedia Tools Appl. 79(7), 5161–5173 (2020)
Qiu, M., Gai, K., Singham, B.T., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80, 421–429 (2018)
Prema Rajeswari, L., Arputharaj, K.: An active rule approach for network intrusion detection with enhanced C4.5 Algorithm. Int. J. Commun. Netw. Syst. Sci. 1(4), 314–321 (2008)
Yan, Z., Wang, M., Li, Y., Vasilakos, A.V.: Encrypted data management with deduplication in cloud computing. J. Cloud Comput. 3(2), 28–35 (2016)
Zhenhua, L., Yaqian, K., Chen, L., Yaqing, F.: Hybrid cloud approach for block-level deduplication and searchable encryption in a large universe. J. China Univ. Posts Telecommun. 24(5), 23–34 (2017)
Helmi, A.M., Farhan, M.S., Nasr, M.M.: A framework for integrating geospatial information systems and hybrid cloud computing. Comput. Electr. Eng. 67, 145–158 (2018)
Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206–1216 (2014)
Zhou, Y., Dan Feng, Yu., Hua, W.X., Min, F., Huang, F., Zhang, Y.: A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Future Gener. Comput. Syst. 84, 177–189 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Praveena, D., Thanga Ramya, S., Gladis Pushparathi, V.P., Bethi, P., Poopandian, S. (2021). Hybrid Cloud Data Protection Using Machine Learning Approach. In: Dash, S., Pani, S.K., Abraham, A., Liang, Y. (eds) Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing. Studies in Big Data, vol 89. Springer, Cham. https://doi.org/10.1007/978-3-030-75657-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-75657-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75656-7
Online ISBN: 978-3-030-75657-4
eBook Packages: Computer ScienceComputer Science (R0)