Название | Deep Learning Approaches to Cloud Security |
---|---|
Автор произведения | Группа авторов |
Жанр | Отраслевые издания |
Серия | |
Издательство | Отраслевые издания |
Год выпуска | 0 |
isbn | 9781119760504 |
Figure 2.7 Multi-Tenancy services [8].
The fourth step is encryption in a Multi-Tenant based system. In a Multi-Tenant based system, the consistency, integrity, durability, accuracy, and on-time demand of a database is mandatory for fulfilment. If the Multi-Tenant based system does not fulfil the requirements due to any term and condition, the tenant may not be able to work efficiently in the organisation, so encryption techniques based on Deep Learning concepts are used to secure the database. Some encryption techniques include digital, security, key, signature, digital key, private key, and password provided encryption [14].
The authorised user accesses the sophisticated database and can modify the database. If unauthorised access happens, sophisticated data access by the unauthorized user can be added, deleted, and modified by unauthorised activity. In a Multi-Tenant system using encryption techniques, first check the authorisation, find out if the tenant is authorised or not, and if the tenant has been authorised as a user with the access provided.
2.5 Related Work
In this chapter, we will look at the work related to the concept of Multi-Tenancy privacy policies. Future use of Multi-Tenancy in the cloud environment is dependent on the complexity and cost affected to the data structure. There are many works done in many chapter basics in privacy and security concepts [15] where database hacking and transition fraud happened. The use of Deep Learning removes that type of problem and reduces fraud. This chapter data is useful to find out the functional or non-functional parameters of clouding computing systems with respect to Multi-Tenant systems. These details take discretion from parameters like security and privacy concepts, detail descriptions on the structure of Multi-Tenancy in cloud based frameworks, vary modules of Multi-Tenancy use according to requirements, and discuss the security, privacy, performance, cost, and flexibility factors of Multi-Tenancy cloud based systems. This chapter also discusses the contributions of Deep Learning concepts used in data security and privacy and in protection concepts as cloud computing system architecture. This chapter is used to find the maximum solution to protect and maintain the privacy and security of databases and the work place of tenants in Multi-Tenancy based systems using Deep Learning concepts and understand the structure of cloud computing and deep structure of Multi-Tenancy with a privacy concept of Deep Learning methods. This literature is used to understand and find the requirements of resources, services, and privacy concept development in various services like response time, network load, and throughput management services development, as well as the need for resources and requirement of resources in a cloud based Multi-Tenant system and privacy services using Deep Learning concepts [16].
2.6 Conclusion
In Cloud Computing with a Multi-Tenancy system, privacy and security are very complicated and valuable. These concepts are important because it is a responsibility to provide privacy and security to the unique architecture of cloud computing and multi-tenant systems. The data must be correct, durable, and secure. Every tenant wants to work in a secure environment; this helps create a good and graceful environment for the work place. Every tenant wants security and privacy to be maintained for database transactions in the cloud environment. If this requirement is not fulfilled, the tenant will work for longer durations and the ability for work will reduce, so privacy and security are two factors which decide the future of that structure. Using the Deep Learning concept, we work on the privacy and security areas of Multi-Tenancy systems making them more secure for both physical and logical separation and also provide a great privacy platform to work free from any worry about security. With the help of Deep Learning, the Multi-Tenant system makes things more secure and privacy policies more stable to work with and secures the future safety of the database used by different tenants of the same organisation. Using the Deep Learning concept provides mechanisms to make privacy architecture to enhance the security level of privacy policies. Data is secure on the front and back ends, so the isolation of data is protected at both ends and is safe for future use by the tenant. It is sophisticated and necessary for the privacy and security of each face of a cloud based Multi-Tenant system to maintain no loss of data for the durability and safe side of a system.
References
1. Abhishek Kumar & Jyotir Moy Chatterjee & Pramod Singh Rathore, 2020. “Smartphone Confrontational Applications and Security Issues,” International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 9(2), pages 1-18, April.
2. Bhargava, N., Bhargava, R., Rathore, P. S., & Kumar, A. (2020). Texture Recognition Using Gabor Filter for Extracting Feature Vectors With the Regression Mining Algorithm. International Journal of Risk and Contingency Management (IJRCM), 9(3), 31-44. doi:10.4018/IJRCM.2020070103
3. By Judith Hurwitz https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/ by Judith Hurwitz, Marcia Kaufman, Fern Halper, Daniel Kirsch
5. Computer term http://whatis.techtarget.com/definitionmulti-tenancy Frederick Chong https://msdn.microsoft.com/en-us/library/aa479086.aspx
6. https://www.researchgate.net/publication/311922746
7. Kumar, A., Chatterjee, J. M., & Díaz, V. G. (2020). A novel hybrid approach of svm combined with nlp and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering, 10(1), 486
8. Margaret Rouse https://searchcloudcomputing.techtarget.com/definition/multi-tenant-cloud.
9. Multi tenancy in SaaS-PaaS http://multitenancy-in-saaspaas.wikispaces.asu.edu/
10. Naveen Kumar, Prakarti Triwedi, Pramod Singh Rathore, “An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)”, First International Conference on Information Technology and Knowledge Management pp. 89–92, ISSN 2300-5963 ACSIS, Vol. 14 DOI: 10.15439/2018KM19.
11. Rathore, P.S., Chatterjee, J.M., Kumar, A. et al. Energy-efficient cluster head selection through relay approach for WSN. J Supercomputer (2021). https://doi.org/10.1007/s11227-020-03593-4
12. Shildshare.net//www.slideshare.net/mmubashirkhan/saa-s-multitenant database- architecture
13. Singh Rathore, P., Kumar, A., & Gracia-Diaz, V. (2020). A Holistic Methodology for Improved RFID Network Lifetime by Advanced Cluster Head Selection using Dragonfly Algorithm. International Journal Of Interactive Multimedia And Artificial Intelligence, 6 (Regular Issue), http://doi.org/10.9781/ijimai.2020.05.003.