Deep Learning Approaches to Cloud Security. Группа авторов

Читать онлайн.
Название Deep Learning Approaches to Cloud Security
Автор произведения Группа авторов
Жанр Отраслевые издания
Серия
Издательство Отраслевые издания
Год выпуска 0
isbn 9781119760504



Скачать книгу

method, the whole database is not given to all tenants and only isolated data is provided by using a Deep Learning concept shown in Figure 2.7.

Schematic illustration of multi-Tenancy services.

      The fourth step is encryption in a Multi-Tenant based system. In a Multi-Tenant based system, the consistency, integrity, durability, accuracy, and on-time demand of a database is mandatory for fulfilment. If the Multi-Tenant based system does not fulfil the requirements due to any term and condition, the tenant may not be able to work efficiently in the organisation, so encryption techniques based on Deep Learning concepts are used to secure the database. Some encryption techniques include digital, security, key, signature, digital key, private key, and password provided encryption [14].

      The authorised user accesses the sophisticated database and can modify the database. If unauthorised access happens, sophisticated data access by the unauthorized user can be added, deleted, and modified by unauthorised activity. In a Multi-Tenant system using encryption techniques, first check the authorisation, find out if the tenant is authorised or not, and if the tenant has been authorised as a user with the access provided.

      1. Abhishek Kumar & Jyotir Moy Chatterjee & Pramod Singh Rathore, 2020. “Smartphone Confrontational Applications and Security Issues,” International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 9(2), pages 1-18, April.

      2. Bhargava, N., Bhargava, R., Rathore, P. S., & Kumar, A. (2020). Texture Recognition Using Gabor Filter for Extracting Feature Vectors With the Regression Mining Algorithm. International Journal of Risk and Contingency Management (IJRCM), 9(3), 31-44. doi:10.4018/IJRCM.2020070103

      3. By Judith Hurwitz https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/ by Judith Hurwitz, Marcia Kaufman, Fern Halper, Daniel Kirsch

      4. https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/

      5. Computer term http://whatis.techtarget.com/definitionmulti-tenancy Frederick Chong https://msdn.microsoft.com/en-us/library/aa479086.aspx

      6. https://www.researchgate.net/publication/311922746

      7. Kumar, A., Chatterjee, J. M., & Díaz, V. G. (2020). A novel hybrid approach of svm combined with nlp and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering, 10(1), 486

      8. Margaret Rouse https://searchcloudcomputing.techtarget.com/definition/multi-tenant-cloud.

      9. Multi tenancy in SaaS-PaaS http://multitenancy-in-saaspaas.wikispaces.asu.edu/

      10. Naveen Kumar, Prakarti Triwedi, Pramod Singh Rathore, “An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)”, First International Conference on Information Technology and Knowledge Management pp. 89–92, ISSN 2300-5963 ACSIS, Vol. 14 DOI: 10.15439/2018KM19.

      11. Rathore, P.S., Chatterjee, J.M., Kumar, A. et al. Energy-efficient cluster head selection through relay approach for WSN. J Supercomputer (2021). https://doi.org/10.1007/s11227-020-03593-4

      13. Singh Rathore, P., Kumar, A., & Gracia-Diaz, V. (2020). A Holistic Methodology for Improved RFID Network Lifetime by Advanced Cluster Head Selection using Dragonfly Algorithm. International Journal Of Interactive Multimedia And Artificial Intelligence, 6 (Regular Issue), http://doi.org/10.9781/ijimai.2020.05.003.

      14. www.elsevier.com/locate/knosys