Establishment of Encryption Technique to Secure Data Files in the Cloud Using Machine Learning Classification Algorithms of SVM

Abstract

A data contribution in the cloud is a strategy to permit clients to promisingly give a correction of passage to data or information in excess of the cloud. Data holder can't oversee over their data, since cloud assessment donor is an outsider benefactor. The main tragedies with data that take part in the cloud is the isolation and secure measure issues. Different approaches are acquiring to support user seclusion and protected data. Security should be provided to store any kind of data and storing that data in a cost-effective manner is also important so cloud has been used. The data holder reevaluates their information in the cloud because of cost diminishing and the tremendous assets given by cloud administrations. This paper point of convergence on various plans to decrease through ensured information sharing like data commitment with forward security, protected information partaking for vigorous gatherings, quality-based data sharing, scrambled information sharing and normal effect Based Privacy-Preserving check set of rules for right to use regulate of rethought information. Machine learning classification algorithms such as decision tree, Support Vector Machine (SVM), and Logical regression are implemented to predict the performance. 

Country : India

1 Suneeta Netala

  1. Associate Professor, Department of Computer Science and Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 1, Issue 2, November 2017 pp. 15-19

.

References

  1. Nawal Ali Yassein, Rasha Gaffer M Helali and Somia B Mohomad , “Predicting Academic Performance of students in KSA using Data Mining Techniques”, Journal of Information Technology & Software Engineering., Vol.7, No. 5, (2020).
  2. Xinyi Huang et.al "Efficient and secure character-based encryption plot with balance test in distributed computing," (2015).
  3. Huang Qinlong et.al “A scalable attributed-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing," (2015).
  4. Hong Liu et.al “In the multi-authority cloud Securing outsourced data with fine-grained access control and efficient attribute revocation," (2015).
  5. Qiang Tang et.al “Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-based Sign encryption" (2014).
  6. Brijesh Kumar Baradwaj, and Saurabh Pal, "Mining instructive information or a data to investigate understudies' exhibition”. International Journal of Advanced Computer Science and Applications Vol. 2, No. 6. (2018).
  7. Md. Hedayetul Islam Shovon and Mahfuza Haque, “An Approach of Improving Academic Performance of students by utilizing K-means clustering algorithm and Decision tree”, International Journal of Advanced Computer Science, (2015).
  8. Sen, J. (2011c) “A Secure and Efficient way of Searching for Trusted Nodes in Peer-to-Peer Network”. The events on Computational Intelligence in Security for Information Systems (CISIS’11) of the 4th International Conference, pp. 101-109, Springer LNCS Vol 6694, June 2018.