Secure key based cloud security utilizing three-way protection with martino homomorphic encryption for preventing unauthorized data access

IF 8.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Ganji Ramanjaiah , Tummala Srinivasa Ravi Kiran , Ampalam Srisaila , Annemneedi Lakshmanarao , Komanduri Venkata Sesha Sai Ramakrishna , Katakam Venkateswara Rao
{"title":"Secure key based cloud security utilizing three-way protection with martino homomorphic encryption for preventing unauthorized data access","authors":"Ganji Ramanjaiah ,&nbsp;Tummala Srinivasa Ravi Kiran ,&nbsp;Ampalam Srisaila ,&nbsp;Annemneedi Lakshmanarao ,&nbsp;Komanduri Venkata Sesha Sai Ramakrishna ,&nbsp;Katakam Venkateswara Rao","doi":"10.1016/j.swevo.2025.102131","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud computing has transformed data storage and access by providing scalable and on-demand services. Nevertheless, it remains a priority issue to ensure the protection of sensitive data in cloud environments. Several existing security methods has fundamental shortcomings like poor threat prediction features, a failure to process encrypted data securely and high encryption time. To overcome these issues, this study proposes a novel secure key based cloud security utilizing Three-Way Protection with Martino Homomorphic Encryption for preventing unauthorized data access (SKCS-TWP-MHE-PUDA). Initially, the data are collected from Enron Email dataset. Then the input data is given to Reverse Lognormal Kalman Filter (RLKF) for data cleaning and normalization. Next, Koopman Theory Graph Convolutional Network (KTGCN) is used to analyze packet status, predict potential threats and prevent unauthorized cloud access. This real-time intrusion detection mechanism enables early anticipation of malicious activity. Meanwhile, Martino Homomorphic Encryption (MHE) is used to ensure data confidentiality by encrypting cloud-stored data such that only legitimate users decrypt and access it. The three-way security mechanism comprising user registration, intrusion detection and intrusion prevention strengthens overall protection. The performance of the proposed SKCS-TWP-MHE-PUDA method provides 26.68%, 25.75%, and 26.16% higher accuracy 29.08%, 30.70% and 16.26% higher precision when compared with existing techniques: Stochastic Gradient Descent long short-term memory dependent secure encryption approach for cloud data storage and retrieval in cloud computing environs (SGDLSTM-CDS-CCE), Blockchain Key Management: A Solution for Cloud Data Security (AES-BKY-CDS) and deep learning method with cryptographic transformation for enhancing data security in cloud environs (SqueezeNet-DS-CE) respectively.</div></div>","PeriodicalId":48682,"journal":{"name":"Swarm and Evolutionary Computation","volume":"98 ","pages":"Article 102131"},"PeriodicalIF":8.5000,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Swarm and Evolutionary Computation","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210650225002895","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud computing has transformed data storage and access by providing scalable and on-demand services. Nevertheless, it remains a priority issue to ensure the protection of sensitive data in cloud environments. Several existing security methods has fundamental shortcomings like poor threat prediction features, a failure to process encrypted data securely and high encryption time. To overcome these issues, this study proposes a novel secure key based cloud security utilizing Three-Way Protection with Martino Homomorphic Encryption for preventing unauthorized data access (SKCS-TWP-MHE-PUDA). Initially, the data are collected from Enron Email dataset. Then the input data is given to Reverse Lognormal Kalman Filter (RLKF) for data cleaning and normalization. Next, Koopman Theory Graph Convolutional Network (KTGCN) is used to analyze packet status, predict potential threats and prevent unauthorized cloud access. This real-time intrusion detection mechanism enables early anticipation of malicious activity. Meanwhile, Martino Homomorphic Encryption (MHE) is used to ensure data confidentiality by encrypting cloud-stored data such that only legitimate users decrypt and access it. The three-way security mechanism comprising user registration, intrusion detection and intrusion prevention strengthens overall protection. The performance of the proposed SKCS-TWP-MHE-PUDA method provides 26.68%, 25.75%, and 26.16% higher accuracy 29.08%, 30.70% and 16.26% higher precision when compared with existing techniques: Stochastic Gradient Descent long short-term memory dependent secure encryption approach for cloud data storage and retrieval in cloud computing environs (SGDLSTM-CDS-CCE), Blockchain Key Management: A Solution for Cloud Data Security (AES-BKY-CDS) and deep learning method with cryptographic transformation for enhancing data security in cloud environs (SqueezeNet-DS-CE) respectively.
利用martino同态加密的三向保护来防止未经授权的数据访问的基于密钥的安全云安全
云计算通过提供可扩展和按需服务,改变了数据存储和访问方式。然而,确保云环境中敏感数据的保护仍然是一个优先问题。现有的几种安全方法存在威胁预测功能差、加密数据处理不安全、加密时间长等根本缺陷。为了克服这些问题,本研究提出了一种新的基于安全密钥的云安全,利用Martino同态加密的三向保护来防止未经授权的数据访问(skcs - twp - mhea - puda)。最初,数据是从安然电子邮件数据集收集的。然后将输入数据交给逆对数正态卡尔曼滤波器(RLKF)进行数据清洗和归一化。接下来,使用库普曼理论图卷积网络(KTGCN)分析数据包状态,预测潜在威胁并防止未经授权的云访问。这种实时入侵检测机制支持对恶意活动的早期预测。同时,Martino同态加密(MHE)通过加密云存储的数据来确保数据的机密性,这样只有合法用户才能解密和访问它。用户注册、入侵检测和入侵防御三方面的安全机制加强了整体防护。与现有技术相比,所提出的skcs - twp - mhea - puda方法的准确率分别提高了26.68%、25.75%和26.16%,分别提高了29.08%、30.70%和16.26%。针对云计算环境下云数据存储和检索的随机梯度下降长短期记忆依赖安全加密方法(SGDLSTM-CDS-CCE),区块链密钥管理:云数据安全解决方案(aes - bkey - cds)和增强云环境下数据安全的加密转换深度学习方法(SqueezeNet-DS-CE)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Swarm and Evolutionary Computation
Swarm and Evolutionary Computation COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCEC-COMPUTER SCIENCE, THEORY & METHODS
CiteScore
16.00
自引率
12.00%
发文量
169
期刊介绍: Swarm and Evolutionary Computation is a pioneering peer-reviewed journal focused on the latest research and advancements in nature-inspired intelligent computation using swarm and evolutionary algorithms. It covers theoretical, experimental, and practical aspects of these paradigms and their hybrids, promoting interdisciplinary research. The journal prioritizes the publication of high-quality, original articles that push the boundaries of evolutionary computation and swarm intelligence. Additionally, it welcomes survey papers on current topics and novel applications. Topics of interest include but are not limited to: Genetic Algorithms, and Genetic Programming, Evolution Strategies, and Evolutionary Programming, Differential Evolution, Artificial Immune Systems, Particle Swarms, Ant Colony, Bacterial Foraging, Artificial Bees, Fireflies Algorithm, Harmony Search, Artificial Life, Digital Organisms, Estimation of Distribution Algorithms, Stochastic Diffusion Search, Quantum Computing, Nano Computing, Membrane Computing, Human-centric Computing, Hybridization of Algorithms, Memetic Computing, Autonomic Computing, Self-organizing systems, Combinatorial, Discrete, Binary, Constrained, Multi-objective, Multi-modal, Dynamic, and Large-scale Optimization.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信