{"title":"利用martino同态加密的三向保护来防止未经授权的数据访问的基于密钥的安全云安全","authors":"Ganji Ramanjaiah , Tummala Srinivasa Ravi Kiran , Ampalam Srisaila , Annemneedi Lakshmanarao , Komanduri Venkata Sesha Sai Ramakrishna , Katakam Venkateswara Rao","doi":"10.1016/j.swevo.2025.102131","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud computing has transformed data storage and access by providing scalable and on-demand services. Nevertheless, it remains a priority issue to ensure the protection of sensitive data in cloud environments. Several existing security methods has fundamental shortcomings like poor threat prediction features, a failure to process encrypted data securely and high encryption time. To overcome these issues, this study proposes a novel secure key based cloud security utilizing Three-Way Protection with Martino Homomorphic Encryption for preventing unauthorized data access (SKCS-TWP-MHE-PUDA). Initially, the data are collected from Enron Email dataset. Then the input data is given to Reverse Lognormal Kalman Filter (RLKF) for data cleaning and normalization. Next, Koopman Theory Graph Convolutional Network (KTGCN) is used to analyze packet status, predict potential threats and prevent unauthorized cloud access. This real-time intrusion detection mechanism enables early anticipation of malicious activity. Meanwhile, Martino Homomorphic Encryption (MHE) is used to ensure data confidentiality by encrypting cloud-stored data such that only legitimate users decrypt and access it. The three-way security mechanism comprising user registration, intrusion detection and intrusion prevention strengthens overall protection. The performance of the proposed SKCS-TWP-MHE-PUDA method provides 26.68%, 25.75%, and 26.16% higher accuracy 29.08%, 30.70% and 16.26% higher precision when compared with existing techniques: Stochastic Gradient Descent long short-term memory dependent secure encryption approach for cloud data storage and retrieval in cloud computing environs (SGDLSTM-CDS-CCE), Blockchain Key Management: A Solution for Cloud Data Security (AES-BKY-CDS) and deep learning method with cryptographic transformation for enhancing data security in cloud environs (SqueezeNet-DS-CE) respectively.</div></div>","PeriodicalId":48682,"journal":{"name":"Swarm and Evolutionary Computation","volume":"98 ","pages":"Article 102131"},"PeriodicalIF":8.5000,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure key based cloud security utilizing three-way protection with martino homomorphic encryption for preventing unauthorized data access\",\"authors\":\"Ganji Ramanjaiah , Tummala Srinivasa Ravi Kiran , Ampalam Srisaila , Annemneedi Lakshmanarao , Komanduri Venkata Sesha Sai Ramakrishna , Katakam Venkateswara Rao\",\"doi\":\"10.1016/j.swevo.2025.102131\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Cloud computing has transformed data storage and access by providing scalable and on-demand services. Nevertheless, it remains a priority issue to ensure the protection of sensitive data in cloud environments. Several existing security methods has fundamental shortcomings like poor threat prediction features, a failure to process encrypted data securely and high encryption time. To overcome these issues, this study proposes a novel secure key based cloud security utilizing Three-Way Protection with Martino Homomorphic Encryption for preventing unauthorized data access (SKCS-TWP-MHE-PUDA). Initially, the data are collected from Enron Email dataset. Then the input data is given to Reverse Lognormal Kalman Filter (RLKF) for data cleaning and normalization. Next, Koopman Theory Graph Convolutional Network (KTGCN) is used to analyze packet status, predict potential threats and prevent unauthorized cloud access. This real-time intrusion detection mechanism enables early anticipation of malicious activity. Meanwhile, Martino Homomorphic Encryption (MHE) is used to ensure data confidentiality by encrypting cloud-stored data such that only legitimate users decrypt and access it. The three-way security mechanism comprising user registration, intrusion detection and intrusion prevention strengthens overall protection. The performance of the proposed SKCS-TWP-MHE-PUDA method provides 26.68%, 25.75%, and 26.16% higher accuracy 29.08%, 30.70% and 16.26% higher precision when compared with existing techniques: Stochastic Gradient Descent long short-term memory dependent secure encryption approach for cloud data storage and retrieval in cloud computing environs (SGDLSTM-CDS-CCE), Blockchain Key Management: A Solution for Cloud Data Security (AES-BKY-CDS) and deep learning method with cryptographic transformation for enhancing data security in cloud environs (SqueezeNet-DS-CE) respectively.</div></div>\",\"PeriodicalId\":48682,\"journal\":{\"name\":\"Swarm and Evolutionary Computation\",\"volume\":\"98 \",\"pages\":\"Article 102131\"},\"PeriodicalIF\":8.5000,\"publicationDate\":\"2025-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Swarm and Evolutionary Computation\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2210650225002895\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Swarm and Evolutionary Computation","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210650225002895","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Secure key based cloud security utilizing three-way protection with martino homomorphic encryption for preventing unauthorized data access
Cloud computing has transformed data storage and access by providing scalable and on-demand services. Nevertheless, it remains a priority issue to ensure the protection of sensitive data in cloud environments. Several existing security methods has fundamental shortcomings like poor threat prediction features, a failure to process encrypted data securely and high encryption time. To overcome these issues, this study proposes a novel secure key based cloud security utilizing Three-Way Protection with Martino Homomorphic Encryption for preventing unauthorized data access (SKCS-TWP-MHE-PUDA). Initially, the data are collected from Enron Email dataset. Then the input data is given to Reverse Lognormal Kalman Filter (RLKF) for data cleaning and normalization. Next, Koopman Theory Graph Convolutional Network (KTGCN) is used to analyze packet status, predict potential threats and prevent unauthorized cloud access. This real-time intrusion detection mechanism enables early anticipation of malicious activity. Meanwhile, Martino Homomorphic Encryption (MHE) is used to ensure data confidentiality by encrypting cloud-stored data such that only legitimate users decrypt and access it. The three-way security mechanism comprising user registration, intrusion detection and intrusion prevention strengthens overall protection. The performance of the proposed SKCS-TWP-MHE-PUDA method provides 26.68%, 25.75%, and 26.16% higher accuracy 29.08%, 30.70% and 16.26% higher precision when compared with existing techniques: Stochastic Gradient Descent long short-term memory dependent secure encryption approach for cloud data storage and retrieval in cloud computing environs (SGDLSTM-CDS-CCE), Blockchain Key Management: A Solution for Cloud Data Security (AES-BKY-CDS) and deep learning method with cryptographic transformation for enhancing data security in cloud environs (SqueezeNet-DS-CE) respectively.
期刊介绍:
Swarm and Evolutionary Computation is a pioneering peer-reviewed journal focused on the latest research and advancements in nature-inspired intelligent computation using swarm and evolutionary algorithms. It covers theoretical, experimental, and practical aspects of these paradigms and their hybrids, promoting interdisciplinary research. The journal prioritizes the publication of high-quality, original articles that push the boundaries of evolutionary computation and swarm intelligence. Additionally, it welcomes survey papers on current topics and novel applications. Topics of interest include but are not limited to: Genetic Algorithms, and Genetic Programming, Evolution Strategies, and Evolutionary Programming, Differential Evolution, Artificial Immune Systems, Particle Swarms, Ant Colony, Bacterial Foraging, Artificial Bees, Fireflies Algorithm, Harmony Search, Artificial Life, Digital Organisms, Estimation of Distribution Algorithms, Stochastic Diffusion Search, Quantum Computing, Nano Computing, Membrane Computing, Human-centric Computing, Hybridization of Algorithms, Memetic Computing, Autonomic Computing, Self-organizing systems, Combinatorial, Discrete, Binary, Constrained, Multi-objective, Multi-modal, Dynamic, and Large-scale Optimization.