Deep Learning Approaches to Cloud Security. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Deep Learning Approaches to Cloud Security - Группа авторов страница 13

Deep Learning Approaches to Cloud Security - Группа авторов

Скачать книгу

http://dx.doi.org/10.2139/ssrn.3355151

      19. Sarvabhatla, M., Giri, M., Vorugunti, C.S., Cryptanalysis of cryptanalysis and improvement of Yan et al., Biometric- based authentication scheme for TMIS, CoRR, 2014.

      20. Ziyad, S., & Rehman, S. Critical Review of Authentication Mechanisms in Cloud Computing, (2014).

      21. Shruti Bawaskar et al, /(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 960-966, 2016.

      Privacy in Multi-Tenancy Cloud Using Deep Learning

       Shweta Solanki1* and Prafull Narooka2

       1 MDS University Ajmer, Ajmer, India

       2 Department of Computer Science, Agrawal College, Merta City, Rajasthan

      * Corresponding author: [email protected]

       Abstract

      There is a responsibility to maintain the privacy and security of data in the Cloud Computing environment. In present times, the need for privacy is increased due to frequent development in multi-tenant service based systems. As a system of growth increases, the requirement for privacy also increases. We use Deep Learning concepts to increase privacy levels. In this chapter, we understand the cloud computing concept within a Multi-Tenant Framework (MWF). In Multi-Tenant Frameworks, requirements for privacy and security concepts are developed using Deep Learning. The goal is to find privacy requirements across many factors in a Multi-Tenancy based systems using Deep Learning concepts. The services of Multi-Tenant based systems are aggregated due to the dynamic environment of Cloud Computing. Three consistencies will be maintained by privacy policies using Deep Learning. In Multi- Tenancy, a large number of users (tenants) use the same services required for privacy and security to maintain the durability and consistency of service.

      Keywords: Multi-tenant, privacy, framework, privacy policy, cloud computing, single tenant, public, private

      2.2.1 Basic Structure of Cloud Computing

      Cloud Computing services are used by every service area, whether the business is small or large.

      The cloud facility is available according to the requirements of the business. The cloud enables the facility to store data, whether it be large or small, and provides access to data from any location and any hardware or a virtual environments for accessing or storing data.

      Cloud Computing provides the services of both service oriented and event driven architecture.

Schematic illustration of cloud computing services.

      The cloud service provider provides all cloud services. Whether the type of service provided by the service provider is commercial or corporate is decided by the service provider [3].

      The cloud service provider can provide all services with physical or virtual resources that provide the cloud service and create applications according the requirement of services. All groups work together as a service orchestration.

      2.2.2 Concept of Multi-Tenancy

      The basic concept of Multi-Tenancy is required when many tenants work together with the use of internet and data can be transferred using digital services if the tenants are in different places; the

Скачать книгу