当前位置: X-MOL 学术Comput. Intell. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud
Computational Intelligence ( IF 2.8 ) Pub Date : 2020-10-23 , DOI: 10.1111/coin.12408
Varun Prabhakaran 1 , Ashokkumar Kulandasamy 2
Affiliation  

Data communication security is growing day after day with the proliferation of cloud computing. It is primarily because of the few security constraints and challenges occurring in the cloud environment during data transmission. Existing research has shown that the intrusion detection system (IDS) centered on the cloud is more complicated. In this article, we address the above issues by proposing an attention‐based recurrent convolutional neural network (RCNN). This proposed RCNN is used to detect whether the text data are intrusion or nonintrusion. The nonintrusion text information is then used for further processing and encrypted using a two‐way encryption scheme. We introduce the elliptical curve cryptography (ECC) approach to increase the security‐level performance of nonintrusion data. Moreover, the integration of ECC with the modified flower pollination algorithm (MFP‐ECC) creates the two‐way encryption scheme, and it is used to produce an optimal private key. The encrypted data are then stored in a cloud environment by steganography and the data with the sensitive information are replaced by some other text, thus providing security to the data at rest. The proposed MFP‐ECC approach shows maximum breaking time results and can also withstand different classical attacks when compared with other methods. As a result, the proposed intrusion detection and secure data storage mechanism is highly secured and it is never affected by any kinds of conspiracy attacks.

中文翻译:

循环卷积神经网络与用于入侵检测的最佳加密方案的集成,并在云中安全存储数据

随着云计算的发展,数据通信安全性日趋增长。这主要是由于在数据传输期间云环境中发生的安全性约束和挑战很少。现有研究表明,以云为中心的入侵检测系统(IDS)更为复杂。在本文中,我们通过提出基于注意力的递归卷积神经网络(RCNN)来解决上述问题。提出的RCNN用于检测文本数据是入侵还是非入侵。然后,非侵入文本信息将用于进一步处理,并使用双向加密方案进行加密。我们引入了椭圆曲线加密(ECC)方法,以提高非入侵数据的安全级别性能。而且,ECC与改进的花粉传粉算法(MFP-ECC)的集成创建了双向加密方案,并用于生成最佳私钥。然后,通过隐写术将加密的数据存储在云环境中,并将带有敏感信息的数据替换为其他一些文本,从而为静态数据提供安全性。与其他方法相比,建议的MFP-ECC方法显示了最大的中断时间结果,并且还可以承受不同的经典攻击。结果,所提出的入侵检测和安全数据存储机制是高度安全的,并且永远不会受到任何阴谋攻击的影响。然后,通过隐写术将加密的数据存储在云环境中,并将带有敏感信息的数据替换为其他一些文本,从而为静态数据提供安全性。与其他方法相比,建议的MFP-ECC方法显示了最大的中断时间结果,并且还可以承受不同的经典攻击。结果,所提出的入侵检测和安全数据存储机制是高度安全的,并且永远不会受到任何阴谋攻击的影响。然后,通过隐写术将加密的数据存储在云环境中,并将带有敏感信息的数据替换为其他一些文本,从而为静态数据提供安全性。与其他方法相比,建议的MFP-ECC方法显示了最大的中断时间结果,并且还可以承受不同的经典攻击。结果,所提出的入侵检测和安全数据存储机制是高度安全的,并且永远不会受到任何阴谋攻击的影响。
更新日期:2020-10-23
down
wechat
bug