Loading

Data Security Model Using Artificial Neural Networks and Database Fragmentation in Cloud Environment
D. Suneetha1, D. Rathna Kishore2, G.G.S. Pradeep3 

1D. Suneetha, Associate Professor, Department of Computer Science Engineering, NRIIT, Vijayawada, A.P, India.
2D. Rathna Kishore, Professor, Department of Computer Science Engineering, NRIIT, Vijayawada, A.P, India.
3G.G.S. Pradeep, Professor, Department of Computer Science Engineering, Malla Reddy Institute of Science and Technology, A.P, India.

Manuscript received on 11 March 2019 | Revised Manuscript received on 18 March 2019 | Manuscript published on 30 July 2019 | PP: 5972-5975 | Volume-8 Issue-2, July 2019 | Retrieval Number: B3658078219/19©BEIESP | DOI: 10.35940/ijrte.B3658.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data security is a one of the challenging issue in present scenario. In that one of the on-demand service is cloud computing and it provides so many services for end users and also it provides a dynamic environment for end user to provide quality of services on data it leads to improve in the confidentiality of the data. The proposed work presents a new cloud data security model with the help of Artificial Neural Network. It improves the confidentiality and security in cloud environment. This proposed algorithm is implemented using dynamic hashing fragmented component. It is implemented for storing fragmented sensitive secret data. The neural network cryptographic proposed algorithm is used for data to deal with encryption process for secret and improve the confidentiality. This algorithm applied for various number of cloud databases, and it shows high confidentiality on data security.
Keywords: Cloud Data Security, Encryption, Fragmentation, Artificial Neural Networks, Confidentiality, Cryptography
Scope of the Article: Cloud Computing