Skip to main content
Log in

Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Cloud computing refers to a set of hardware and software that are connected to provide various computing services. Cloud consists of services to deliver software, infrastructure and platform over the internet depending on user demand. However, various categories of vulnerabilities and threats are increased, due to the improved demand and development of cloud computing. In cloud computing, data integrity and security are the main issues, which is reduced the system performance. Therefore, an Enhanced Elman Spike Neural Network (EESNN) based Fractional Order Discrete Tchebyshev moments (FrDTMs) encryption fostered big data analytical method is proposed in this manuscript for enhancing cloud data security. Initially, the input data is pre-processed using a Z-score normalization process. Also, the optimal features are implemented by Uni-variate ensemble feature selection technique, which can improve the quality and reliability of data. The proposed EESNN model is used to classify the attack types in cloud databases and the security is improved by FrDTMs model. The proposed EESNN-FrDTMs approach has achieved high data security and performance. The simulation of this model is done using JAVA. From the simulation, the proposed model attains 11.58%, 26.6%, 25.5%, 45.75%, 36.88% high accuracy, 7.37%, 15.43%, 8.68%, 11.42%, 16.88% lower information loss than the existing approaches, like PSO-PNN, eHIPF, GSNN-FEO, and BISNN-BO respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Kobusińska, A., Leung, C., Hsu, C. H., Raghavendra, S., & Chang, V. (2018). Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing. Future Generation Computer Systems, 87, 416–419.

    Article  Google Scholar 

  2. Awaysheh, F. M., Aladwan, M. N., Alazab, M., Alawadi, S., Cabaleiro, J. C. & Pena, T. F. (2021). Security by design for big data frameworks over cloud computing. IEEE Transactions on Engineering Management.

  3. Liu, C., Feng, Y., Lin, D., Wu, L., & Guo, M. (2020). Iot based laundry services: An application of big data analytics, intelligent logistics management, and machine learning techniques. International Journal of Production Research, 58(17), 5113–5131.

    Article  Google Scholar 

  4. Alabdulatif, A., Khalil, I., & Yi, X. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137, 192–204.

    Article  Google Scholar 

  5. Wen, Y., Liu, J., Dou, W., Xu, X., Cao, B., & Chen, J. (2020). Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Generation Computer Systems, 108, 1084–1091.

    Article  Google Scholar 

  6. Stergiou, C., & Psannis, K. E. (2017). Efficient and secure big data delivery in cloud computing. Multimedia Tools and Applications, 76(21), 22803–22822.

    Article  Google Scholar 

  7. Sun, Y., Liu, Q., Chen, X., & Du, X. (2020). An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Transactions on Information Forensics and Security, 15, 3295–3310.

    Article  Google Scholar 

  8. Ji, Y., Shao, B., Chang, J., & Bian, G. (2020). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Applied Mathematics and Computation, 386, 125478.

    Article  MATH  Google Scholar 

  9. Han, W., & Xiao, Y. (2020). Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1697–1708.

    Article  Google Scholar 

  10. Muheidat, F. & Tawalbeh, L. A. (2021). Mobile and cloud computing security. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 461–483). Springer, Cham.

  11. Rajesh, P., Shajin, F. H., & Cherukupalli, K. (2021). An efficient hybrid tunicate swarm algorithm and radial basis function searching technique for maximum power point tracking in wind energy conversion system. Journal of Engineering, Design and Technology.

  12. Shajin, F. H., & Rajesh, P. (2022). FPGA realization of a reversible data hiding scheme for 5G MIMO-OFDM system by chaotic key generation-based paillier cryptography along with LDPC and its side channel estimation using machine learning technique. Journal of Circuits, Systems and Computers, 31(05), 2250093.

    Article  Google Scholar 

  13. Rajesh, P., Muthubalaji, S., Srinivasan, S., & Shajin, F. H. (2022). Leveraging a dynamic differential annealed optimization and recalling enhanced recurrent neural network for maximum power point tracking in wind energy conversion system. Technology and Economics of Smart Grids and Sustainable Energy, 7(1), 1–15.

    Article  Google Scholar 

  14. Shajin, F. H., Rajesh, P., & Raja, M. R. (2022). An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits, Systems, and Signal Processing, 41(3), 1751–1774.

    Article  Google Scholar 

  15. Premkamal, P. K., Pasupuleti, S. K., Singh, A. K., & Alphonse, P. J. A. (2021). Enhanced attribute based access control with secure deduplication for big data storage in cloud. Peer-to-Peer Networking and Applications, 14(1), 102–120.

    Article  Google Scholar 

  16. Wang, L., & Jones, R. (2021). Big data analytics in cyber security: Network traffic and attacks. Journal of Computer Information Systems, 61(5), 410–417.

    Article  Google Scholar 

  17. Rjoub, G., Bentahar, J., & Wahab, O. A. (2020). BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments. Future Generation Computer Systems, 110, 1079–1097.

    Article  Google Scholar 

  18. Gudditti, V. & Krishna, P. V. (2021). Light weight encryption model for map reduce layer to preserve security in the big data and cloud. Materials Today: Proceedings.

  19. Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387–394.

    Article  Google Scholar 

  20. Hongsong, C., Yongpeng, Z., Yongrui, C., & Bhargava, B. (2021). Security threats and defensive approaches in machine learning system under big data environment. Wireless Personal Communications, 117(4), 3505–3525.

    Article  Google Scholar 

  21. Mondal, A., & Goswami, R. T. (2021). Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocessors and Microsystems, 81, 103719.

    Article  Google Scholar 

  22. Krishnaveni, S., Sivamohan, S., Sridhar, S. S., & Prabakaran, S. (2021). Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, 1–19.

  23. Al-Jamali, N. A. S., & Al-Raweshidy, H. S. (2020). Modified Elman spike neural network for identification and control of dynamic system. IEEE Access, 8, 61246–61254.

    Article  Google Scholar 

  24. Xiao, B., Luo, J., Bi, X., Li, W., & Chen, B. (2020). Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Information Sciences, 516, 545–559.

    Article  MATH  Google Scholar 

  25. Mohammad, A. S., & Pradhan, M. R. (2021). Machine learning with big data analytics for cloud security. Computers & Electrical Engineering, 96, 107527.

    Article  Google Scholar 

  26. Lo’ai, A. T., & Saldamli, G. (2021). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences, 33(7), 810–819.

    Article  Google Scholar 

  27. Narayanan, U., Paul, V., & Joseph, S. (2020). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University-Computer and Information Sciences.

  28. Viswanath, G., & Krishna, P. V. (2021). Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence, 14(2), 691–698.

    Article  Google Scholar 

  29. Stergiou, C. L., Plageras, A. P., Psannis, K. E., & Gupta, B. B. (2020). Secure machine learning scenario from big data in cloud computing via internet of things network. In Handbook of computer networks and cyber security (pp. 525–554). Springer.

  30. Rabbani, M., Wang, Y. L., Khoshkangini, R., Jelodar, H., Zhao, R., & Hu, P. (2020). A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, 151, 102507.

    Article  Google Scholar 

  31. Chiba, Z., Abghour, N., Moussaid, K., & Rida, M. (2019). Intelligent approach to build a deep neural network based IDS for cloud environment using combination of machine learning algorithms. Computers & Security, 86, 291–317.

    Article  Google Scholar 

  32. NSL-KDD,” Kaggle.com. (2020). Available: https://www.kaggle.com/hassan06/nslkdd; accessed: 15 Jan 2020.

  33. Phan, T. V., & Park, M. (2019). Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access, 7, 18701–18714.

    Article  Google Scholar 

  34. Pitti, A., Quoy, M., Lavandier, C., & Boucenna, S. (2020). Gated spiking neural network using Iterative free-energy optimization and rank-order coding for structure learning in memory sequences (INFERNO GATE). Neural Networks, 121, 242–258.

    Article  Google Scholar 

  35. Kim, S., Park, S., Na, B., Kim, J., & Yoon, S. (2020). Towards fast and accurate object detection in bio-inspired spiking neural networks through Bayesian optimization. IEEE Access, 9, 2633–2643.

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Balamurugan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balamurugan, V., Karthikeyan, R., Sundaravadivazhagan, B. et al. Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security. Wireless Netw 29, 523–537 (2023). https://doi.org/10.1007/s11276-022-03142-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03142-2

Keywords

Navigation