Volume 20 No 9 (2022)
 Download PDF
AN EFFICIENT MODEL FOR USER IDENTIFICATION AND DATA SECURITY USING He-RNN AND SKD-ECC WITH USER AUTHORIZATION
Badari Narayan V S, Dr. Siddappa P
Abstract
Cloud Computing (CC) is an Internet-centered, advanced technology that is rapidly growing. It offers numerous options for resource sharing, storage, and several features. Security concerns have emerged as one of the most significant difficulties faced by the cloud environment in recent years. Using He-Recurrent Neural Network (He-RNN) and Secret Key Double-Elliptic Curve Cryptography (SKD-ECC) with user authorization, an effective model for user identification and data security was proposed in this paper to address such problems. The training phase and the secure data transmission phase were the two vital phases in the proposed work. The following steps - data owner registration, IP spoofing, User profile database, and user identification phase occur in the training phase. The He-RNN network was trained centered on the registration details. Using Double Public Key- Digital Signature Algorithm (DOUPK-DSA), the signatures are engendered during the secure data transmission phase. Using SKD-ECC, the data encryption is executed along with spoofing the data owner’s IP address. The data’s authorization is verified with the altered data identification phase before the data is transmitted to the user. Moreover, the signature matching process verifies the data user’s authentication. The data is sent to the data user if the signature matches; otherwise, the data transfer is rejected. And the proposed method’s outcomes are analogized with prevailing algorithms. The experimental outcomes exhibited that the proposed framework outperformed existing methodologies regarding accuracy, sensitivity, and specificity, and executed the privacy-preserving process more accurately
Keywords
Recurrent neural network, He initialization, Elliptic curve cryptography, Digital signature algorithm, Privacy-preserving in the cloud
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.