Volume 20 No 9 (2022)
Download PDF
AN EFFICIENT MODEL FOR USER IDENTIFICATION AND DATA SECURITY USING He-RNN AND SKD-ECC WITH USER AUTHORIZATION
Badari Narayan V S, Dr. Siddappa P
Abstract
Cloud Computing (CC) is an Internet-centered, advanced technology that is rapidly growing. It offers
numerous options for resource sharing, storage, and several features. Security concerns have emerged as
one of the most significant difficulties faced by the cloud environment in recent years. Using He-Recurrent
Neural Network (He-RNN) and Secret Key Double-Elliptic Curve Cryptography (SKD-ECC) with user
authorization, an effective model for user identification and data security was proposed in this paper to
address such problems. The training phase and the secure data transmission phase were the two vital
phases in the proposed work. The following steps - data owner registration, IP spoofing, User profile
database, and user identification phase occur in the training phase. The He-RNN network was trained
centered on the registration details. Using Double Public Key- Digital Signature Algorithm (DOUPK-DSA),
the signatures are engendered during the secure data transmission phase. Using SKD-ECC, the data
encryption is executed along with spoofing the data owner’s IP address. The data’s authorization is verified
with the altered data identification phase before the data is transmitted to the user. Moreover, the
signature matching process verifies the data user’s authentication. The data is sent to the data user if the
signature matches; otherwise, the data transfer is rejected. And the proposed method’s outcomes are
analogized with prevailing algorithms. The experimental outcomes exhibited that the proposed framework
outperformed existing methodologies regarding accuracy, sensitivity, and specificity, and executed the
privacy-preserving process more accurately
Keywords
Recurrent neural network, He initialization, Elliptic curve cryptography, Digital signature algorithm, Privacy-preserving in the cloud
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.