Abstract
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.
Publisher
Inventive Research Organization
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Advanced Encryption for Enhanced Data Protection for Heterogeneous Sensor Networks;2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO);2024-03-14
2. Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA;Multimedia Watermarking;2024
3. Randomized Matrix-based Double-Key Cryptographic System;2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2023-01-05
4. Design and Security Analysis of Isoidentity based Isobeta Cryptosystem;2022 International Conference on Automation, Computing and Renewable Systems (ICACRS);2022-12-13
5. Reliable Data Storage and Sharing using Block chain Technology and Two Fish Encryption;2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA);2022-09-21