171
Views
8
CrossRef citations to date
0
Altmetric
Articles

Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning

, &

REFERENCES

  • C. Xue-Zhou , “Network data encryption strategy for cloud computing,” in 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation , Nanchang , 2015, pp. 693–7.
  • B. Hauer , “Data and information leakage prevention within the scope of information security,” IEEE Access , Vol. 3, pp. 2554–65, Dec. 2015.
  • G. Sweetha , K. Suriya , and R. Jothi , “Security and privacy issues in cloud computing,” Emerg. Trends Adv. Comput. , pp. 69–75, 2015.
  • L. Tawalbeh , N. S. Darwazeh , R. S. Al-qassas , and F. Aldosari , “A secure cloud computing model based on data classification,” Procedia – Procedia Comput. Sci. , Vol. 52, pp. 1153–8, Jun. 2015.
  • A. Reznik , et al. “Generation of perfectly secret keys in wireless communication networks,” U. S. Patent US9130693, Sep. 8, 2015.
  • R. K. Kapur , and S. K. Khatri , “Secure data transfer in MANET using symmetric and asymmetric cryptography,” in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions) , Noida , 2015, pp. 1–5.
  • U. Somani , K. Lakhani , and M. Mundra , “Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing,” in 1st International Conference on Parallel, Distributed and Grid Computing , Waknaghat, Solan, 2010, pp. 211–6.
  • P. Rewagad , and Y. Pawar , “Use of digital signature with Diffie Hellman key exchange and AES encryption algorithm to enhance data security in cloud computing,” in 2013 International Conference on Communication Systems and Network Technologies (CSNT) , Gwalior , 2013, pp. 437–9.
  • F. Fatemi Moghaddam , S. D. Varnosfaderani , I. Ghavam , and S. Mobedi , “A client-based user authentication and encryption algorithm for secure accessing to cloud servers based on modified Diffie-Hellman and RSA small-e,” in 2013 IEEE Student Conference on Research and Development (SCOReD) , Putrajaya , 2013, pp. 175–80.
  • J. Wu , L. Ping , X. Ge , Y. Wang , and J. Fu , “Cloud storage as the infrastructure of cloud computing,” in International Conference on Intelligent Computing and Cognitive Informatics (ICICCI) , Kuala Lumpur, Jun. 22–23, 2010, pp. 380–3.
  • S. Hirani , Energy Consumption of Encryption Schemes in Wireless Devices , Pittsburgh, PA: University of Pittsburgh, 2003.
  • A. Ayushi , “A symmetric key cryptographic algorithm,” Int. J. Comput. Appl. , Vol. 1, no. 15, pp. 1–4, 2010.
  • N. Yadav , R. K. Kapoor , and M. A. Rizvi , “Comparative analysis of most common modern symmetric key cryptographic algorithms,” Int. J. Sci. Prog. Res. (IJSPR) , Vol. 1, pp. 82–5, 2015.
  • O. P. Verma , R. Agarwal , D. Dafouti , and S. Tyagi , “Performance analysis of data encryption algorithms,” in 3rd International Conference on Electronics Computer Technology (ICECT) , Kanyakumari , 2011, pp. 399–403.
  • M. Umaparvathi , and D. K. Varughese , “Evaluation of symmetric encryption algorithms for MANETs,” in IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) , Coimbatore , 2010, pp. 1–3.
  • D. Salama , A. Minaam , H. M. Abdual-kader , and M. M. Hadhoud , “Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types,” Int. J. Netw. Se. , Vol. 11, no. 2, pp. 78–87, Sept. 2010.
  • H. O. Alanazi , B. B. Zaidan , A. A. Zaidan , H. A. Jalab , M. Shabbir , and Y. Al-Nabhani , “New comparative study between DES, 3DES and AES within nine factors,” J. Comput. , Vol. 2, no. 3, pp. 152–7, ISSN 2151-9617, Mar. 2010.
  • S. M. Seth , and R. Mishra , “Comparative analysis of encryption algorithms for data communication,” Int. J. Comput. Sci. Technol. , Vol. 4333, pp. 292–4, 2011.
  • R. Tripathi , and S. Agrawal , “Comparative study of symmetric and asymmetric cryptography techniques,” Int. J. Adv. Found. Res. Comput. (IJAFRC) , Vol. 1, no. 6, pp. 68–76, 2014.
  • A. L. Jeeva , “Comparative analysis of performance efficiency and security measures of some encryption algorithms,” Int. J. Eng. Res. Appl. (IJERA) , Vol. 2, no. 3, pp. 3033–7, 2012.
  • A. Kahate , Cryptography and Network Security . Tata McGraw-Hill Education, 2003, ISBN 9780070494831.
  • T. Kothmayr , et al. “DTLS based security and two-way authentication for the internet of things,” Ad Hoc Networks 11.8 , Vol. 11, no. 8, pp. 2710–23, Nov. 2013.
  • B. Bezem , and P. K. J. Fjellby , Authenticated Uplink for the Small, Low Orbit Student Satellite NUTS . Trondheim : Project work, Department of Telematics, 2012.
  • S. G. Krantz , and H. R. Parks , A Mathematical Odyssey Journey from the Real to the Complex . Springer US, 2014, ISBN 9781461489382, pp. 197–215.
  • M. A. Saleh , N. M. Tahir , E. Hisham , and H. Hashim , “An analysis and comparison for popular video encryption algorithms,” in IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) , Langkawi , 2015, pp. 90–4.
  • H. T. Dinh , et al. “A survey of mobile cloud computing: Architecture, applications, and approaches,” Wirel. Commun. Mob. Comput. , Vol. 13, no. 18, pp. 1587–611, 2013.
  • Mtu.edu. , “Security Policies and Procedures | Michigan Tech Information Technology,” [online] Available: http://www.mtu.edu/it/security/policies-procedures-guidelines.
  • UTHSCSA Data Classification report , “Protection by data classification security standard,” Policy Ref: 5.8.21 Data Classification, Aug. 2006.
  • The California State University (CSU), “Information security data classification,” 8065.S02.
  • M. A. Zardari , L. T. Jung , and N. Zakaria , “K-NN classifier for data confidentiality in cloud computing,” in IEEE International Conference on Computer and Information Sciences (ICCOINS) , Kuala Lumpur, 2014, pp. 1–6.
  • M. A. Zardari , and L. T. Jung , “Data security rules/regulations based classification of file data using TsF-kNN algorithm,” Cluster Comput. , Vol. 19, no. 1, pp. 1–20, 2016.
  • M. Verma , and D. Mehta , “A comparative study of techniques in data mining,” Int. J. Emerg. Technol. Adv. Eng. , Vol. 4, no. 4, pp. 314–21, Apr. 2014.
  • S. B. Yoel , “How to select the right machine learning approach?” IJAFRC , Vol. 3, no. 5, pp. 105–11, 2013.
  • M. D. Steenwijk , et al. “Accurate white matter lesion segmentation by k nearest neighbor classification with tissue type priors (kNN-TTPs),” NeuroImage: Clin. , Vol. 3, pp. 462–9, 2013.
  • B. Adedeji Kazeem and A. Akinlolu Ponnle , “A new hybrid data encryption and decryption technique to enhance data security in communication networks: Algorithm development,” Int. J. Sci. Eng. Res. , Vol. 5, no. 10, pp. 804–11, 2014.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.