Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm
- URL: http://arxiv.org/abs/2404.09286v1
- Date: Sun, 14 Apr 2024 15:38:34 GMT
- Title: Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm
- Authors: Yuvaraju Chinnam, Bosubabu Sambana,
- Abstract summary: "The cloud" refers to a collection of interconnected computing resources made possible by an extensive, real-time communication network like the internet.
The exponential expansion of cloud computing has made the rapid expansion of cloud services very remarkable.
Models of security that are relevant to cloud computing include confidentiality, authenticity, accessibility, data integrity, and recovery.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: In a nutshell, "the cloud" refers to a collection of interconnected computing resources made possible by an extensive, real-time communication network like the internet. Because of its potential to reduce processing costs, the emerging paradigm of cloud computing has recently attracted a large number of academics. The exponential expansion of cloud computing has made the rapid expansion of cloud services very remarkable. Ensuring the security of personal information in today's interconnected world is no easy task. These days, security is really crucial. Models of security that are relevant to cloud computing include confidentiality, authenticity, accessibility, data integrity, and recovery. Using the Hybrid Encryption this study, we cover all the security issues and leaks in cloud infrastructure.
Related papers
- Cloud Security and Security Challenges Revisited [0.0]
We revisit attacks on Cloud services and Cloud-related attack vectors that have been published in recent years.
Based on these findings, we apply a security metric in order to rank all these Cloud-related security challenges concerning their severity.
arXiv Detail & Related papers (2024-05-18T17:42:02Z) - Leveraging AI Planning For Detecting Cloud Security Vulnerabilities [15.503757553097387]
Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration.
Access control misconfigurations are often the primary driver for cloud attacks.
We develop a PDDL model for detecting security vulnerabilities which can for example lead to widespread attacks such as ransomware.
arXiv Detail & Related papers (2024-02-16T03:28:02Z) - Computing in the Era of Large Generative Models: From Cloud-Native to
AI-Native [46.7766555589807]
We describe an AI-native computing paradigm that harnesses the power of both cloudnative technologies and advanced machine learning inference.
These joint efforts aim to optimize costs-of-goods-sold (COGS) and improve resource accessibility.
arXiv Detail & Related papers (2024-01-17T20:34:11Z) - Security and Privacy Issues in Cloud Storage [0.0]
The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures.
Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about.
In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of.
arXiv Detail & Related papers (2024-01-08T18:27:57Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Towards Confidential Computing: A Secure Cloud Architecture for Big Data
Analytics and AI [0.0]
Cloud computing has become a viable solution for big data analytics and artificial intelligence.
Data security in certain fields such as biomedical research remains a major concern when moving to cloud.
arXiv Detail & Related papers (2023-05-28T16:08:44Z) - Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered
Architecture and Future Roadmap [0.0]
This survey paper on privacy-preserving cloud computing can help pave the way for future research in related areas.
This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems.
arXiv Detail & Related papers (2022-04-23T18:47:26Z) - Unsupervised Point Cloud Representation Learning with Deep Neural
Networks: A Survey [104.71816962689296]
Unsupervised point cloud representation learning has attracted increasing attention due to the constraint in large-scale point cloud labelling.
This paper provides a comprehensive review of unsupervised point cloud representation learning using deep neural networks.
arXiv Detail & Related papers (2022-02-28T07:46:05Z) - Edge-Cloud Polarization and Collaboration: A Comprehensive Survey [61.05059817550049]
We conduct a systematic review for both cloud and edge AI.
We are the first to set up the collaborative learning mechanism for cloud and edge modeling.
We discuss potentials and practical experiences of some on-going advanced edge AI topics.
arXiv Detail & Related papers (2021-11-11T05:58:23Z) - Auto-Split: A General Framework of Collaborative Edge-Cloud AI [49.750972428032355]
This paper describes the techniques and engineering practice behind Auto-Split, an edge-cloud collaborative prototype of Huawei Cloud.
To the best of our knowledge, there is no existing industry product that provides the capability of Deep Neural Network (DNN) splitting.
arXiv Detail & Related papers (2021-08-30T08:03:29Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.