Preserving Privacy Using Enhanced Shadow Honeypot Algorithm For Data Retrieval In Cloud Computing

  • Dr.C.Saravanabhavan, Ms.T.Gangalakshmi, P. Ashok, Dr.N.Krishnaveni, N.Gopinath
Keywords: Enhanced Shadow Honeypot, provision, f-measure, Fuzzy k-means and KDD99

Abstract

Data has been essential to all facets of human life in the last decades. In recent years, the enormous growth of data as a outcome of the development of various applications. This data needs to be protected and stored in locked sites. Cloud computing is the technology can be used to accumulate those immense amounts of data. . The rapid enlargement of this technology makes it more dangerous Therefore, it has become imperative to secure records from attackers to preserve its reliability confidentiality, protection, privacy and actions required for handle it. This paper wished-for anEnhanced Shadow Honeypot Algorithm (ESHA) along with CNN based preprocessing segment of cryptography. As, the data holder requests for the file, the cloud server is then in charge for key generation and to validate this key with user for the intention of authentication. After the provision of key, the file is decrypted using superior Shadow Honeypot algorithm and a decrypted file will be retrieve by the user. At last, the presentation analysis is carried and the comparative examination of existing and proposed techniques is made for proving the future scheme effectiveness. The parameters considered are precision, recall, accuracy, f-measure.

Published
2021-09-05
How to Cite
Dr.N.Krishnaveni, N.Gopinath, D. M. P. A. (2021). Preserving Privacy Using Enhanced Shadow Honeypot Algorithm For Data Retrieval In Cloud Computing. Design Engineering, 6166- 6173. Retrieved from http://thedesignengineering.com/index.php/DE/article/view/4051
Section
Articles