MACHINE LEARNING APPROACH FOR CRYPTOSYSTEM SUGGEST IN EDUCARE OVER CLOUDS
DOI:
https://doi.org/10.29121/granthaalayah.v9.i6.2021.4009Keywords:
Machine Learning, Cryptography, Cloud Computing, Online Educare, Decision SupportAbstract [English]
In the current situation of the pandemic, global organizations are turning to online functionality to ensure survival and sustainability. The future, even though uncertain, holds great promise for the education system being online. Cloud services for education are the center of this research work as they require security and privacy. The sensitive information about the users and the institutions need to be protected from all interested third parties. since the data delivery on any of the online systems is always time sensitive, the have to be fast. In previous works some of the algorithms were explored and statistical inference based decision was presented. In this work a machine learning system is designed to make that decision based on data type and time requirements.
Downloads
References
(2016). "State Of Cloud Security", CSA Global Enterprise Advisory Board.
Ahmed, M. & Hossain, M. A. (j2014). CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD. International Journal Of Network Security & Its Applications (IJNSA) 6(1). DOI: https://doi.org/10.5121/ijnsa.2014.6103
Fu, H.-C., Xu, Y.-Y., Pao, H.-T. & Wang, J. (2013). Interactive Video Platform For E-Learning And Remote Services. IJCSI International Journal Of Computer Science Issues 10(1).
Harsha, S., Bhaskar, M. N. & Sheshaprakash, (2015). A 3-D Advancement To Pythocrypt For Any File Type. Journal of Open Innovation: Technology, Market, and Complexity . https://doi.org/10.1186/s40852-015-0022-8 DOI: https://doi.org/10.1186/s40852-015-0022-8
Harsha, S., Nazim, K., Vallabh, S. A. & Rao, V. (2018). Improving Wifi Security Against Evil Twin Attack Using A Light Weight Machine Learning Application. In IJACT By Compusoft ISSN 2320–0790.
Prasad Padhy, R., Ranjan Patra, M. & Satapathy, S. C. (2011). Cloud Computing: Security Issues And Research Challenges. IRACST - International Journal Of Computer Science And Information Technology & Security (IJCSITS) 1(2).
Ravish, G. K. & T. (2020). Analysis Of Time Delays Incurred For Security In Cloud Based Data Services For Educare Systems. Journal of Xi'an University of Architecture & Technology 12(11), 365–368.
Ravish, G. K. & T. (2021). Enhancing Security In Cloud Based Educare Platforms. Journal of Xi'an University of Architecture & Technology 13(4), 219–224. Retrieved from https://www.xajzkjdx.cn/gallery/22-april2021.pdf
Ravish, G. K. & T. (2020). STEM Learning Environments On Clouds - A Data Security Perspective, IJETER, WARSE. 8. 10.34218/IJARET.11.12.2020.091
(2015). Securing The Cloud For The Enterprise. A Joint White Paper From Symantec And Vmware .
S, H., Bhaskar, N., Sheshaprakash, M. N. & Rao, G. R. (2016). Auto Mutating Cryptosystem- An approach towards better security. IOSR Journal of Computer Engineering 18(04), 42–46. Retrieved from https://dx.doi.org/10.9790/0661-1804054246 10.9790/0661-1804054246 DOI: https://doi.org/10.9790/0661-1804054246
Wallace, A. (2014). Social Learning Platforms and the Flipped Classroom. International Journal of Information and Education Technology 4(4), 293–296. Retrieved from https://dx.doi.org/10.7763/ijiet.2014.v4.416 10.7763/ijiet.2014.v4.416 DOI: https://doi.org/10.7763/IJIET.2014.V4.416
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Ravish G K, Dr K Thippeswamy
This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.