Work place: Institute for research in technology, Universidad Pontificia Comillas, Madrid, Spain
E-mail: glrajora@comillas.edu
Website:
Research Interests: Wireless Sensor Networks
Biography
Gopal Lal Rajora completed his Bachelor's degree in Electronic Instrumentation and Control Technology and Engineering at the Technical University of Rajasthan, India, in 2015. He received a Master of Science in Applied Telecommunications and Engineering Management from the Universitat Politècnica de Catalunya, Spain. In addition, he has a Master of Science in Finance which he received from the University of Siena, Italy. Since November 2020, he has been working as a Predoctoral Researcher and PhD student at the Institute for Technological Research (IIT) of the Comillas Pontifical University, Madrid, Spain. His areas of interest are Intelligent Systems Area, wireless sensor network, predictive maintenance.
By M. Nafees Muneera G. Anbu Selvi V. Vaissnave Gopal Lal Rajora
DOI: https://doi.org/10.5815/ijcnis.2023.06.04, Pub. Date: 8 Dec. 2023
Cloud computing's popularity and success are directly related to improvements in the use of Information and Communication Technologies (ICT). The adoption of cloud implementation and services has become crucial due to security and privacy concerns raised by outsourcing data and business applications to the cloud or a third party. To protect the confidentiality and security of cloud networks, a variety of Intrusion Detection System (IDS) frameworks have been developed in the conventional works. However, the main issues with the current works are their lengthy nature, difficulty in intrusion detection, over-fitting, high error rate, and false alarm rates. As a result, the proposed study attempts to create a compact IDS architecture based on cryptography for cloud security. Here, the balanced and normalized dataset is produced using the z-score preprocessing procedure. The best attributes for enhancing intrusion detection accuracy are then selected using an Intelligent Adorn Dragonfly Optimization (IADO). In addition, the trained features are used to classify the normal and attacking data using an Intermittent Deep Neural Network (IDNN) classification model. Finally, the Searchable Encryption (SE) mechanism is applied to ensure the security of cloud data against intruders. In this study, a thorough analysis has been conducted utilizing various parameters to validate the intrusion detection performance of the proposed I2ADO-DNN model.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals