Читать книгу Deep Learning Approaches to Cloud Security - Группа авторов - Страница 36
2.3 Privacy in Cloud Environment Using Deep Learning
ОглавлениеIn Multi-Tenant cloud based systems, security uses the Deep Learning Method to overcome all the requirements of a tenant, including privacy policies and services required. Using Deep Learning Methods for developing the privacy structure of Cloud Computing provides better services according to the requirements of a tenant. Accordingly, at the request of the tenant, resources and service availability fulfil requests and the privacy and security services are developed and maintained. In the cloud computing environment, there are public, private, single, and multi-tenant structures available to use according to the requirements of a tenant. Different structures have different needs for privacy and security services. If better services are not available, the tenant may not use the structure, therefore, using Deep Learning methods develops privacy and security services. The services are developed according to the organisation’s needs using Deep Learning [8].
Privacy in Cloud Computing is maintained by a distributed system concept in a Multi-Tenancy based application using encryption techniques to protect data, synchronize work, and regulate base data modification if the tenant is authorized or not, so all factors are required to check and manage [9]. The privacy management system is used to manage the security of sophisticated data access.
The information stored in the cloud environment is directly encrypted in a format that the tenant is authorised to access and the data can only decrypt that data securely [10]. Using Deep Learning techniques increases privacy and security levels. A new protection algorithm has been developed using Deep Learning Methods for safe transformation and using data in a database in a cloud environment. In a Cloud Computing environment, a privacy service system has been developed to stop unauthorized access and increase the capabilities for the security of private data, minimizing the hacking of private data in the cloud environment shown in Figure 2.5 and Figure 2.6 [11].
Figure 2.5 Concept of Cloud Security [7].
Figure 2.6 Securities in Multi-Cloud environments [7].