K-NN classifier for data confidentiality in cloud computing

Securing the data in cloud is still a challenging issue. In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. Deciding data security approach for the data without understanding the security needs of the data is no...

Full description

Saved in:
Bibliographic Details
Main Authors: Zardari, M.A., Jung, L.T., Zakaria, N.
Format: Conference or Workshop Item
Published: Institute of Electrical and Electronics Engineers Inc. 2014
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938796234&doi=10.1109%2fICCOINS.2014.6868432&partnerID=40&md5=d366c2cdb01cf5c11356f00762dc64ed
http://eprints.utp.edu.my/31201/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Securing the data in cloud is still a challenging issue. In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. Deciding data security approach for the data without understanding the security needs of the data is not a technically valid approach. Before applying any security on data in cloud, it is best to know the security needs of the data. What data need security and what data do not need security. In this paper, we propose a data classification approach based on data confidentiality. K-NN data classification technique is modulated in the cloud virtual environment. The aim to use K-NN is to classify the data based on their security needs. The data is classified into two classes, sensitive and non-sensitive (public) data. After data classification we got that what data need security and what data does not need security. The RSA algorithm is used to encrypt the sensitive data to keep it secure. We used CloudSim simulator to find the results of proposed approach in cloud. The proposed approach will easily decide the security needs of the data. After the data classification, it is easy to select an appropriate security for data according to the need of data. The results show that this approach is appropriate as compared to store data in cloud without understanding the security requirements of data. © 2014 IEEE.