Analyzing Privacy and Security in Cloud Computing Environments


Authors : Praveen Kumar Vemula; Sri Charitha Veeranki; Monika Chowdary Mannem; Bala Satya Sai Pranathi Reddy; Dr. Sammy F

Volume/Issue : Volume 9 - 2024, Issue 6 - June


Google Scholar : https://tinyurl.com/vw4x43k3

Scribd : https://tinyurl.com/2c7d7a6z

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUN1024

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : With the rapid surge of spam across the Internet and its various forms, effectively identifying and combating spam has become an urgent priority. Cloud computing offers significant advantages in terms of storage and processing capabilities, making it a viable solution for analysing vast amounts of email data. To address the dynamic nature of spam and its life cycle, an anti-spam system with feedback reassessment is proposed. This system incorporates a text filtering approach based on active learning, involving four key stages: training, filtering, feedback, and re-filtering. Compared to traditional systems, the feedback-enabled filtering system demonstrates improved keyword filtering. To further enhance the accuracy of spam detection and minimize misjudgements in legitimate emails, leveraging weighted decision-making based on email header information is recommended. Additionally, for emails with sparse content, employing title weighting in the filtering process proves to be both feasible and effective, particularly in identifying spam with minimal text content. Given the advancements of cloud-based filtering methods over traditional algorithms, leveraging cloud computing holds promise in effectively combating the escalating volume of spam. As such, this paper delves into an in-depth exploration of spam identification within cloud computing environments, focusing on text filtering systems. This study is informed by a comprehensive analysis of existing anti-spam technologies, aiming to contribute to the ongoing efforts in mitigating spam proliferation online.

Keywords : Cloud Computing,Cloud Security.

References :

  1. A. Bernárdez Rodal, G. Padilla Castillo, and R. P. Sosa Sánchez, “From action art to Artivism on Instagram: relocation and instantaneity for a new geography of protest,” Catalan journal of communication & cultural studies, vol. 11, no. 1, pp. 23–37, 2019.
  2. H. Herzogenrath-Amelung, “The new instantaneity: how social media are helping us privilege the (politically) correct over the true,” Media, Culture & Society, vol. 38, no. 7, pp. 1080–1089, 2016.
  3. M. Léouffre, F. Quaine, and C. Serviere, “Testing of instantaneity hypothesis for blind source separation of extensor indicis and extensor digiti minimi surface electromyograms,” Journal of Electromyography and Kinesiology, vol. 23, no. 4, pp. 908–915, 2013.
  4. T. H. Silva, A. C. Viana, F. Benevenuto et al., “Urban computing leveraging location-based social network data,” ACM Computing Surveys (CSUR), vol. 52, no. 1, pp. 1–39, 2020.
  5. W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, “Security and accuracy of fingerprint-based biometrics: a review,” Symmetry, vol. 11, no. 2, p. 141, 2019.
  6. R. R. Kobak and C. Hazan, “Attachment in marriage: effects of security and accuracy of working models,” Journal of Personality and Social Psychology, vol. 60, no. 6, pp. 861–869, 1991.
  7. B. C. Williams, L. B. Demitrack, and B. E. Fries, “The accuracy of the national death index when personal identifiers other than social security number are used,” American Journal of Public Health, vol. 82, no. 8, pp. 1145–1147, 1992.
  8. R. G. Saltman, “Accuracy, integrity and security in computerized vote-tallying,” Communications of the ACM, vol. 31, no. 10, pp. 1184–1191, 1988.
  9. G. Li, B. Liu, S. J. Qin, and D. Zhou, “Quality relevant data-driven modeling and monitoring of multivariate dynamic processes: the dynamic T-PLS approach,” IEEE Transactions on Neural Networks, vol. 22, no. 12, pp. 2262–2271, 2011.
  10. J. A. Evans, “Electronic publication and the narrowing of science and scholarship,” Science, vol. 321, no. 5887, pp. 395–399, 2008.
  11. S. Harnad, “Electronic scholarly publication: quo vadis?” Serials Review, vol. 21, no. 1, pp. 70–72, 1995.
  12. G. Taubes, “Publication by electronic mail takes physics by storm,” Science, vol. 259, no. 5099, pp. 1246–1248, 1993.
  13. H. Cheng, D. Yang, C. Lu, Q. Qin, and D. Cadasse, “Intelligent oil production stratified water injection technology,” Wireless Communications and Mobile Computing, vol. 2022, Article ID 3954446, p. 7, 2022.
  14. M. Viceconti, S. Olsen, L. P. Nolte, and K. Burton, “Extracting clinically relevant data from finite element simulations,” Clinical biomechanics, vol. 20, no. 5, pp. 451–454, 2005.
  15. G. V. Cormack, “Email spam filtering: a systematic review,” Information Retrieval, vol. 1, no. 4, pp. 335–455, 2008.
  16. L. F. Cranor and B. A. LaMacchia, “Spam!,” Communications of the ACM, vol. 41, no. 8, pp. 74–83, 1998.
  17. M. Crawford, T. M. Khoshgoftaar, J. D. Prusa, A. N. Richter, and H. Al Najada, “Survey of review spam detection using machine learning techniques,” Journal of Big Data, vol. 2, no. 1, pp. 1–24, 2015.
  18. H. Cheng, J. Wei, and Z. Cheng, “Study on sedimentary facies and reservoir characteristics of Paleogene sandstone in Yingmaili block,” Geofluids, vol. 2022, Article ID 1445395, 14 pages, 2022.
  19. J. Wei, H. Cheng, B. Fan, Z. Tan, L. Tao, and L. Ma, “Research and practice of" one opening-one closing" productivity testing technology for deep water high permeability gas wells in South China Sea,” Fresenius Environmental Bulletin, vol. 29, no. 10, pp. 9438–9445, 2020.
  20. W. Zhang, Z. Cheng, H. Cheng, Q. Qin, and M. Wang, “Research of tight gas reservoir simulation technology,” IOP Conference Series: Earth and Environmental Science, vol. 804, no. 2, article 022046, 2021.
  21. E. Blanzieri and A. Bryl, “A survey of learning-based techniques of email spam filtering,” Artificial Intelligence Review, vol. 29, no. 1, pp. 63–92, 2008.

With the rapid surge of spam across the Internet and its various forms, effectively identifying and combating spam has become an urgent priority. Cloud computing offers significant advantages in terms of storage and processing capabilities, making it a viable solution for analysing vast amounts of email data. To address the dynamic nature of spam and its life cycle, an anti-spam system with feedback reassessment is proposed. This system incorporates a text filtering approach based on active learning, involving four key stages: training, filtering, feedback, and re-filtering. Compared to traditional systems, the feedback-enabled filtering system demonstrates improved keyword filtering. To further enhance the accuracy of spam detection and minimize misjudgements in legitimate emails, leveraging weighted decision-making based on email header information is recommended. Additionally, for emails with sparse content, employing title weighting in the filtering process proves to be both feasible and effective, particularly in identifying spam with minimal text content. Given the advancements of cloud-based filtering methods over traditional algorithms, leveraging cloud computing holds promise in effectively combating the escalating volume of spam. As such, this paper delves into an in-depth exploration of spam identification within cloud computing environments, focusing on text filtering systems. This study is informed by a comprehensive analysis of existing anti-spam technologies, aiming to contribute to the ongoing efforts in mitigating spam proliferation online.

Keywords : Cloud Computing,Cloud Security.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe