{"id":"https://openalex.org/W1658248657","doi":"https://doi.org/10.1109/icacci.2015.7275642","title":"A Neural Data Security Model: Ensure high confidentiality and security in cloud datastorage environment","display_name":"A Neural Data Security Model: Ensure high confidentiality and security in cloud datastorage environment","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1658248657","doi":"https://doi.org/10.1109/icacci.2015.7275642","mag":"1658248657"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2015.7275642","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275642","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065523711","display_name":"S. Jegadeeswari","orcid":null},"institutions":[{"id":"https://openalex.org/I111575329","display_name":"Bharathiar University","ror":"https://ror.org/04fht8c22","country_code":"IN","type":"education","lineage":["https://openalex.org/I111575329"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Jegadeeswari","raw_affiliation_strings":["Bharathiar University, Coimbatore","Research Scholar, Bharathiar University, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Bharathiar University, Coimbatore","institution_ids":["https://openalex.org/I111575329"]},{"raw_affiliation_string":"Research Scholar, Bharathiar University, Coimbatore, India","institution_ids":["https://openalex.org/I111575329"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031326390","display_name":"P. Dinadayalan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114826","display_name":"Mahatma Gandhi Institute","ror":"https://ror.org/02hqm2v55","country_code":"MU","type":"education","lineage":["https://openalex.org/I4210114826"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"P. Dinadayalan","raw_affiliation_strings":["Mahatma Gandhi Govt. Arts college, Department of Computer Science, Mahe","Mahatina Gandhi Govt. Arts College, Department of Computer Science, Mahe, India"],"affiliations":[{"raw_affiliation_string":"Mahatma Gandhi Govt. Arts college, Department of Computer Science, Mahe","institution_ids":["https://openalex.org/I4210114826"]},{"raw_affiliation_string":"Mahatina Gandhi Govt. Arts College, Department of Computer Science, Mahe, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062237912","display_name":"N. Gnanambigai","orcid":null},"institutions":[{"id":"https://openalex.org/I2799277952","display_name":"Indira Gandhi Medical College","ror":"https://ror.org/056rage58","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799277952"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Gnanambigai","raw_affiliation_strings":["Department of Computer Science, Indira Gandhi College of Arts and Science, Puducherry","Department of Computer Science, Indira Gandhi College of Arts and Science, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Indira Gandhi College of Arts and Science, Puducherry","institution_ids":["https://openalex.org/I2799277952"]},{"raw_affiliation_string":"Department of Computer Science, Indira Gandhi College of Arts and Science, Puducherry, India","institution_ids":["https://openalex.org/I2799277952"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065523711"],"corresponding_institution_ids":["https://openalex.org/I111575329"],"apc_list":null,"apc_paid":null,"fwci":2.3838,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.9053259,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"400","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8085187673568726},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7977956533432007},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.6684600114822388},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6396178007125854},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.582920491695404},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5136991739273071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48596298694610596},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.43742120265960693},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3818510174751282},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.363229900598526},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08992183208465576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085187673568726},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7977956533432007},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.6684600114822388},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6396178007125854},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.582920491695404},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5136991739273071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48596298694610596},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.43742120265960693},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3818510174751282},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.363229900598526},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08992183208465576}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2015.7275642","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275642","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W70400310","https://openalex.org/W1973000163","https://openalex.org/W1975394156","https://openalex.org/W1988768686","https://openalex.org/W1994788755","https://openalex.org/W2019672983","https://openalex.org/W2076004957","https://openalex.org/W2107772336","https://openalex.org/W2117344801","https://openalex.org/W2119956568","https://openalex.org/W2137351756","https://openalex.org/W2162810870","https://openalex.org/W2184398281","https://openalex.org/W4234499961","https://openalex.org/W4319601656","https://openalex.org/W6635866195","https://openalex.org/W6644073259","https://openalex.org/W6669364501","https://openalex.org/W6677557825","https://openalex.org/W6677824699","https://openalex.org/W6684329139","https://openalex.org/W6686388288"],"related_works":["https://openalex.org/W350349969","https://openalex.org/W2532081440","https://openalex.org/W3214026606","https://openalex.org/W1984615645","https://openalex.org/W2537266736","https://openalex.org/W2353177111","https://openalex.org/W2809887432","https://openalex.org/W3110687098","https://openalex.org/W1616490367","https://openalex.org/W1985332856"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,4],"is":[2,30,121,132,150,159,177],"a":[3,8,33,38,42,49,189],"paradigm":[5],"which":[6],"provides":[7],"dynamic":[9,124],"environment":[10,70],"for":[11,71,105,163],"end":[12],"users":[13],"to":[14,60,112,134],"guarantee":[15],"Quality":[16],"of":[17,35,166,174],"Service":[18],"(QoS)":[19],"on":[20,24],"data":[21,52,68,73,98,103,107,120,140,183,191],"towards":[22],"confidentiality":[23,63,74,115,192],"the":[25,76,109,114,138,153,170,180],"out":[26],"sourced":[27],"data.":[28],"Confidentiality":[29],"about":[31],"accessing":[32],"set":[34],"information":[36],"from":[37],"cloud":[39,51,67,77,81,182],"database":[40,78],"with":[41,102],"high":[43,62,190],"security":[44,53,65,99,155,184],"level":[45],"This":[46,80,146,157],"research":[47],"proposes":[48],"new":[50],"model,":[54],"A":[55],"Neural":[56,82,93,128,144,148],"Data":[57,83,94,129],"Security":[58,84,95,130],"Model":[59,85],"ensure":[61],"and":[64,91,136,161],"in":[66,75,123],"storage":[69],"achieving":[72],"platform.":[79],"comprises":[86],"Dynamic":[87],"Hashing":[88],"Fragmented":[89],"Component":[90,131],"Feedback":[92,127,143,147],"Component.":[96],"The":[97,117,126,172],"component":[100],"deals":[101],"encryption":[104],"sensitive":[106,119,139],"using":[108,142,152],"RSA":[110,154],"algorithm":[111],"increase":[113],"level.":[116,193],"fragmented":[118],"stored":[122],"hashing.":[125],"used":[133],"encrypt":[135],"decrypt":[137],"by":[141,169],"Network.":[145],"Network":[149],"deployed":[151],"algorithm.":[156],"work":[158,176],"efficient":[160],"effective":[162],"all":[164],"kinds":[165],"queries":[167],"requested":[168],"user.":[171],"performance":[173],"this":[175],"better":[178],"than":[179],"conventional":[181],"models":[185],"as":[186],"it":[187],"achieve":[188]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
