Deep Learning Approaches to Cloud Security

Здесь есть возможность читать онлайн «Deep Learning Approaches to Cloud Security» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Deep Learning Approaches to Cloud Security: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Deep Learning Approaches to Cloud Security»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

DEEP LEARNING APPROACHES TO CLOUD SECURITY
Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.
Deep Learning Approaches to Cloud Security: Audience:

Deep Learning Approaches to Cloud Security — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Deep Learning Approaches to Cloud Security», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

1.3.1 Feature Selection

Feature Selection selects the most relevant attributes by identifying the most pertinent characteristics and eliminating redundant information. A small size feature vector is used to reduce computational complexity, basic for online individual acknowledgment. Determination of effective features also helps increase precision [11]. Traditionally, large dimensions of feature vectors can be reduced using Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA).

The importance of a feature set S, for class c, is characterized by the normal estimation of all common data values between the individual feature f iand class c as follows:

The repetition of all features in set S is the normal estimation of all common - фото 3

The repetition of all features in set S is the normal estimation of all common data values between feature f iand feature f j:

132 Feature Extraction Feature extraction extracts distinct features from - фото 4

1.3.2 Feature Extraction

Feature extraction extracts distinct features from samples represented in a feature vector. Thus, alteration of attributes takes place in this method, whereas predictive significance criteria is used to rank the current attributes in feature selection technique. The altered features or attributes are linear aggregations of the original attributes. Since data is described by a lesser number of meaningful features, we obtain a higher quality model based on such derived attributes [12].

Feature extraction helps in data visualization by reducing a complex data set to 2 or 3 dimensions. It can improve the speed and efficiency of supervised learning. Feature extraction can also be used to enhance the speed and effectiveness of supervised learning. It has applications in data compression, data decomposition and projection, latent semantic analysis, and pattern recognition.

The information is extended onto the largest Eigen Vectors in order to reduce the dimensionality.

Let V = matrix with columns having the largest Eigen Vectors and

D = original data with columns of different observations.

Then, the projected data D′ is derived as D′ = V T D .

In the event when just N Eigen Vectors are kept and e1...eN represents the related Eigen Values, the amount of variance left after projecting the original d -dimensional data can be determined as:

133 Face Marking Facial land marking and facial feature detection are - фото 5

1.3.3 Face Marking

Facial land marking and facial feature detection are significant activities that influence ensuing assignments concentrated on the face, for example, gaze detection, coding, face acknowledgment, and demeanor, as well as understanding of gestures, face tracking, and so on and so forth.

Face landmarks like the nose tip, eye corners, end points of the eyebrow curves, jaw line, nostril corners, and ear projections can serve as anchor points on a face chart. A few Landmarks that are less influenced by expressions are more reliable can be termed as fiducially points. In imaging systems, fiducially points are treated as imprints intentionally positioned in the scene to function as a point of reference shown in Figure 1.2[13].

Figure 12 Applications of FaceLand marking 4 Applications of FaceLand - фото 6

Figure 1.2 Applications of Face-Land marking [4].

Applications of Face-Land Marking

• Expression Understanding: Facial expressions can be analyzed by means of temporal dynamics and spatial arrangements of landmarks.

• Face Tracking: Number of facial factors are depicted on the face graph model. Face tracking is acknowledged by letting the model chart advance as per shape of face parameters, facial segments, and their mathematical relations.

• Face Recognition: Locating the region of the eye and extracting holistic features from the windows fixated on different focal points.

1.3.4 Nearest Neighbor Approach

KNN Algorithm: A non-parametric regression and classification algorithm based on the model structure generated from data without any assumptions of its own.

KNN is used for measuring similarities by vector representation and comparison using an acceptable distance metric in various domains of data processing, pattern recognition, and intrusion detection. KNN is called memory-based or lazy learning in light of the fact that the manner in which it learns is simply storing representations of the training examples. An object is classified depending on the majority votes of its neighbors in the training set. The new model item will be ascribed to the class with its most comparable K-Closest Neighbors.

For facial acknowledgment, we can select the face descriptors and use the K-Nearest Neighbors (KNN) calculation to train our classifier.

Euclidean Distance Function of K-Nearest Neighbor can be used for feature extraction:

14 Related Work A Review P M Rubesh Anand 2018 along with other - фото 7

1.4 Related Work, A Review

P M Rubesh Anand (2018), along with other researchers, in his study, have done a complete analysis of the cloud environment and summed up the prevailing security threats in the cloud, conceivable outcomes, and alleviation in cloud administration with accentuation on access supervision, identity management, and services. Their research evaluates various facets with their commonly used techniques or mechanisms.

A K Jain (2012), in his research, sheds some light on the vulnerabilities of the biometric systems, the intrinsic limitations of the similarity of the any two biometrics, and its adversary effects. Unlike traditional authentication systems based on passwords, biometric authentications does not fully guarantee security.

A Patil (2018) in his paper discusses the security concerns of the cloud computing. Since cloud computing is a technology that delivers real time services, it is vulnerable to various kinds of data breaches. They discuss end to end communication through encryption, which would safeguard stolen information as the content would be encrypted and require security credentials [14].

To minimize, and ultimately beat, the dangers incorporated in the usage of customary strategies of authentication using PINs and passwords, a biometric framework for validation claimed to be more effective in controlling data breaches in cloud computing. In their research, they utilized an AES (Advanced Encryption Standard) algorithm for encrypting the data received from users at the time of enrollment and have devised another algorithm for the correlation of the user information with that of the layouts in the information database during authentication.

C S Vorugunti (2014) in his paper provides a simple and secure authentication system based on the SAAS model. It involves enrollment and verification as two steps of authentication. In the enrollment process, the biometric data is converted into a binary form. The feature extractor then converts the binary string into a set of features. In the verification process, the same feature will be processed when the user logins to the cloud. The process then verifies the cryptographic encryption and decryption operation on the users’ biometric data.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Deep Learning Approaches to Cloud Security»

Представляем Вашему вниманию похожие книги на «Deep Learning Approaches to Cloud Security» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Deep Learning Approaches to Cloud Security»

Обсуждение, отзывы о книге «Deep Learning Approaches to Cloud Security» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x