| 
 Proceedings of International Conference on Applied Innovation in IT
 2025/07/26, Volume 13, Issue 3, pp.81-88
 
 A Novel Encryption and Data Mining-Based Approach to Secure Sustainable Cloud Systems
 Ruksanan Ruksanan, Erni Danggi, Ebaa Abdulsattar Jaber and Arkan Adnan ImranAbstract: Using cloud computing, businesses and individuals can store and process data more efficiently, flexibly, and cost-effectively. Despite this, with cloud systems becoming more and more integral to modern IT infrastructures, there has been a rise in concerns about data security and privacy. Traditional encryption methods may be effective if a limited amount of data is being handled but are inefficient if a large amount of data is being handled in a dynamic environment like a cloud. In this paper, advanced encryption methods are combined with data mining techniques to enhance cloud security. A novel approach to enhancing cloud security is presented in this paper, which combines advanced encryption methods with data mining. This model integrates decision tree methods with cryptographic protocols to address user authentication, data access control, and real-time detection of security threats. Further, data mining enhances cloud security by allowing detection of patterns and anomalies, enabling proactive instead of reactive security measures. A study of the potential of integrating these approaches into cloud computing systems aims to improve the privacy, security, and reliability of data.
 
 Keywords: Cloud Computing Security, Encryption Techniques, Data Mining, User Authentication, Real-Time Security Threat Detection.
 
 DOI: Under Indexing
 
 Download: PDF
 
 
 References:
A. Hero et al., “Statistics and data science for cybersecurity,” Harv. Data Sci. Rev., vol. 5, no. 1, 2023, Accessed: Apr. 13, 2025. [Online]. Available: https://hdsr.mitpress.mit.edu/pub/koyzu1te.
B.-C. Chen, J. Guo, B. Tseng, and J. Yang, “User reputation in a comment rating environment,” in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discov. Data Mining, San Diego, CA, USA: ACM, Aug. 2011, pp. 159–167, doi: 10.1145/2020408.2020439.
Ö. Aslan, R. Samet, and Ö. Ö. Tanrıöver, “Using a Subtractive Center Behavioral Model to Detect Malware,” Secur. Commun. Netw., vol. 2020, pp. 1–17, Feb. 2020, doi: 10.1155/2020/7501894.
P. Rani and M. H. Falaah, “Real-Time Congestion Control and Load Optimization in Cloud-MANETs Using Predictive Algorithms,” NJF Intell. Eng. J., vol. 1, no. 1, pp. 66–76, 2024.
H. R. Abdulshaheed, S. A. Binti, and I. I. Sadiq, “A review on smart solutions based-on cloud computing and wireless sensing,” Int. J. Pure Appl. Math., vol. 119, no. 18, pp. 461–486, 2018.
N. Hussain and P. Rani, “Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security,” in Distributed Artificial Intelligence, CRC Press, 2020, pp. 217–236.
N. Hussain, P. Rani, N. Kumar, and M. G. Chaudhary, “A deep comprehensive research architecture, characteristics, challenges, issues, and benefits of routing protocol for vehicular ad-hoc networks,” Int. J. Distrib. Syst. Technol. (IJDST), vol. 13, no. 8, pp. 1–23, 2022.
A. Schmoldt, H. F. Benthe, and G. Haberland, “Digitoxin metabolism by rat liver microsomes,” Biochem. Pharmacol., vol. 24, no. 17, pp. 1639–1641, Sep. 1975.
P. Rani, U. C. Garjola, and H. Abbas, “A Predictive IoT and Cloud Framework for Smart Healthcare Monitoring Using Integrated Deep Learning Model,” NJF Intell. Eng. J., vol. 1, no. 1, pp. 53–65, 2024.
O. Kayode, D. Gupta, and A. S. Tosun, “Towards a distributed estimator in smart home environment,” in Proc. 2020 IEEE 6th World Forum Internet Things (WF-IoT), IEEE, 2020, pp. 1–6, Accessed: Apr. 13, 2025. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9221083.
P. Rani et al., “Federated Learning-Based Misbehavior Detection for the 5G-Enabled Internet of Vehicles,” IEEE Trans. Consum. Electron., vol. 70, no. 2, pp. 4656–4664, May 2024, doi: 10.1109/TCE.2023.3328020.
A. Singh et al., “Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing,” Peer-Peer Netw. Appl., vol. 18, no. 3, p. 132, Jun. 2025, doi: 10.1007/s12083-025-01946-5.
D. D and J. P. P. M, “A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining,” Apr. 28, 2023, arXiv:2304.14607, doi: 10.48550/arXiv.2304.14607.
Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” in Advances in Cryptology — CRYPTO 2000, vol. 1880, M. Bellare, Ed., Lecture Notes in Computer Science, vol. 1880. Berlin, Heidelberg: Springer, 2000, pp. 36–54, doi: 10.1007/3-540-44598-6_3.
P. Rani, P. N. Singh, S. Verma, N. Ali, P. K. Shukla, and M. Alhassan, “An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment,” Wirel. Commun. Mob. Comput., vol. 2022, pp. 1–14, 2022.
Z. Fengli and B. Yijing, “ARM-Based Privacy Preserving for Medical Data Publishing,” in Cloud Computing and Security, vol. 9483, Z. Huang, X. Sun, J. Luo, and J. Wang, Eds., Lecture Notes in Computer Science, vol. 9483. Cham: Springer, 2015, pp. 62–73, doi: 10.1007/978-3-319-27051-7_6.
L. Li, R. Lu, K.-K. R. Choo, A. Datta, and J. Shao, “Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 8, pp. 1847–1861, Aug. 2016, doi: 10.1109/TIFS.2016.2561241.
M. Dhage and S. V. Kedar, “Privacy Preserving Horizontal Partitioning of Outsourced Database for Frequent Pattern Mining Using Paillier,” in Proc. 2017 Int. Conf. Comput. Commun. Control Autom. (ICCUBEA), Pune, India: IEEE, Aug. 2017, pp. 1–6, doi: 10.1109/ICCUBEA.2017.8463910.
L. Liu et al., “Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties,” in Information Security and Privacy, vol. 10946, W. Susilo and G. Yang, Eds., Lecture Notes in Computer Science, vol. 10946. Cham: Springer, 2018, pp. 431–451, doi: 10.1007/978-3-319-93638-3_25.
X. Dong, J. Chen, K. Zhang, and H. Qian, “Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data,” IEEE Access, vol. 8, pp. 2247–2257, 2020, doi: 10.1109/ACCESS.2019.2962700.
F. Wang et al., “Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare,” IEEE Access, vol. 7, pp. 166054–166065, 2019, doi: 10.1109/ACCESS.2019.2953495.
S. Li, N. Mu, J. Le, and X. Liao, “Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction,” Comput. Secur., vol. 84, pp. 17–34, Jul. 2019, doi: 10.1016/j.cose.2019.03.008.
J. Liu, Y. Tian, Y. Zhou, Y. Xiao, and N. Ansari, “Privacy preserving distributed data mining based on secure multi-party computation,” Comput. Commun., vol. 153, pp. 208–216, Mar. 2020, doi: 10.1016/j.comcom.2020.02.014.
J.-S. Lee and S.-P. Jun, “Privacy-preserving data mining for open government data from heterogeneous sources,” Gov. Inf. Q., vol. 38, no. 1, p. 101544, Jan. 2021, doi: 10.1016/j.giq.2020.101544.
P. K. Singh, R. Singh, S. K. Nandi, K. Z. Ghafoor, D. B. Rawat, and S. Nandi, “Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract,” IEEE Trans. Intell. Transp. Syst., vol. 22, no. 6, pp. 3616–3630, Jun. 2021, doi: 10.1109/TITS.2020.3004041.
M. Monshizadeh and Z. Yan, “Security related data mining,” in Proc. 2014 IEEE Int. Conf. Comput. Inf. Technol., IEEE, 2014, pp. 775–782, Accessed: Apr. 14, 2025. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/6984750.
M. Ashraf, M. Zaman, M. Ahmed, and S. J. Sidiq, “Knowledge discovery in academia: a survey on related literature,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 1, pp. 303–310, 2017.
C. Gentry and S. Halevi, “Implementing Gentry’s Fully-Homomorphic Encryption Scheme,” in Advances in Cryptology – EUROCRYPT 2011, vol. 6632, K. G. Paterson, Ed., Lecture Notes in Computer Science, vol. 6632. Berlin, Heidelberg: Springer, 2011, pp. 129–148, doi: 10.1007/978-3-642-20465-4_9.
A. El-Yahyaoui and M. D. Elkettani, “Fully homomorphic encryption: state of art and comparison,” Int. J. Comput. Sci. Inf. Secur., vol. 14, no. 4, p. 159, 2016. |  
	
		|  
  
			    HOME 
			- Conference - Journal
 - Paper Submission to Journal
 - Paper Submission to Conference
 - For Authors
 - For Reviewers
 - Important Dates
 - Conference Committee
 - Editorial Board
 - Reviewers
 - Last Proceedings
 
			-
            Volume 13, Issue 3 (ICAIIT 2025) PROCEEDINGS
 -
            Volume 13, Issue 2 (ICAIIT 2025)
 -
            Volume 13, Issue 1 (ICAIIT 2025)
 -
            Volume 12, Issue 2 (ICAIIT 2024)
 -
            Volume 12, Issue 1 (ICAIIT 2024)
 -
            Volume 11, Issue 2 (ICAIIT 2023)
 -
            Volume 11, Issue 1 (ICAIIT 2023)
 -
            Volume 10, Issue 1 (ICAIIT 2022)
 -
            Volume 9, Issue 1 (ICAIIT 2021)
 -
            Volume 8, Issue 1 (ICAIIT 2020)
 -
            Volume 7, Issue 1 (ICAIIT 2019)
 -
            Volume 7, Issue 2 (ICAIIT 2019)
 -
            Volume 6, Issue 1 (ICAIIT 2018)
 -
            Volume 5, Issue 1 (ICAIIT 2017)
 -
            Volume 4, Issue 1 (ICAIIT 2016)
 -
			Volume 3, Issue 1 (ICAIIT 2015)
 -
			Volume 2, Issue 1 (ICAIIT 2014)
 -
			Volume 1, Issue 1 (ICAIIT 2013)
 
			ICAIIT 2025 PAST CONFERENCES
 -
			Photos
 -
			Reports
 
 ICAIIT 2024
 -
			Photos
 -
			Reports
 
 ICAIIT 2023
 -
			Photos
 -
			Reports
 
 ICAIIT 2021
 -
			Photos
 -
			Reports
 
 ICAIIT 2020
 -
			Photos
 -
			Reports
 
 ICAIIT 2019
 -
			Photos
 -
			Reports
 
 ICAIIT 2018
 -
			Photos
 -
			Reports
   
			    ETHICS IN PUBLICATIONS
 ACCOMODATION
   
			    CONTACT US   |  |