STUDY OF BANKING SECURITY USING CLOUD COMPUTING USING UNSUPERVISED LEARNING

SEEE DIGIBOOK ON ENGINEERING & TECHNOLOGY, VOL. 01 (2), JUN 2020 PP. (327-330)
Abstract– The Internet of Things (IoT) is a relatively new technology that was created with the goal of connecting and interconnecting all of the objects that are located worldwide. This technology makes it possible to achieve an astounding level of intelligence, which is beneficial to humankind in many different ways. Connecting the things that are all around us and giving them the ability to interact with one another is a step toward the goal of developing intelligent applications in the fields of healthcare, safety, and industrial operations. As a result of the Internet of things involving a large number of distinct organisations and a wide variety of applications, the likelihood of unwanted access occurring is significantly increased. As of right now, the cyberattacks that communication networks have to deal with are extremely dangerous and really scary. This research provides an intelligent approach or methodology to defend the security breach, produced with the enhancement of Deep Learning algorithms (Deep Belief Network), i.e., Deep Belief Network. The research was carried out by the Deep Belief Network. This intelligent intrusion detection methodology examines the harmful behaviour that is taking place within the network, and it makes an attempt to get access to where it is taking place. Within the scope of this study, the investigation into embedding the Deep Learning approach is the topic of discussion. Comparisons are made between the DBN upgrade to the security network and the DGAs and IDS algorithms that are considered industry standards, and the results are assessed.
Index Terms – Unsupervised learning, cloud computing, banking systems, cloud performance, cloud storage, and cloud security.
REFERENCE

[1] N Leavitt, “Is Cloud Computing Really Ready for Prime Time?”, Computer, vol. 42, pp. 15-20, 2009.
[2] C Weinhardt, AAnandasivam, B Blau, J Stosser, “Business Models in the Service World”, IT Professional, vol. 11, pp. 28-33, 2009.
[3] F Gens, “New IDC IT Cloud Services Survey: Top Benefits and Challenges”, IDC eXchange, February 2009, [online] Available: http://blogs.idc.com/ie/? p=730.
[4] A Platform Computing Whitepaper, pp. 6, March 2010.
[5] B Dooley, “Architectural Requirements Of The Hybrid Cloud”, Information Management Online, February 2010, [online]Available:http:// www.informationmanagement.com/ne ws/hybrid-cloud- architectural-requirements 10017152-1.html.
[6] Global Netoptex Incorporated”, Demystifying the cloud. Important opportunities crucial choices, pp. 4-14, December 2009.
[7] M Lofstrand, “The VeriScale Architecture: Elasticity and Efficiency for Private Clouds”, Sun Microsystems Sun BluePrint, 09 09.
[8] M Goia, “„Cloud computing grid computing utility computing-list of top providers”, Feb 2010
[9] J Brodkin, “Gartner: Seven cloud-computing security risks”, Infoworld, March 2008.
[10] ISO. ISO 7498–2: 1989. Information processing systems- Open Systems Interconnection.ISO 7498–2.


Selvaraj K, Dineshkumar S, Gnanasivasakthi A, Servai A
Department of Information Technology,
Rathinam Technical Campus,
Coimbatore, India

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top