{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:55:06Z","timestamp":1773968106850,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the increasing rise of distributed system technologies, one of the most pressing problems facing the digital world is ensuring the security of sensitive and confidential data during transport and storage, which is also regarded as one of the most critical difficulties facing cloud computing. Numerous techniques exist for enhancing data security in the cloud computing storage environment. Encryption is the most important method of data protection. Consequently, several accessible encryption strategies are utilized to provide security, integrity, and authorized access by employing modern cryptographic algorithms. Cloud computing is an innovative paradigm widely accepted as a platform for storing and analysing user data. The cloud is accessible via the internet, exposing the data to external and internal threats. Cloud Service Providers (CSPs) must now implement a secure architecture to detect cloud intrusions and safeguard client data from hackers and attackers. This paper combines Stochastic Gradient Descent long short-term memory (SGD-LSTM) and Blow Fish encryption to detect and prevent unauthorized cloud access. User registration, intrusion detection, and intrusion prevention are the three phases of the planned system. The SGD-LSTM classifier predicts cloud data access and prevents unauthorized cloud access. In the data access phase, cloud data access is managed by authenticating the authorized user with the Blowfish encryption algorithm. Comparing the proposed classifier to existing classifiers demonstrates that it detects abnormal access accurately. The experimental outcomes enhanced data security, which can be utilized to protect cloud computing applications. The experimental results of the suggested SGD-LSTM algorithm indicated a high level of protection, as well as a considerable improvement in security and execution speed when compared to algorithms that are often used in cloud computing.<\/jats:p>","DOI":"10.1186\/s13677-023-00442-6","type":"journal-article","created":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T04:27:32Z","timestamp":1683692852000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Stochastic Gradient Descent long short-term memory based secure encryption algorithm for\u00a0cloud\u00a0data storage and retrieval in\u00a0cloud\u00a0computing\u00a0environment"],"prefix":"10.1186","volume":"12","author":[{"given":"M.","family":"Suganya","sequence":"first","affiliation":[]},{"given":"T.","family":"Sasipraba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,9]]},"reference":[{"key":"442_CR1","volume-title":"\u201cThe basics of cloud computing,\u201d in Enterprise Cloud Computing for Non-Engineers","author":"F.M Groom","year":"2018","unstructured":"Groom F.M (2018) \u201cThe basics of cloud computing,\u201d in Enterprise Cloud Computing for Non-Engineers"},{"key":"442_CR2","unstructured":"Thabit, Fursan and Alhomdy, Sharaf Abdul-Haq and Alahdal, Abdulrazzaq and Jagtap, Sudhir B (2020) Exploration of Security Challenges in Cloud Computing: Issues, Threats, and Attacks with their Alleviating Techniques (December 02, 2020).\u00a0J Chem Inf Comput, 12(10). Available at SSRN: https:\/\/ssrn.com\/abstract=3749271"},{"key":"442_CR3","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","volume":"4","author":"A Sajid","year":"2016","unstructured":"Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375\u20131384","journal-title":"IEEE Access"},{"issue":"5","key":"442_CR4","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1109\/TCBB.2018.2814039","volume":"16","author":"H Sudo","year":"2018","unstructured":"Sudo H, Jimbo M, Nuida K, Shimizu K (2018) \u201cSecure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search for Bioinformatics,\u201d\u00a0 IEEE\/ACM Trans Comput Biol Bioinformatics 16(5):1675\u20131684","journal-title":"IEEE\/ACM Trans Comput Biol Bioinformatics"},{"key":"442_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.is.2018.11.004","volume":"81","author":"DVNS Kumar","year":"2019","unstructured":"Kumar DVNS, Thilagam PS (2019) Approaches and challenges of privacy preserving search over encrypted data. Inf Syst 81:63\u201381","journal-title":"Inf Syst"},{"key":"442_CR6","first-page":"423","volume-title":"\u201cWatermarking-based perceptual hashing search over encrypted speech,\u201d in Proc. International Workshop on Digital Watermarking (IWDW),\u00a0","author":"H. X Wang","year":"2013","unstructured":"Wang H. X, Zhou L, Zhang W, Liu S (2013) \u201cWatermarking-based perceptual hashing search over encrypted speech,\u201d in Proc. International Workshop on Digital Watermarking (IWDW),\u00a0 Springer, Berlin, Heidelberg, pp 423\u2013434"},{"issue":"3","key":"442_CR7","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2298\/CSIS170112024H","volume":"14","author":"SF He","year":"2017","unstructured":"He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703\u2013718","journal-title":"Comput Sci Inf Syst"},{"issue":"13","key":"442_CR8","doi-asserted-by":"publisher","first-page":"17825","DOI":"10.1007\/s11042-019-7180-9","volume":"78","author":"QY Zhang","year":"2019","unstructured":"Zhang QY, Zhou L, Zhang T et al (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimedia Tools Appl 78(13):17825\u201317846","journal-title":"Multimedia Tools Appl"},{"key":"442_CR9","first-page":"9069","volume-title":"\u201cDeep incremental hashing network for efficient image retrieval,\u201d in Proc. the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, Lang Beach, California, USA","author":"D Wu,","year":"2019","unstructured":"Wu, D, Dai Q et al (2019) \u201cDeep incremental hashing network for efficient image retrieval,\u201d in Proc. the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, Lang Beach, California, USA. pp 9069\u20139077"},{"issue":"5","key":"442_CR10","doi-asserted-by":"publisher","first-page":"449","DOI":"10.3390\/e21050449","volume":"21","author":"XQ Ma","year":"2019","unstructured":"Ma XQ, Yu CC, Chen XX et al (2019) Large-scale person reidentification based on deep hash learning. Entropy 21(5):449\u2013463","journal-title":"Entropy"},{"key":"442_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jpdc.2016.05.017","volume":"99","author":"W Song","year":"2017","unstructured":"Song W, Wang B, Wang Q, Peng Z, Lou W, Cui Y (2017) A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J Parallel Distributed Computing 99:14\u201327 (Elsevier)","journal-title":"J Parallel Distributed Computing"},{"key":"442_CR12","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.ins.2016.10.017","volume":"387","author":"LT Yang","year":"2017","unstructured":"Yang LT, Huang G, Feng J, Li Xu (2017) Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Inf Sci 387:254\u2013265","journal-title":"Inf Sci"},{"issue":"11","key":"442_CR13","doi-asserted-by":"publisher","first-page":"6260","DOI":"10.1109\/TIT.2016.2611003","volume":"62","author":"J ChrisMitchell,","year":"2016","unstructured":"ChrisMitchell, J (2016) \u201dOn the Security of 2-Key Triple DES\u201f. IEEE Transact Inform Theory 62(11):6260\u20136267","journal-title":"IEEE Transact Inform Theory"},{"key":"442_CR14","doi-asserted-by":"publisher","first-page":"26059","DOI":"10.1109\/ACCESS.2018.2832854","volume":"6","author":"H Tang","year":"2018","unstructured":"Tang H, Sun QT, Yang X, Long L (2018) \"A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense\u201f. IEEE Access 6:26059\u201326068","journal-title":"IEEE Access"},{"key":"442_CR15","doi-asserted-by":"publisher","first-page":"31918","DOI":"10.1109\/ACCESS.2018.2840119","volume":"6","author":"ZM Yu","year":"2018","unstructured":"Yu ZM, Gao CZ, Jing zj, Gupta BB, Cai QR (2018) \u201cA Practical Public Key Encryption Scheme Based on Learning Parity with Noise,\u201f. IEEE Access 6:31918\u201331923","journal-title":"IEEE Access"},{"issue":"1","key":"442_CR16","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.comcom.2019.12.041","volume":"15","author":"S Namasudra","year":"2020","unstructured":"Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 15(1):539\u2013547","journal-title":"Comput Commun"},{"key":"442_CR17","doi-asserted-by":"publisher","unstructured":"Tyagi, M, Manoria, M & Mishra, B (2019), \u2018A Framework for Data Storage Security with Efficient Computing in Cloud\u2019, Int Conference\u00a0Advances in Intelligent Systems and Computing, 870:109\u2013116. https:\/\/doi.org\/10.1007\/978-981-13-2673-8_13","DOI":"10.1007\/978-981-13-2673-8_13"},{"key":"442_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.optlaseng.2016.03.001","volume":"83","author":"AN Tieyu Zhao","year":"2016","unstructured":"Tieyu Zhao AN, Qiwen Ran A, Lin Yuan AB, Yingying Chi C, Jing Ma A (2016) \u2018Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography.\u2019 Optics Lasers Eng 83:48\u201358","journal-title":"Optics Lasers Eng"},{"key":"442_CR19","doi-asserted-by":"publisher","unstructured":"A. Aieh, A. Sen, S.R. Dash, S. Dehuri, (2015) Deoxyribonucleic Acid (DNA) for a Shared Secret Key Cryptosystem with Diffie Hellman Key Sharing Technique.\u00a0\u00a0https:\/\/doi.org\/10.1109\/C3IT.2015.7060130","DOI":"10.1109\/C3IT.2015.7060130"},{"issue":"21","key":"442_CR20","first-page":"10828","volume":"12","author":"M Cimi Thomas","year":"2017","unstructured":"Cimi Thomas M, Sheeja S (2017) Secure symmetric encryption scheme using genetic algorithm. Int J Appl Eng Res 12(21):10828\u201310833","journal-title":"Int J Appl Eng Res"},{"issue":"1","key":"442_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12859-021-04131-6","volume":"22","author":"S Asaduzzaman","year":"2021","unstructured":"Asaduzzaman S, Ahmed MR, Rehana H, Chakraborty S, Islam MS, Bhuiyan T (2021) Machine learning to reveal an astute risk predictive framework for Gynecologic Cancer and its impact on women psychology: Bangladeshi perspective. BMC Bioinf 22(1):1\u201317","journal-title":"BMC Bioinf"},{"key":"442_CR22","doi-asserted-by":"publisher","first-page":"166509","DOI":"10.1109\/ACCESS.2019.2952609","volume":"7","author":"T Akter","year":"2019","unstructured":"Akter T, Satu MS, Khan MI, Ali MH, Uddin S, Lio P, Quinn JM, Moni MA (2019) Machine learning-based models for early stage detection of autism spectrum disorders. IEEE Access 7:166509\u2013166527","journal-title":"IEEE Access"},{"key":"442_CR23","doi-asserted-by":"publisher","unstructured":"M. Sohal, S. Sharma, (2018) BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing, J. King Saud Univ. - Comput. Inf. Sci.\u00a0\u00a0https:\/\/doi.org\/10.1016\/j.jksuci.2018.09.024","DOI":"10.1016\/j.jksuci.2018.09.024"},{"key":"442_CR24","doi-asserted-by":"publisher","unstructured":"M. Tahir, M. Sardaraz, Z. Mehmood, S. Muhammad, (2020) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security, Cluster Comput. 4\u00a0https:\/\/doi.org\/10.1007\/s10586-020-03157-4","DOI":"10.1007\/s10586-020-03157-4"},{"key":"442_CR25","doi-asserted-by":"publisher","unstructured":"S.K. Pujari, G. Bhattacharjee, S. Bhoi, (2018) A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence.\u00a0\u00a0https:\/\/doi.org\/10.1016\/j.procs.2017.12.023","DOI":"10.1016\/j.procs.2017.12.023"},{"key":"442_CR26","doi-asserted-by":"publisher","unstructured":"C. Chunka, R.S. Goswami, S. Banerjee, (2019) A Novel Approach to Generate Symmetric Key in Cryptography Using Genetic Algorithm (GA).\u00a0\u00a0https:\/\/doi.org\/10.1007\/978-981-13-1951-8_64","DOI":"10.1007\/978-981-13-1951-8_64"},{"key":"442_CR27","doi-asserted-by":"publisher","unstructured":"S. Kalsi, H. Kaur, V. Chang, (2018) DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation, J. Med. Syst.\u00a0\u00a0https:\/\/doi.org\/10.1007\/s10916-017-0851-z","DOI":"10.1007\/s10916-017-0851-z"},{"key":"442_CR28","doi-asserted-by":"publisher","unstructured":"M. Thangavel, P. Varalakshmi, (2018) Enhanced DNA and elgamal cryptosystem for secure data storage and retrieval in cloud, Cluster Comput. 21 (2).\u00a0\u00a0https:\/\/doi.org\/10.1007\/s10586-017-1368-4","DOI":"10.1007\/s10586-017-1368-4"},{"issue":"7","key":"442_CR29","first-page":"217","volume":"119","author":"S Narendren","year":"2018","unstructured":"Narendren S, Yathish YB, C.M. B (2018) A cryptosystem using two layers of security - DNA and RSA cryptography. J Pure Appl Math 119(7):217\u2013224","journal-title":"J Pure Appl Math"},{"key":"442_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107937","volume":"189","author":"L Shang","year":"2021","unstructured":"Shang L, Guo D, Ji Y, Li Q (2021) Discovering unknown advanced persistent threat using shared features mined by neural networks. Comput Netw 189:107937","journal-title":"Comput Netw"},{"key":"442_CR31","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/ACCESS.2017.2651904","volume":"5","author":"L Li","year":"2017","unstructured":"Li L, Gu T, Chang L, Xu Z, Liu Y, Qian J (2017) A ciphertext-policy attributebased encryption based on an ordered binary decision diagram. IEEE Access 5:1137\u20131145","journal-title":"IEEE Access"},{"key":"442_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1155\/2022\/4343476","volume":"&nbsp;2022","author":"Vempaty Prashanthi, Abdul-Rasheed A","year":"2022","unstructured":"Vempaty Prashanthi, Abdul-Rasheed Akeji Alhassan Alolo, S. Velmurugan (2022) \u201cChaotic Salp Swarm Optimization-Based Energy-Aware VMP Technique for Cloud Data Centers\u201d,. Comput Intell Neurosci &nbsp;2022:9. https:\/\/doi.org\/10.1155\/2022\/4343476. (Article ID\u00a04343476)","journal-title":"Comput Intell Neurosci"},{"key":"442_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s13677-023-00401-1","volume":"12","author":"P Ezhumalai","year":"2023","unstructured":"Ezhumalai P et al (2023) Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing. J Cloud Comp 12:24. https:\/\/doi.org\/10.1186\/s13677-023-00401-1","journal-title":"J Cloud Comp"},{"issue":"3","key":"442_CR34","doi-asserted-by":"publisher","first-page":"e0282600","DOI":"10.1371\/journal.pone.0282600","volume":"18","author":"M Prakash","year":"2023","unstructured":"Prakash M, Baburaj E (2023) An Efficient Hybrid Job Scheduling Optimization (EHJSO) approach to enhance resource search using Cuckoo and Grey Wolf Job Optimization for cloud environment. PLOS One 18(3):e0282600. https:\/\/doi.org\/10.1371\/journal.pone.0282600","journal-title":"PLOS One"},{"key":"442_CR35","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1016\/j.asoc.2016.09.021","volume":"52","author":"A Hatami-Marbini","year":"2017","unstructured":"Hatami-Marbini A, Kangi F (2017) An extension of fuzzy TOPSIS for a group decision making with an Application to Tehran stock exchange. Appl Soft Comput 52:1084\u20131097","journal-title":"Appl Soft Comput"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00442-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00442-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00442-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T04:31:06Z","timestamp":1683693066000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00442-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["442"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00442-6","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"8 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We confirm that our research does not involves a survey asking real human participants to give opinions, or animals data to make justifications.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors state that they do not have any conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"74"}}