Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamil Nadu, India.
In the era of 6G, data safety and confidentiality are gravely threatened by the rise of dense cloud computing. The rise of high-density cloud computing has put previously unimaginable data processing, storage, as well as analytics capabilities within arms' reach. To make the most of data collected by sensors in different places, new 6G intelligence apps' training processes are in sync with federated-learning paradigm. Because of high density cloud computing, distributed systems with hundreds or thousands of nodes can be deployed. This has potential to significantly impact data safeguarding and safety policy since it increases likelihood of harm to system from malicious actors. Encryption, access control, and defence lawyers are more advanced security techniques that are needed to keep confidential data safe in this environment. Encryption adds on another level of security by making it more difficult for those without permission to view information. Utilizing Secretary Bird optimization approach, optimal encryption key is selected. While access control prevents unauthorized users from reaching specific regions of system, defensive layers identify and thwart malicious attempts. This study suggests that 6G networks' data protection and security management could be improved with high density cloud computing. In order to address security concerns raised by encrypted data's lack of transparency, this paper proposes a mechanism for identifying data attacks on 6G intelligence apps that employ secure aggregation methods based on encryption. Our suite of encrypted data auditing solutions can protect you from data poisoning, incorrect data aggregation, and illegal data sources. On top of that, after evaluating a plethora of intriguing technologies, to have assessed each one and recommended optimal security practices for specific 6G scenarios.
Keywords
Data Storage, Security, Malicious Performers, Encryption, Data Protection, Cloud Computing, Secretary Bird Optimization Procedure.
C. Li, “Privacy-Preserving of Digital 6G IoT Based Cyber Phycical System in Medical Big-Data Application Using Homomorphic Encryption,” Wireless Personal Communications, May 2024, doi: 10.1007/s11277-024-11186-0.
M. Mageshwari and R. Naresh, “Security Clouds to Improve Privacy and Conduct Continuous Audits in 6G Networked Environments Smart Cities,” Wireless Personal Communications, May 2024, doi: 10.1007/s11277-024-11023-4.
P. Dass, S. Ujjwal, J. Novotny, Y. Zolotavkin, Z. Laaroussi, and S. Köpsell, “Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects,” Privacy Technologies and Policy, pp. 87–111, 2024, doi: 10.1007/978-3-031-68024-3_5.
L. P. Rachakonda, M. Siddula, and V. Sathya, “A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond),” High-Confidence Computing, vol. 4, no. 2, p. 100220, Jun. 2024, doi: 10.1016/j.hcc.2024.100220.
Z. Sun et al., “A Data Attack Detection Framework for Cryptography-Based Secure Aggregation Methods in 6G Intelligent Applications,” Electronics, vol. 13, no. 11, p. 1999, May 2024, doi: 10.3390/electronics13111999.
S. Patil et al., “Advancements in Deep Learning Techniques for Potato Leaf Disease Identification Using SAM-CNNet Classification,” Ingénierie des systèmes d information, vol. 29, no. 5, Oct. 2024, doi: 10.18280/isi.290533.
R. Yuvarani and R. Mahaveerakannan, “Payment Security Expert: Analyzing Smart Cards and Contactless Payments with Cryptographic Techniques,” 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 511–516, Jul. 2024, doi: 10.1109/icscss60660.2024.10625350.
J. M. Parra-Ullauri et al., “Federated Analytics for 6G Networks: Applications, Challenges, and Opportunities,” IEEE Network, vol. 38, no. 2, pp. 9–17, Mar. 2024, doi: 10.1109/mnet.2024.3355218.
P. K. Gkonis et al., “Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks,” IEEE Access, vol. 12, pp. 21320–21336, 2024, doi: 10.1109/access.2024.3359992.
B. Rajalakshmi, A. Thirumalraj, R. J. Anandhi, and N. Khodadadi, “Automated Spam Detection Using ECSA-Based Feature Selection with BGRN Classifier in Soft Computing Applications,” Soft Computing in Industry 5.0 for Sustainability, pp. 225–244, 2024, doi: 10.1007/978-3-031-69336-6_10.
S. S, S. Deivasigamani, R. R, and S. R, “Enhancing Healthcare Through AI Deep Learning: A Human-Centric IoT Advisory System Cloud,” 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 346–350, Jul. 2024, doi: 10.1109/icscss60660.2024.10625451.
H. Liu, Y. Wang, and F. Jia, “Security and Privacy Protection of Internet of Things Devices in 6G Networks,” International Journal of System Assurance Engineering and Management, Sep. 2024, doi: 10.1007/s13198-024-02512-7.
N. R. Fachrurrozi, K. Ramli, and K. Anwar, “Challenges on Security and Privacy in IMT-2030 (6G) Networks,” 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), pp. 691–698, Nov. 2024, doi: 10.1109/comnetsat63286.2024.10862068.
P. B. Falola, E. A. Adeniyi, J. B. Awotunde, R. G. Jimoh, and A. L. Imoize, “Security challenges and prospects of 6G network in cloud environments,” Security and Privacy Schemes for Dense 6G Wireless Communication Networks, pp. 471–496, Jul. 2023, doi: 10.1049/pbse021e_ch20.
T. B. Sivakumar, S. H. Hasan Hussain, and R. Balamanigandan, “Internet of Things and Cloud Computing-based Disease Diagnosis using Optimized Improved Generative Adversarial Network in Smart Healthcare System,” Network: Computation in Neural Systems, pp. 1–24, Oct. 2024, doi: 10.1080/0954898x.2024.2392770.
V. Mallikarjunaradhya, H. Yennapusa, R. R. Palle, K. Suganyadevi, and N. Gupta, “Impacts of High Denisty Cloud Computing on Data Protection and Security Management for 6G Networking,” 2024 2nd International Conference on Disruptive Technologies (ICDT), pp. 617–622, Mar. 2024, doi: 10.1109/icdt61202.2024.10489780.
A. K, “Optimizing Edge Intelligence in Satellite IoT Networks via Computational Offloading and AI Inference,” Journal of Computer and Communication Networks, pp. 1–12, Jan. 2025, doi: 10.64026/jccn/2025001.
J. Suomalainen, I. Ahmad, A. Shajan, and T. Savunen, “Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence,” Future Generation Computer Systems, vol. 162, p. 107500, Jan. 2025, doi: 10.1016/j.future.2024.107500.
O. F. Osama, B. Bhusal, N. Kshetri, and B. P. Pokharel, “blockDADS,” Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures, pp. 222–234, Dec. 2024, doi: 10.1201/9781003449515-14.
J. Zhang, C. Luo, Y. Jiang, and G. Min, “Security in 6G-Based Autonomous Vehicular Networks: Detecting Network Anomalies With Decentralized Federated Learning,” IEEE Vehicular Technology Magazine, vol. 20, no. 1, pp. 83–93, Mar. 2025, doi: 10.1109/mvt.2024.3520907.
T. Xu, N. Wang, Q. Pang, and X. Zhao, “Security and Privacy of 6G Wireless Communication using Fog Computing and Multi-Access Edge Computing,” Scalable Computing: Practice and Experience, vol. 25, no. 2, pp. 770–781, Feb. 2024, doi: 10.12694/scpe.v25i2.2629.
B. Gunapriya, A. Thirumalraj, V. S. Anusuya, B. P. Kavin, and G. H. Seng, “A Smart Innovative Pre-Trained Model-Based QDM for Weed Detection in Soybean Fields,” Advanced Intelligence Systems and Innovation in Entrepreneurship, pp. 262–285, May 2024, doi: 10.4018/979-8-3693-0790-8.ch015.
Y. Fu, D. Liu, J. Chen, and L. He, “Secretary bird optimization algorithm: a new metaheuristic for solving global optimization problems,” Artificial Intelligence Review, vol. 57, no. 5, Apr. 2024, doi: 10.1007/s10462-024-10729-y.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Xma R Pote, Hemavathi R, Anil Kumar N, Sheeba Santhosh, Krishnan T and Vidhya Prakash Rajendran;
Methodology: Xma R Pote, Hemavathi R, Anil Kumar N;
Writing- Original Draft Preparation: Xma R Pote, Hemavathi R, Anil Kumar N;
Visualization: Sheeba Santhosh, Krishnan T and Vidhya Prakash Rajendran;
Investigation: Xma R Pote, Hemavathi R, Anil Kumar N, Sheeba Santhosh, Krishnan T and Vidhya Prakash Rajendran;
Supervision: Sheeba Santhosh, Krishnan T and Vidhya Prakash Rajendran;
Validation: Xma R Pote, Hemavathi R, Anil Kumar N;
Writing- Reviewing and Editing: Xma R Pote, Hemavathi R, Anil Kumar N, Sheeba Santhosh, Krishnan T and Vidhya Prakash Rajendran;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
The authors would like to thank to the reviewers for nice comments on the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Hemavathi R
Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Xma R Pote, Hemavathi R, Anil Kumar N, Sheeba Santhosh, Krishnan T and Vidhya Prakash Rajendran, “Data Protection and Security Management in the 6G Era: Addressing High Density Cloud Computing Challenges”, Journal of Machine and Computing, vol.5, no.3, pp. 1427-1438, July 2025, doi: 10.53759/7669/jmc202505113.