An Operative Encryption Method with Optimized Genetical method for Assuring Information Security in Cloud Computing

Authors

  • Ved Prakash Mishra Associate Professor, Computer Science and Engineering Amity University Dubai , UAE
  • V. S. Krushnasamy Associate Professor, Department of EIE Dayananda Sagar College of Engineering
  • Faiz Akram Assistant Professor, Faculty of Computing and Informatics, Jimma Institute of Technology, Jimma University, Jimma, Ethiopia
  • Hendy Tannady Department of Management Universitas Multimedia Nusantara, Banten, Indonesia
  • Nishant Kumar Pathak Asst. Professor, Department of Computer Science Shobhit Institute of Engineering & Technology (Deemed to-be University)

Keywords:

Encrypted Data, QKD, OGA, Throughput

Abstract

The cloud customer is typically uninformed of the provider's threat assessment and mitigation procedures. Ask what safety precautions the service provider takes. So, the client must likewise do something to improve the supplier's security. The function of quantum key distribution (QKD) in cryptographic infrastructures is investigated in this work. QKD uses quantum mechanical systems to promise safe key agreements. There is a claim that QKD will play a significant role in upcoming cryptographic infrastructures. Without relying on computational assumptions, it can guarantee long-term confidentiality for encrypted data. In fact, even when using public-key authentication, we contend that QKD still provides stronger security than conventional key agreements. Several researchers have put forth various data recovery strategies, but they are ineffective and unreliable. When the primary cloud server loses its data and is unable to offer data to users, the proposed technique gives the user the option to acquire information from any backup server in order to achieve reliability. The decryption procedure is then carried out in response to the user's request. Experiments were done to demonstrate the applicability of the proposed frameworks, and performance indicators were compared to those utilized by other researchers. Based on this study, a framework is developed, that guarantees authentication and lays the way for safe data access, with better performance and fewer complications than the previous efforts.

Downloads

Download data is not yet available.

References

Chandramohan Dhasarathan, Vengattaraman Thirumal & Dhavachelvan Ponnurangam 2017, ‗A secure data privacy preservation for on-demand cloud service,‘ Journal of King Saud University -Engineering Sciences, vol. 29, no. 2, pp. 144-150.

Chandramohan, D, Vengattaraman, T, Rajaguru, D & Dhavachelvan, P 2016, ‗A new privacy preserving technique for cloud service user endorsement using multi-agents,‘ Journal of King Saud University -Computer and Information Sciences, vol. 28, no. 1, pp. 37-54.

Chang Guo, QingniShen, Yahui Yang & Zhonghai Wu 2015, ‗User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System,‘ In Proceedings of the IEEE 39th Annual conference on Computer Software and Applications Conference, pp. 104-109.

Changhee Hahn & JunbeomHur 2016, ‗Efficient and privacy-preserving biometric identification in cloud,‘ ICT Express, vol. 2, no. 3, pp. 135-139.

Chen Lyu, Shi-Feng Sun, Yuanyuan Zhang, AmitPande, Haining Lu & DawuGu 2016, ‗Privacy-Preserving Data Sharing Scheme over Cloud for Social Applications,‘ Journal of Network and Computer Applications, vol. 74, pp. 44-55.

Chintureena Thingom 2014, ‗A Study on Tools for Cloud Disaster Management‘, International Journal of Interdisciplinary and Multidisciplinary Studies.

Stergiou, C., & Psannis, K. E. (2017). Recent advances delivered by Mobile Cloud Computing & Internet of Things for Big Data applications: a survey. International Journal of Network Management, 27(3), e1930.

Aceto, G., Persico, V., & Pescapé, A. (2020). Industry 4.0 & health: Internet of things, big data, & cloud computing for healthcare 4.0. Journal of Industrial Information Integration, 18, 100129.

Khayyat, M., Elgendy, I. A., Muthanna, A., Alshahrani, A. S., Alharbi, S., & Koucheryavy, A. (2020). Advanced deep-learning-based computational offloading for multilevel vehicular edge-cloud computing networks. IEEE Access, 8, 137052-137062.

Alam, T. (2020). Cloud Computing & its role in Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(2), 108-115.

Drake, J. H., Kheiri, A., Özcan, E., & Burke, E. K. (2020). Recent advances in selection hyper-heuristics. European Journal of Operational Research, 285(2), 405-428.

S. E. Alaojan and A. H. Alwattar, "A Modified Blowfish Algorithm to Secure Data in Cloud," 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 2022, pp. 218-222, doi: 10.1109/ISMSIT56059.2022.9932817.

Wei, H., Bao, H., & Ruan, X. (2020). Genetic algorithm-driven discovery of unexpected ther-mal conductivity enhancement by the disorder. Nano Energy, 71, 104619.

Wang, Z., & Sobey, A. (2020). A comparative review between genetic algorithm used in com-posite optimization & the state-of-the-art in evolutionary computation. Composite Struc-tures, 233, 111739.

Abbasi, M., Rafiee, M., Khosravi, M. R., Jolfaei, A., Menon, V. G., & Koushyar, J. M. (2020). An efficient parallel genetic algorithm solution for vehicle routing problems in cloud imple-mentation of intelligent transportation systems. Journal of Cloud Computing, 9(1), 6.

Jatana, N., & Suri, B. (2020). Particle swarm & genetic algorithm applied to mutation testing for test data generation: a comparative evaluation. Journal of King Saud University-Computer & Information Sciences, 32(4), 514-521.

Chen, X., An, Y., Zhang, Z., & Li, Y. (2020). An approximate nondominated sorting genetic algorithm to integrate optimization of production scheduling & accurate maintenance based on reliability intervals. Journal of Manufacturing Systems, 54, 227-241.

Jain, G., & Prasad, R. R. (2020, June). Machine learning, Prophet and XGBoost algorithm: Analysis of Traffic Forecasting in Telecom Networks with time-series data. In 2020 8th Inter-national Conference on Reliability, Infocom Technologies and Optimization (Trends and Fu-ture Directions)(ICRITO) (pp. 893-897). IEEE.

Lu, X.; Pan, Z.; Xian, H. An efficient and secure data sharing scheme for mobile devices in cloud computing. J. Cloud Comput. 2020, 9, 60.

Yu, H.; Lu, X.; Pan, Z. An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing. IEEE Access 2020, 8, 151465–151473.

Chan, J.O.P. Digital transformation in the era of big data and cloud computing. Int. J. Intell. Inf. Syst. 2020, 9, 16.

Ding, H.; Sun, C.; Zeng, J. Fuzzy Weighted Clustering Method for Numerical Attributes of Communication Big Data Based on Cloud Computing. Symmetry 2020, 12, 530.

Daskevics, A.; Nikiforova, A. IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you. In Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain, 6–9 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–8.

Ferrari, D.; Carminati, M.; Polino, M.; Zanero, S. NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. In Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA, 7–11 December 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 567–581.

Nikiforova, A.; Daskevics, A.; Azeroual, O. NoSQL security: Can my data-driven decision-making be affected from outside? arXiv 2022, arXiv:2206.11787.

Thakre, B., Thakre, R., Timande, S., & Sarangpure, V. (2021). An Efficient Data Mining Based Automated Learning Model to Predict Heart Diseases. Machine Learning Applications in Engineering Education and Management, 1(2), 27–33. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/17

Kumar, D. ., & Sonia, S. (2023). Resources Efficient Dynamic Clustering Algorithm for Flying Ad-Hoc Network. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 106–117. https://doi.org/10.17762/ijritcc.v11i2s.6034

Downloads

Published

11.07.2023

How to Cite

Mishra, V. P. ., Krushnasamy, V. S., Akram, F. ., Tannady, H. ., & Pathak, N. K. . (2023). An Operative Encryption Method with Optimized Genetical method for Assuring Information Security in Cloud Computing. International Journal of Intelligent Systems and Applications in Engineering, 11(8s), 276–284. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3050

Most read articles by the same author(s)