Enhanced Cloud Security Model with Hybrid Encryption Approach for Advanced Data Security in Cloud Computing

Authors

  • Jayachandran R. Department of Computing Technologies, S.R.M Institute of Science and Technology, Kattankulathur-603203
  • Malathi D. Department of Computing Technologies, S.R.M Institute of Science and Technology, Kattankulathur-603203

Keywords:

Task scheduling, Cloud computing, Key agreement, QKDP, time consumption

Abstract

Cloud computing (CC) is a typical paradigm that maintains, manages, and backs up statistics remotely using dynamic capabilities. It allows consumers and companies to access services on demand and as needed across a web network, and it increases the capabilities of physical resources by maximizing and sharing their utilisation. Cloud computing performance can be harmed by inefficient resource management. As a result, resources must be distributed fairly among many stakeholders without jeopardizing the organization's profit or user happiness. Information security and privacy, on the other hand, have surfaced as a major worry threatening CC's success. To begin with, storing data on the cloud increases the risk of data leakage and unauthorised access. Second, cyber-attacks and disruptions are increasingly targeting cloud systems, posing a danger to cloud security. It's It is a requirement for the advancement of distributed computing. As a consequence, in this paper, a hybrid task-based security method has been developed. A secure and safe environment for distributed computing operations has been built using the improved Cat Swarm algorithm for Task Scheduling with Quantum Key Distribution ICSTS-QKDP for CC, which employs quality-based encryption. To begin, an improved cat swarm optimization algorithm-based short scheduler for task scheduling (ICSTS) reduces make-span time while increasing throughput. The suggested design provides cloud users peace of mind when it comes to data security. Quantum Key Distribution Protocol (QKDP) incorporates quantum key cryptography to provide cloud storage security and control data dynamics. A large quantity of data is collected from a variety of computing devices in the distributed computing paradigm, which may be monitored and limited by the framework. The strategy is primarily concerned with data access, storage, and management. The secured keys are transferred across a trusted channel when the model is used. The suggested approach outperforms the present one in terms of resource usage, energy consumption, reaction time, secure key transfer, and so on. Its goal is to prevent unauthorised client access and ensure that only authorised clients have access to the same data.

Downloads

Download data is not yet available.

References

Scott, A.: The limits of quantum computers. In: Proceedings of the second international conference on computer science: theory and applications, CSR’07. pp. 4–4. Springer-Verlag, Berlin, Heidelberg(2007). https://doi.org/10.1186/s13635-016-0051-2.

Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, (2009).

Wang, C., Wang, Q., Ren, K.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 2(2), 220–232 (2012).

Son, S.; Jung, G.; Jun, S.C. An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider. J. Supercomput. 2013, 64, 606–637.

Wei, G.; Vasilakos, A.V.; Zheng, Y.; Xiong, N. A game-theoretic method of fair resource allocation for cloud com-puting services. J. Supercomput. 2010, 54, 252–269.

Buyya, R.; Yeo, C.S.; Venugopal, S.; Broberg, J.; Brandic, I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 2009, 25, 599–616.

Almeida, J.; Almeida, V.; Ardagna, D.; Cunha, Í.; Francalanci, C.; Trubian, M. Joint admission control and resource allocation in virtualized servers. J. Parallel Distrib. Comput. 2010, 70, 344–362.

Mei, H.; Wang, K.; Yang, K. Multi-Layer Cloud-RAN With Cooperative Resource Allocations for Low-Latency Computing and Communication Services. IEEE Access 2017, 5, 19023–19032.

Khasnabish, J.N.; Mithani, M.F.; Rao, S. Tier-Centric Resource Allocation in Multi-Tier Cloud Systems. IEEE Trans. Cloud Comput. 2015, 5, 576–589.

Bal, P.K.; Pradhan, S.K. Privacy Preserving Secure Data Storage scheme based on Adaptive ANN and Homomorphic ReEncryption Algorithm for Cloud. In Proceedings of the 2019 International Conference on Intelligent Computing and Remote Sensing (ICICRS), Bhubaneswar, India, 19–20 July 2019

Bal, P.K.; Pradhan, S.K. Multi-level authentication-based secure aware data transaction on cloud using cyclic shift transposition algorithm. In Advances in Intelligent Computing and Communication; Springer: Singapore, 2020.

Das, T.K.; Tripathy, A.K.; Srinivasan, K. A Smart Trolley for Smart Shopping. In Proceedings of the 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 3–4 July 2020

A. Winter, Coding theorem and strong converse for quantum channels, IEEE Trans. Inform. Theory 45(7) (1999)

Z. Sakhi ; R. Kabil ; A. Tragha ; M. Bennai,"Quantum cryptography based on Grover's

algorithm",IEEE,Second International ConferenCE,18-20 Sept. 2012

Mitch Leslio “Quantum Cryptography via satellite“. 2017.

Mahdi H. A l Hasani Kais A. Al Naimee "Impact security enhancement in chaotic quantum

cryptography", Volume 119, November 2019, 105575.

Keshanchi, B.; Souri, A.; Navimipour, N.J. An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: Formal verification, simulation, and statistical testing. J. Syst. Softw. 2017, 124, 1–21.

Liu, C.Y.; Zou, C.M.; Wu, P. A Task Scheduling Algorithm Based on Genetic Algorithm and Ant Colony Optimization in Cloud Computing. In Proceedings of the 2014 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, Xi’an, China, 24–27 November 2014; pp. 68–72.

Alhaidari, F.; Balharith, T.; AL-Yahyan, E. Comparative Analysis for Task Scheduling Algorithms on Cloud Computing. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 3–4 April 2019; pp. 1–6.

He, X.; Sun, X.; Von Laszewski, G. QoS guided min-min heuristic for grid task scheduling. J. Comput. Sci. Technol. 2003, 18, 442–451.

He, X.; Sun, X.; Von Laszewski, G. QoS guided min-min heuristic for grid task scheduling. J. Comput. Sci. Technol. 2003, 18, 442–451.

Potluri, S.; Rao, K.S. Optimization model for QoS based task scheduling in cloud computing environment. Indones. J. Electr. Eng. Comput. 2020, 18, 1081–1088.

Hanini, M.; Kafhali, S.E.; Salah, K. Dynamic VM allocation and traffic control to manage QoS and energy consumption in cloud computing environment. Int. J. Comput. Appl. Technol. 2019, 60, 307–316.

Shih, H., Lee, K., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quant. Electron. 15, 1602–1606 (2009).

Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE 10(10), 1–6 (2010).

Cotler, J.S., Shor, P.W.: A New relativistic orthogonal states quantum key distribution protocol. Arxiv, pp. 1–6 (2013).

Chuan, W., Wan-Ying, W., Qing, A., Gui-Lu, L.: Deterministic quantum key distribution with pulsed homodyne detection. Chin. Phys. Soc. IOP Publ. Ltd. 53(1), 67–70 (2010).

Moritoh, Y., Imai, Y., Inomo, H., Shiraki, W.: A cloud service on distributed multiple servers for cooperative learning and emergency communication. Commun. Comput. Inf. Sci. 188, 377–390 (2011)

Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F., (eds.) ACM conference on computer and communications security, ACM, pp. 598–609 (2007)

Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput. 16, 996–1010 (2017)

Pasha, M. J. ., Rao, C. R. S. ., Geetha, A. ., Fernandez, T. F. ., & Bhargavi, Y. K. . (2023). A VOS analysis of LSTM Learners Classification for Recommendation System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 179–187. https://doi.org/10.17762/ijritcc.v11i2s.6043

Prof. Madhuri Zambre. (2016). Automatic Vehicle Over speed Controlling System using Microcontroller Unit and ARCAD. International Journal of New Practices in Management and Engineering, 5(04), 01 - 05. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/47

Kumbhkar, M., Shukla, P., Singh, Y., Sangia, R.A., Dhabliya, D. Dimensional Reduction Method based on Big Data Techniques for Large Scale Data (2023) 2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023

Gummadi, A. ., & Rao, K. R. . (2023). EECLA: A Novel Clustering Model for Improvement of Localization and Energy Efficient Routing Protocols in Vehicle Tracking Using Wireless Sensor Networks. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 188–197. https://doi.org/10.17762/ijritcc.v11i2s.6044

Mr. Dharmesh Dhabliya, Prof. Ojaswini Ghodkande. (2016). Prevention of Emulation Attack in Cognitive Radio Networks Using Integrated Authentication . International Journal of New Practices in Management and Engineering, 5(04), 06 - 11. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/48

Molla, J. P., Dhabliya, D., Jondhale, S. R., Arumugam, S. S., Rajawat, A. S., Goyal, S. B., Raboaca, M. S., Mihaltan, T. C., Verma, C., Suciu, G. Energy Efficient Received Signal Strength-Based Target Localization and Tracking Using Support Vector Regression (2023) Energies, 16 (1), art. no. 555, .

Downloads

Published

10.11.2023

How to Cite

R., J. ., & D., M. . (2023). Enhanced Cloud Security Model with Hybrid Encryption Approach for Advanced Data Security in Cloud Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), 432–439. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3804

Issue

Section

Research Article