PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Hybridization of ICBC and Genetic Algorithm for Optimizing Encryption Process in Cloud Computing Application Service

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cloud Computing, a type of interpersonal computing offers services on demand. There arise numerous vulnerabilities and threats that jeopardize the authentication of the cloud services. Security services remain prevalent despite of standard policies offered by service providers, especially on public cloud. An encryption service is one of the conventional way to protect the plain data, by converting it into inarticulate form. This paper brings an interesting application service that provides security as a service to the users. This innovative service works based on a symmetric key encryption scheme. Encryption keys in the cryptographic process reveal the quality of encryption. Multiple keys are involved in this proposed encryption process, among them, one interesting key generation is from hybridization of improved cipher block chaining encryption operation and another from nature inspired genetic algorithm. Motivation for designing this hybrid algorithm is to minimize the execution time and storage space capacity. The experimental analysis is performed for multimedia files, including plain text, images. Performance of the proposed encryption algorithm is analyzed using various metrics that reveals the quality and strength of the algorithm in spite of various attacks. Evaluation reports state that this application service relics potential for authenticating multimedia files with better satisfaction while out-sourced as application in cloud computing environment.
Wydawca
Rocznik
Strony
79--109
Opis fizyczny
Bibliogr. 23 poz., rys., tab., wykr.
Twórcy
autor
  • Department of Computer Science, Alagappa University, Karaikudi - 630 004, India
  • Department of Computer Science, Alagappa University, Karaikudi - 630 004, India
Bibliografia
  • [1] Vu Q H, Colombo M, Asal R, Sajjad A, El-Moussa F A and Dimitrakos T, Secure Cloud Storage: A framework for Data Protection as a Service in the multicloud environment. In: IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28-30 September, 2015, pp.1-6. URL http://kar.kent.ac.uk/id/eprint/50845.
  • [2] www.AmazonEncryptionService.com; 2016. URL http://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html.
  • [3] ESCUDO-CLOUD, 2016. URL http://www.escudocloud.eu/index.php.
  • [4] Itani W, Kayssi A, and Chehab A, Privacy as a Service: Privacy Aware Data Storage and Processing in Cloud Computing Architectures, In Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), December 2009, pp. 711-716. doi:10.1109/DASC.2009.139.
  • [5] Ye R, A Novel Image Encryption Scheme Based on Generalized Multi-sawtooth Maps, Fundamenta Informaticae. 2014;133:87-104. doi:10.3233/FI-2014-1063.
  • [6] Kakkar A, Singh M L and Bansal P K, Mathematical analysis and simulation of multiple keys and SBoxes in a multinode network for secure transmission, International Journal of Computer Mathematics. 2012;89(16):123-214. doi:10.1080/00207160.2012.704022.
  • [7] Huang K T, Chiu J H and Shen S S, A Novel Structure with Dynamic Operation Mode For Symmetric-Key Block Ciphers, International Journal of Network Security & Its Applications (IJNSA). 2013;5(1):17-36. doi:10.5121/ijnsa.2013.5102.
  • [8] Li X, Li W and Shi D, Enterprise private cloud file encryption system based on tripartite secret key protocol, In International Industrial Informatics and Computer Engineering Conference, Published by Atlantis Press, 2015, pp.166-169, URL www.atlantispress.com/php/downloadpaper:php?id = 16926.
  • [9] Bala Chandar R, Kavitha M S and Seenivasan K, A Proficient Model For High End Security In Cloud Computing, Ictact Journal On Soft Computing, 2014;4(2):697-702.
  • [10] Manish Kumar N, Mishra D C, and Sharma R K, A first approach on an RGB image encryption, Optics and Lasers in Engineering, 2014;52:27-34. URL http://dx.doi.org/10.1016/j.optlaseng.2013.07.015.
  • [11] Ragab A H M, Farag Alla O S, Noaman A Y, Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms, In International Bio-Metrics and Smart Government Summit, FTI Conference, Tunisia, 2015. URL http://eprint.iacr.org/2014/169.pdf.
  • [12] Liu J, Wang H, Xian Mand Rong H, Reliable and confidential cloud storage with efficient data forwarding functionality, IET Communications , April 2016,10(6):661-668. doi:10.1049/iet-com.2015.0608.
  • [13] Das S, Mandal S and Ghoshal N, Multiple-Image Encryption Using Genetic Algorithm, In Intelligent Computing and Applications Volume 343 of the series Advances in Intelligent Systems and Computing. 2015; pp. 145-153. doi:10.1007/978-81-322-2268-216.
  • [14] Upadhyay S, Dave D and Sharma G, “Image Encryption by Using Block-Based Symmetric Transformation Algorithm (International Data Encryption Algorithm)”, in Proceedings of International Conference on ICT for Sustainable Development Volume 408 of the series Advances in Intelligent Systems and Computing, 2016; pp.531-539. doi:10.1007/978-981-10-0129-1_56.
  • [15] Narendra K and Vinod Patidar P, Medical image protection using genetic algorithm operations, In Soft Computing, Springer-Verlag Berlin Heidelberg 2014. doi:10.1007/s00500-014-1539-7.
  • [16] Zhang Q, Xue X, and Wei X, A Novel Image Encryption Algorithm Based on DNA Subsequence Operation, In The Scientific World Journal, 2012;(286741):1-10. doi:10.1100/2012/286741.
  • [17] Sajid A, Abbas H and Saleem K, Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges, In IEEE Access, 2016; (99). doi:10.1109/ACCESS.2016.2549047.
  • [18] Garg H, A hybrid PSO-GA algorithm for constrained optimization problems, In Applied Mathematics and Computation.2016; (274):pp.292305. doi. http://dx.doi.org/10.1016/j.amc.2015.11.001.
  • [19] Chakraborty D and Sarkar P, On modes of operations of a block cipher for authentication and authenticated encryption, In Cryptography and Communications, October 2016;8(4):455-511. doi:10.1007/s12095-015-0153-6.
  • [20] Schiestl C, Pseudozufallszahlen in der Kryptographie, in Klagenfurt, 1999.
  • [21] www.hlevkin.com. Available From: Image Processing / Videocodecs/ Programming: URL http://www.hlevkin.com/TestImages/Boats.bmp.
  • [22] Petitcolas F, 2015. The Information Hiding Home page: Digital Watermarking and Steganography, URL http://www.petitcolas.net/steganography/index.html.
  • [23] Mahalakshmi J and Kuppusamy K, Security as a Service for Files in Cloud Computing A Novel Application Model, In Proceedings of the 10th International conference on Intelligence systems and control (ISCO’16), (2016); pp.353-357. ISBN: 978-1-4673-7805-5.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-68ae8de5-7d49-4867-8fe3-cfd86892db9f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.