Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Joseph, Mercy
- A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography
Abstract Views :404 |
PDF Views:3
Authors
Mercy Joseph
1,
Gobi Mohan
1
Affiliations
1 Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, IN
1 Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 1 (2022), Pagination: 114-124Abstract
Cloud is a recent technology that enables wide access and storage on the internet. Moreover, the cloud computing environment allows storing and sharing plenty of digital data including text, image, video, audio, etc. through the internet. Although it is cost-effective and has numerous advantages, cloud technology still faces a lot of challenges like data loss, quality issues, and data security. In this paper, an effective algorithm is introduced using deoxyribonucleic acid (DNA)-based cryptography to enhance data security while sharing the data over the internet. For this process, an optimized encryption model is implemented using Grey Wolf Optimization (GWO) Algorithm to generate optimal encrypted data while sharing. Various datasets have been implemented to verify the efficiency of the proposed GWO Assisted-DNA (GWOA-DNA) cryptography in terms of accuracy and execution time.Keywords
Data Security, DNA-Based Cryptography, User Access, Cloud Computing, Key Generation, Encryption, User Verification, User Access.References
- Selvi, S., and M. Gobi. "Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security." International Conference on Intelligent Data Communication Technologies and Internet of Things. Springer, Cham, 2018.
- Gobi, M., and R. Sridevi. "An Approach for Secure Data Storage in Cloud Environment." International Journal of Computer and Communication Engineering 2.2 (2013): 206.
- Fu X, Liu B, Xie Y, Li W, Liu Y. (2018) ‘Image Encryption-ThenTransmission Using DNA Encryption Algorithm and The Double Chaos’, IEEE Photonics Journal. Vol.10 NO.3, pp.1-15
- Selvi, S., and M. Gobi. "An Efficient Data Security Model using Hyper Elliptic Curve Cryptography and Steganography
- Liu X, Deng R. H, Choo K. -K. R, Yang Y, and Pang H. (2020) ‘Privacy-Preserving Outsourced Calculation Toolkit in the Cloud’, IEEE Transactions on Dependable and Secure Computing,vol. 17 NO.5, pp.898-911
- Wei X, Guo L, and Zhang Q.(2012), ‘A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system’, J. Syst. Softw. Vol.85 NO.2, pp.290-299
- Q. Alam S. U. R. Malik A. Akhunzada K. R. Choo S. Tabbasum and M. Alam,(2017) ’ A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification’, IEEE Trans. Inf. Forensics Secur, vol.12 NO. 6 pp.1259-1268
- Gobi, M., R. Sridevi, and R. Rahini. "A comparative study on the performance and the security of RSA and ECC algorithm." International journal of advanced network and application (2015)
- Sridevi, R., and S. Selvi. "Progressing Biometric Security Concern with Blowfish Algorithm.", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8, Issue9S2, 2019.
- Kumar B. M, Sri B. R. S, Katamaraju, G. M. S. A, Rani P, Harinadh N, and Saibabu C. (2020) ‘File Encryption and Decryption Using DNA Technology’, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp.382-385
- Kumar, G. Kishore, and Dr M. Gobi. "Role of Cryptography & its Related Techniques in Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology, IJRASET 5 (2017).
- Selvi, S., et al. "Hyper elliptic curve cryptography in multi cloudsecurity using DNA (genetic) techniques." 2017 International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2017
- Pushpa B. R. (2017) ‘A new technique for data encryption using DNA sequence’, 2017 International Conference on Intelligent Computing and Control(I2C2), pp.1-4
- Ritu Gupta and Anchal Jain. (2014) ‘A New Image Encryption Algorithm based on DNA Approach’, International Journal of Computer Applications, Vol. 85 NO. 18
- Selvi, S., and R. Sridevi. "Efficient Scheduling Mechanisms for Secured Cloud Data Environment.", International Journal of Recent Technology and Engineering (IJRTE), Volume-8, Issue-2S11, 2019.
- Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewisa, (2014) ‘Grey Wolf Optimizer, Advances in Engineering Software, Vol.69, pp.46-61
- Abhishek Majumdar, Arpita Biswas, Atanu Majumder, Sandeep Kumar Sood and Krishna Lal Baishnab, (2020) ‘A novel DNAinspired encryption strategy for concealing cloud storage’, Frontiers of Computer Science,Vol. 15
- Ahmed Elhadad . (2019) ‘ Data sharing using proxy re-encryption based on DNA computing’, Soft Computing,vol.24, pp. 2101–2108
- Thangavel,M Varalakshmi,,P. (2017) ‘Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud’, Cluster Computing, vol.21, pp.1411–1437
- Nithya Chidambaram, Pethuru Raj Thenmozhi,k Sundararaman Rajagopalan, Rengarajan Amirtharajan,(2019) ‘ A cloud compatible DNA coded security solution for multimedia file sharing & storage’, Multimedia Tools and Applications,vol.78, pp.33837–33863
- Sandhia,G.K. Raja, S. V. K. (2021) ‘Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography’, Journal of Ambient Intelligence and Humanized Computing
- Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood and Shakoor Muhammad, (2020) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Computing. Vol. 24, pp. 739–752
- Rashmi Ramesh Rachh, Ananda Mohan P.V,and Anami B.S. (2012) ‘Efficient Implementations for AES Encryption and Decryption. Circuits, Systems, and Signal Processing’, Vol.31, pp.1765-1785
- Ch. Usha Kumari, T. Pavani, A. Sampath Dakshina Murthy, B. Lakshmi Prasanna, and M. Pala Prasad Reddy, "Generating Cipher Text using BLOWFISH Algorithm for Secured Data Communications", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 2, December 2019
- Indumathi Saikumar, (2017) ‘DES- Data Encryption Standard’, International Research Journal of Engineering and Technology,Vol. 4 NO.3,
- Khan J.S. (2020) et al., ‘DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption’, IEEE Access. Vol.8, pp.159732-159744.
- Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment
Abstract Views :193 |
PDF Views:1
Authors
Mercy Joseph
1,
Gobi Mohan
1
Affiliations
1 Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, IN
1 Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 4 (2022), Pagination: 385-398Abstract
Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.Keywords
Homomorphic Encryption, Secrete Key, Cloud Computing, Data Security, Attacks, Malware, Plain Text, Ciphertext.References
- Alashhab, Ziyad R., et al. "Impact of coronavirus pandemic crisis on technologies and cloud computing applications." Journal of Electronic Science and Technology 19.1 (2021): 100059.
- Zahoor, Saman, et al. "Cloud–fog–based smart grid model for efficient resource management." Sustainability 10.6 (2018): 2079.
- Sunyaev, Ali. "Cloud computing." Internet computing. Springer, Cham, 2020. 195-236.
- Tabrizchi, Hamed, and Marjan Kuchaki Rafsanjani. "A survey on security challenges in cloud computing: issues, threats, and solutions." The journal of supercomputing 76.12 (2020): 9493-9532.
- Abdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14.1 (2021): 11.
- Samanta, Debabrata, et al. "Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture." IEEE Access 9 (2021): 98013-98025.
- Al-Issa, Yazan, Mohammad Ashraf Ottom, and Ahmed Tamrawi. "eHealth cloud security challenges: a survey." Journal of healthcare engineering 2019 (2019).
- Yang, Tengfei, et al. "PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data." Information Sciences 505 (2019): 198-214.
- Athanere, Smita, and Ramesh Thakur. "Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing." Journal of King Saud University-Computer and Information Sciences (2022).
- Adee, Rose, and Haralambos Mouratidis. "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography." Sensors 22.3 (2022): 1109.
- Anwar, Md Navid Bin, et al. "Comparative Study of Cryptography Algorithms and Its' Applications." International Journal of Computer Networks and Communications Security 7.5 (2019): 96-103.
- Kumar, Randhir, and Rakesh Tripathi. "Secure healthcare framework using blockchain and public key cryptography." Blockchain Cybersecurity, Trust and Privacy. Springer, Cham, 2020. 185-202.
- Subramanian, Nalini, and Andrews Jeyaraj. "Recent security challenges in cloud computing." Computers & Electrical Engineering 71 (2018): 28-42.
- Abiodun, Esther Omolara, et al. "Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp." Wireless Personal Communications 112.4 (2020): 2533-2556.
- Hwang, Yong-Woon, et al. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (2022).
- Singh, Saurabh, et al. "SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology." International Journal of Distributed Sensor Networks 15.4 (2019): 1550147719844159.
- Kaur, Harleen, et al. "A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment." Journal of medical systems 42.8 (2018): 1-11.
- Mansouri, Najme, and Mohammad Masoud Javidi. "Cost-based job scheduling strategy in cloud computing environments." Distributed and Parallel Databases 38.2 (2020): 365-400.
- Ma, Chuan, et al. "On safeguarding privacy and security in the framework of federated learning." IEEE network 34.4 (2020): 242-248.
- Bordonaba-Juste, Mª, Laura Lucia-Palacios, and Raúl Pérez-López. "Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services." Information Systems and e-Business Management 18.1 (2020): 35-60.
- Geetha, N., and K. Mahesh. "An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment." Wireless Personal Communications 123.2 (2022): 1553-1571.
- Pang, Hongping, and Baocang Wang. "Privacy-preserving association rule mining using homomorphic encryption in a multikey environment." IEEE Systems Journal 15.2 (2020): 3131-3141.
- Jin, Byung-Wook, Jung-Oh Park, and Hyung-Jin Mun. "A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment." Wireless Personal Communications 105.2 (2019): 599-618.
- Algaradi, Thoyazan Sultan, and Boddireddy Rama. "An authenticated key management scheme for securing big data environment." International Journal of Electrical & Computer Engineering (2088-8708) 12.3 (2022).
- Drucker, Nir, and Shay Gueron. "Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment." J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9.1 (2018): 86-99.
- Zhao, Feng, Chao Li, and Chun Feng Liu. "A cloud computing security solution based on fully homomorphic encryption." 16th international conference on advanced communication technology. IEEE, 2014.
- Mercy Joseph, Gobi Mohan, “A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography”, International Journal of Computer Networks and Applications (IJCNA), 9(1), PP: 114-124, 2022, DOI: 10.22247/ijcna/2022/211630.