A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud

被引:1
|
作者
Maddila, Suresh Kumar [1 ]
Vadlamani, Nagalakshmi [1 ]
机构
[1] Gandhi Inst Technol & Management Deemed be Univ, GITAM Sch Sci, Dept Comp Sci, Visakhapatnam 530045, Andhra Pradesh, India
关键词
Cloud computing; encryption; Twofish algorithm; key generation; optimization;
D O I
10.1142/S0219649223500624
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become a major concern for business organisations and individuals, and hence, it is essential to ensure that the services are provided with high data security. Numerous researches have focused on devising effective techniques to enhance data security. However, with the increasing connectivity, security still remains to be a major challenge. This paper devises a novel data protection scheme in the cloud by using the Twofish encryption algorithm and a key generation scheme with the Bald Eagle Pelican Optimization (BEPO) Algorithm. The proposed Twofish+BEPO_KeyGen is implemented in various phases, like initialization, registration, key generation, data encryption, authentication, validation and data sharing, and data decryption. Here, the Twofish algorithm is used to encrypt the data that has to be outsourced to the cloud, and for encryption, the security key required is generated by the BEPO algorithm. The efficacy of the Twofish+BEPO_KeyGen approach is examined by considering metrics, like memory usage, validation time, normalized variance, and conditional privacy, and is detected to have achieved values of 76.3 MB, 37.278 s, 1.665, and 0.926, correspondingly.
引用
收藏
页数:22
相关论文
共 50 条
  • [2] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325
  • [3] Novel quantum key distribution and attribute based encryption for cloud data security
    Verma, Garima
    Kumar, Ashutosh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [4] Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud
    Kanna, G. Prabu
    Vasudevan, V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3688 - 3693
  • [5] Ensuring Cloud Data Security Using the Soldier Ant Algorithm
    Dawson, John Kwao
    Ayawli, Ben Beklisi Kwame
    Agyemang, Sylvester
    Baah, Philemon
    Akyeramfo-Sam, Samuel
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (01) : 130 - 137
  • [6] A hybrid algorithm-based optimization protocol to ensure data security in the cloud
    Zubair S.
    Ahmed H.M.A.
    International Journal of Information Technology, 2024, 16 (5) : 3057 - 3064
  • [7] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [8] Massive Data Hybrid Encryption Algorithm Based on Cloud Computing
    Yang, Ersong
    You, Lin
    Wu, Zhendong
    Yu, Wangke
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1864 - 1867
  • [9] Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing
    Rajput, Snehal
    Dhobi, J. S.
    Gadhavi, Lata J.
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 135 - 143
  • [10] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629