A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud

被引:1
|
作者
Maddila, Suresh Kumar [1 ]
Vadlamani, Nagalakshmi [1 ]
机构
[1] Gandhi Inst Technol & Management Deemed be Univ, GITAM Sch Sci, Dept Comp Sci, Visakhapatnam 530045, Andhra Pradesh, India
关键词
Cloud computing; encryption; Twofish algorithm; key generation; optimization;
D O I
10.1142/S0219649223500624
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become a major concern for business organisations and individuals, and hence, it is essential to ensure that the services are provided with high data security. Numerous researches have focused on devising effective techniques to enhance data security. However, with the increasing connectivity, security still remains to be a major challenge. This paper devises a novel data protection scheme in the cloud by using the Twofish encryption algorithm and a key generation scheme with the Bald Eagle Pelican Optimization (BEPO) Algorithm. The proposed Twofish+BEPO_KeyGen is implemented in various phases, like initialization, registration, key generation, data encryption, authentication, validation and data sharing, and data decryption. Here, the Twofish algorithm is used to encrypt the data that has to be outsourced to the cloud, and for encryption, the security key required is generated by the BEPO algorithm. The efficacy of the Twofish+BEPO_KeyGen approach is examined by considering metrics, like memory usage, validation time, normalized variance, and conditional privacy, and is detected to have achieved values of 76.3 MB, 37.278 s, 1.665, and 0.926, correspondingly.
引用
收藏
页数:22
相关论文
共 50 条
  • [2] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325
  • [3] Novel quantum key distribution and attribute based encryption for cloud data security
    Verma, Garima
    Kumar, Ashutosh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21)
  • [4] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [5] Massive Data Hybrid Encryption Algorithm Based on Cloud Computing
    Yang, Ersong
    You, Lin
    Wu, Zhendong
    Yu, Wangke
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1864 - 1867
  • [6] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [7] Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
    Vidhya, A.
    Kumar, P. Mohan
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2022, 30 (02): : 171 - 180
  • [8] An Efficient Algorithm for Key Generation in Advance Encryption Standard using Sudoku Solving Method
    Indrani, B.
    Veni, M. Karthigai
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 858 - 865
  • [9] Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security
    Shakor, Mohammed Y.
    Khaleel, Mustafa Ibrahim
    Safran, Mejdl
    Alfarhood, Sultan
    Zhu, Michelle
    IEEE ACCESS, 2024, 12 : 26334 - 26343
  • [10] An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm
    Shankar, K.
    Eswaran, P.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 705 - 714