Enhanced Data Integrity Encryption Algorithm for Cloud Computing

被引:1
作者
Mothlabeng, Moloko P. [1 ]
Muchenje, Tonderai [1 ]
Mathonsi, Topside E. [1 ]
Du Plessis, Deon P. [1 ]
机构
[1] Tshwane Univ Technol, Dept Informat Technol, Pretoria, South Africa
来源
5TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS (ICABCD2022) | 2022年
关键词
Cloud Computing; Data Integrity; EDIE; Moving Target Defence; SCHEME;
D O I
10.1109/icABCD54961.2022.9856053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing storage services allow people to easily maintain and manage large amounts of data at a low cost. However, it cannot guarantee data integrity. Data is transferred to unsafe and untrustworthy remote cloud servers. Meaning that data could be manipulated by unauthorized users or the service provider unintentionally, resulting in data loss or modification. As a result, protecting data from hackers has become crucial in order to maintain its integrity. The Enhanced Data Integrity Encryption (EDIE) technique was proposed in this paper to enhance data integrity in cloud computing. The proposed algorithm is designed by integrating Moving Target Defense (MTD) and New Lightweight Cryptographic Algorithm (NLCA) . The EDIE algorithm used MTD to dynamically change network configurations and frequently confuse attackers, therefore minimizing the level of attacks and leading to enhanced data integrity. Computer simulation results further show that, compared to other traditional data integrity algorithms, EDIE yields an energy consumption of 6%, encounters the lowest level of 0.2% of all initiated man-in-the-middle attacks, and reduces server computing time by 21%.
引用
收藏
页数:6
相关论文
共 21 条
  • [1] Ahalya M., 2020, STUD ROSENTHALIANA, V12, P75
  • [2] Akhtar N., 2021, INT J SCI RES SCI EN, P105
  • [3] Cloud computing services adoption among higher education faculties: development of a standardized questionnaire
    Asadi, Zoleixa
    Abdekhoda, Mohammadhiwa
    Nadrian, Haidar
    [J]. EDUCATION AND INFORMATION TECHNOLOGIES, 2020, 25 (01) : 175 - 191
  • [4] An approach towards development of new linear regression prediction model for reduced energy consumption and SLA violation in the domain of green cloud computing
    Biswas, Nirmal Kr.
    Banerjee, Sourav
    Biswas, Utpal
    Ghosh, Uttam
    [J]. SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 45 (45)
  • [5] Fadelelmoula A., 2021, INT J INTERACTIVE MO, V15, P92
  • [6] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [7] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [8] Giri M. S., 2015, INT J COMPUTER APPL, P122
  • [9] A novel homomorphic RASD framework for secured data access and storage in cloud computing
    Jain, Rachna
    Nayyar, Anand
    [J]. OPEN COMPUTER SCIENCE, 2020, 10 (01): : 431 - 443
  • [10] Kalluri R. K., 2021, MATER TODAY-PROC, P103