CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

被引:0
|
作者
Muhammad Tahir
Muhammad Sardaraz
Zahid Mehmood
Shakoor Muhammad
机构
[1] COMSATS Institute of Information Technology - Attock,
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud computing; Security; Genetic algorithm; Cryptography; Integrity; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud Computing is referred to as a set of hardware and software that are being combined to deliver various services of computing. The cloud keeps the services for delivery of software, infrastructure, and platform over the Internet based on the user’s demand. In the IT industry, cloud computing plays an important role to access services anywhere in the world. With increasing demand and popularity of cloud computing, several types of threats and vulnerabilities are also increased. Data integrity and privacy are the key issues in cloud computing and are thoughtful as the data is stored in different geographical locations. Therefore, data integrity and privacy protection provisions are the most prominent factors of user’s concerns about the cloud computing environment. In this paper, a new model based on a genetic algorithm (GA) CryptoGA is proposed to cope with data integrity and privacy issues. GA is used to generate keys for encryption and decryption which are integrated with a cryptographic algorithm to ensure privacy and integrity of cloud data. Known and common parameters i.e. execution time, throughput, key size, and avalanche effect are considered for evaluation and comparison. Ten different datasets are used in experiments for testing and validation. Experimental results analysis show that the proposed model ensures the integrity and preserves the privacy of the user’s data against unauthorized parties. Moreover, the CryptoGA is robust and provides better performance on selected parameters as compared to state-of-the-art cryptographic algorithms i.e. DES, 3DES, RSA, Blowfish, and AES.
引用
收藏
页码:739 / 752
页数:13
相关论文
共 50 条
  • [1] CryptoGA: a cryptosystem based on genetic algorithm for cloud data security
    Tahir, Muhammad
    Sardaraz, Muhammad
    Mehmood, Zahid
    Muhammad, Shakoor
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 739 - 752
  • [2] Elliptic curve Diffie-Hellman cryptosystem in big data cloud security
    Subramanian, E. K.
    Tamilselvan, Latha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3057 - 3067
  • [3] Enhancing Data Security of Cloud Based LMS
    Paramita Chatterjee
    Rajesh Bose
    Subhasish Banerjee
    Sandip Roy
    Wireless Personal Communications, 2023, 130 : 1123 - 1139
  • [4] Enhancing Data Security of Cloud Based LMS
    Chatterjee, Paramita
    Bose, Rajesh
    Banerjee, Subhasish
    Roy, Sandip
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 1123 - 1139
  • [5] Privacy-aware genetic algorithm based data security framework for distributed cloud storage
    Kamal, Maryam
    Amin, Shahzad
    Ferooz, Faria
    Awan, Mazhar Javed
    Mohammed, Mazin Abed
    Al-Boridi, Omar
    Abdulkareem, Karrar Hameed
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 94
  • [6] Cloud Data Security using Balanced Genetic Algorithm
    Prasad, Rajeev Ranjan
    Kumari, Ankita
    2023 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS, ICEES, 2023, : 132 - 137
  • [7] Elliptic curve Diffie–Hellman cryptosystem in big data cloud security
    E. K. Subramanian
    Latha Tamilselvan
    Cluster Computing, 2020, 23 : 3057 - 3067
  • [8] Architectural Design for Data Security in Cloud-based Big Data Systems
    Jamali, Mujeeb-ur-Rehman
    Ali, Najma Imtiaz
    Memon, Abdul Ghafoor
    Maree, Mujeeb-u-Rehman
    Jamali, Aadil
    BAGHDAD SCIENCE JOURNAL, 2024, 21 (09) : 3062 - 3077
  • [9] Performance Analysis of Homomorphic Cryptosystem on Data Security in Cloud Computing
    Beyene, Mebiratu
    Shekar, K. Raja
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [10] A Cryptosystem for Database Security Based on TSFS Algorithm
    Abdulameer, Saad A.
    Kashmar, Ali H.
    Shihab, Ammar I.
    BAGHDAD SCIENCE JOURNAL, 2020, 17 (02) : 567 - 574