An Efficient and Robust Method for Data Privacy and Security on a Public Cloud Using a Novel Hybrid Technique †
Abstract
:1. Introduction
2. Related Study
3. Methodology
3.1. ECC and AES
Algorithm 1: Encryption using ECC |
Input: Elliptic curve attributes (P, e, E, b); private key Es and public key Eu = EsE. Output: Cipher text (DS1, DS2). Ensure: Convert message AES key L to point on elliptic curve N. 1 Choose h∈T[1,b–1]; 2 Evaluate DS1 = hE; 3 Evaluate DS2 = N + hEu; 4 Return (DS1, DS2). |
Algorithm 2: Decryption using ECC |
Input: Elliptic curve Attributes (P, e, E, b); private key Es and cipher text (DS1, DS2). Output: AES key H as message N. Ensure: 1 Evaluate N = DS2- dDS1; 2 Extracting key H from N; 3 Return (H). |
3.2. Blended Suggested Method
4. Results and Discussions
5. Conclusions and Future Scope
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Addya, S.K.; Satpathy, A.; Ghosh, B.C.; Chakraborty, S.; Ghosh, S.K.; Das, S.K. CoM CLOUD: Virtual Machine Coalition forMulti-Tier Applications Over Multi-Cloud Environments. IEEE Trans. Cloud Comput. 2023, 11, 956–970. [Google Scholar] [CrossRef]
- Barthwal, V.; Rauthan, M.M.S. AntPu: Ameta- heuristic approach for energy-efficient and SLA aware management of virtual machines in cloud computing. Memetic Comput. 2021, 13, 91–110. [Google Scholar] [CrossRef]
- Cziva, R.; Jouët, S.; Stapleton, D.; Tso, F.P.; Pezaros, D.P. SDN-Based Virtual Machine Management for Cloud Data Centers. IEEE Trans. Netw. Serv. Manag. 2016, 13, 212–225. [Google Scholar] [CrossRef]
- Chen, Y.; Liu, H.; Wang, B.; Sonompil, B.; Ping, Y.; Zhang, Z. A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 2021, 10, 3. [Google Scholar] [CrossRef]
- Shen, D.; Luo, J.; Dong, F.; Zhang, J. VirtCo: Joint co flow scheduling and virtual machine placement in cloud data centers. Tsinghua Sci. Technol. 2019, 24, 630–644. [Google Scholar] [CrossRef]
- Hosam, O.; Ahmad, M.H. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. Int. J. Comput. Sci. Eng. 2019, 19, 153. [Google Scholar] [CrossRef]
- Shen, J.; Zhou, T.; He, D.; Zhang, Y.; Sun, X.; Xiang, Y. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 2019, 16, 996–1010. [Google Scholar] [CrossRef]
- Jena, O.P.; Tripathy, A.; Swagatam, S.; Rath, S. Dual encryption model for preserving privacy in cloud computing. Adv. Math. Sci. J. 2020, 9, 6667–6678. [Google Scholar] [CrossRef]
- Manaa, M.E.; Hadi, Z.G. Scalable and robust cryptography approach using cloud computing. J. Discret. Math. Sci. Cryptogr. 2020, 23, 1439–1445. [Google Scholar] [CrossRef]
- Henry, N.I.; Anbuananth, C.; Kalarani, S. Hybridmeta-heuristic algorithm for optimal virtual machine placement and migration in cloud computing. Concurr. Comput. Pract. Exp. 2022, 34, e7353. [Google Scholar] [CrossRef]
- Niroshini Infantia, H.; Anbuananth, C.; Kalarani, S. Design and Development of Improved Squirrel Search- based Secured VM Migration in the Cloud Sector with Optimal Key Management. Cybern. Syst. 2022, 1–38. [Google Scholar] [CrossRef]
- Ray, B.K.; Saha, A.; Khatua, S.; Roy, S. Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment. IEEE Trans. Cloud Comput. 2022, 10, 957–971. [Google Scholar] [CrossRef]
- Selvam, J.M.; Srivaramangai, P. Time complexity analysis of cloud authentications and data security: Polynomial based hashing and elliptic curve cryptography. Int. J. Anal. Exp. Modal Anal. 2020, 12, 850–860. [Google Scholar]
- Shukla, D.K.; Dwivedi, V.K.; Trivedi, M.C. Encryption algorithm in cloud computing. Mater. Today Proc. 2020, 37, 1869–1875. [Google Scholar] [CrossRef]
- Mirjalili, S. Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowl.-Based Syst. 2015, 89, 228–249. [Google Scholar] [CrossRef]
- Saeed, A.; Garraghan, P.; Hussain, S.A. Cross-VM Network Channel Attacks and Counter measures Within Cloud Computing Environments. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1783–1794. [Google Scholar] [CrossRef]
Sizes | Combined | Advanced Encryption Standard | Data Encryption Standard | Blowfish Encryption |
---|---|---|---|---|
64 | 2.52 | 3.54 | 4.01 | 4.43 |
128 | 2.59 | 3.71 | 4.14 | 4.59 |
192 | 2.66 | 3.6 | 4.17 | 4.55 |
256 | 2.72 | 3.72 | 4.46 | 4.82 |
Sizes | Combined | Advanced Encryption Standard | Data Encryption Standard | Blowfish Encryption |
---|---|---|---|---|
64 | 1.76 | 2.81 | 3.23 | 4.01 |
128 | 1.89 | 2.94 | 3.42 | 4.06 |
192 | 2 | 3.05 | 3.5 | 4.22 |
256 | 2.22 | 3.2 | 3.7 | 4.37 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Infantia Henry, N.; Anbuananth, C.; Kalarani, S. An Efficient and Robust Method for Data Privacy and Security on a Public Cloud Using a Novel Hybrid Technique. Eng. Proc. 2023, 59, 115. https://doi.org/10.3390/engproc2023059115
Infantia Henry N, Anbuananth C, Kalarani S. An Efficient and Robust Method for Data Privacy and Security on a Public Cloud Using a Novel Hybrid Technique. Engineering Proceedings. 2023; 59(1):115. https://doi.org/10.3390/engproc2023059115
Chicago/Turabian StyleInfantia Henry, Niroshini, Chinnasamy Anbuananth, and Subramanium Kalarani. 2023. "An Efficient and Robust Method for Data Privacy and Security on a Public Cloud Using a Novel Hybrid Technique" Engineering Proceedings 59, no. 1: 115. https://doi.org/10.3390/engproc2023059115