Author:
Koppaka Aruna Kumari,Lakshmi Vadlamani Naga
Abstract
Purpose
In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.
Design/methodology/approach
A new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.
Findings
In the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.
Originality/value
The IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.
Subject
General Computer Science,Theoretical Computer Science
Reference28 articles.
1. Asymmetric addition chaining cryptographic algorithm (ACCA) for data security in cloud,2018
2. FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data;Soft Computing,2020
3. Using a modified approach of blowfish algorithm for data security in cloud computing,2018
4. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud;Journal of Systems Architecture,2020
5. Light weight proactive padding based crypto security system in distributed cloud environment;International Journal of Computational Intelligence Systems,2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献