Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm
Author:
Affiliation:
1. Al-Balqa Applied University, Jordan
2. IT Department, Al-Huson University College, AL-Balqa Applied University, Irbid, Jordan & Research and Innovation Department, Skyline University College, Sharjah, UAE
3. British University of Bahrain, Bahrain
Abstract
Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data and the easily of sharing, and this data can also be accessed from anywhere in the world as long as it is on the Internet, large gaps have emerged around data theft and viewing. Accordingly, researchers have developed algorithms and methods to protect this data, but the attempts to penetrate the data did not stop. In this research, we developed a method that combines XOR and Genetic algorithm to protect the data on the cloud through encryption operations and keep the key from being lost or stolen. The data that is uploaded to cloud computing may be important and we should not allow any party to see it or steal it. Therefore, it became imperative to protect this data and encrypt it. We have developed an algorithm that uses XOR and genetic algorithms in the encryption process.
Publisher
IGI Global
Subject
Computer Networks and Communications,Computer Science Applications,Human-Computer Interaction
Reference27 articles.
1. Al-Nawasrah, A., Almomani, A. A., Atawneh, S., & Alauthman, M. J. (2020). A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. Academic Press.
2. Almomani, A., Alauthman, M., Alweshah, M., Dorgham, O., & Albalas, F. (2019). A comparative study on spiking neural network encoding schema: implemented with cloud computing. Academic Press.
3. Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE. doi:10.1007/978-981-13-0277-0_31
4. Security challenges in cloud computing: state-of-art
5. Introduction to Cryptography
Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy‐preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud;SECURITY AND PRIVACY;2024-01-28
2. A Comprehensive Survey on Cloud Computing;International Journal of Cloud Applications and Computing;2022-09-09
3. Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT;International Journal of Cloud Applications and Computing;2022-07-22
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3