Abstract
Cloud cryptography is the art of converting plain text into an unreadable format, which protects data and prevents the data from being misused by the attacker. Different researchers designed various Caesar cipher algorithms for data security. With the help of these algorithms, the data can be converted into a nonreadable format, but the data cannot be completely secured. In this paper, data security is provided in different phases. Firstly, data are secured through a bit-reversing mechanism in which those replace the actual values with no relation to the original data. Then the four-bit values are added at the beginning and end of bits using a salting mechanism to interlink the salting and existing bit-values and hide the original data. A Caesar cipher value is obtained by applying the Caesar cipher algorithm to the resulting bits. The Caesar cipher algorithm is used to implement number-of-shifting on the obtained values. An efficient cipher matrix algorithm is then developed in which different rules are designed to encrypt the data. Afterward, a secure cipher value is obtained by implementing Cipher XORation rules on the result obtained and the user-defined key. In the end, the proposed algorithm is compared with various papers. It identifies how much better the proposed algorithm performs than all the previous algorithms and how much the attack rate can be reduced if this algorithm is used for data security.
Funder
the Researchers supporting program
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference40 articles.
1. Intrusion detection of imbalanced network traffic based on machine learning and deep learning;Liu;IEEE Access,2021
2. Islam, M.M., Hasan, M.Z., and Shaon, R.A. (2019, January 7–9). A Novel Approach for ClientSide Encryption in Cloud Computing. Proceedings of the International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox’s Bazar, Bangladesh.
3. Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN;Nadeem;Comput. Mater. Contin.,2023
4. A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks;Wu;IEEE Access,2018
5. A review of cryptographic impact in cybersecurity on smart grid: Threat, challenges and countermeasures;Hasan;J. Theor. Appl. Inf. Technol.,2021
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献