Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks

Author:

Zahra Syeda Wajiha1ORCID,Nadeem Muhammad2ORCID,Arshad Ali3ORCID,Riaz Saman4ORCID,Ahmed Waqas5,Abu Bakr Muhammad6,Alabrah Amerah7ORCID

Affiliation:

1. Department of Computer Science, National University of Technology, Islamabad 44000, Pakistan

2. Department of Computer Science, University of Science and Technology Beijing, Beijing 100083, China

3. Department of Computing, NASTP Institute of Information Technology, Lahore 58810, Pakistan

4. Department of Computing, Riphah International University, Lahore 54660, Pakistan

5. Department of Computer Science, Qurtuba University of Science and Technology, Dera Ismail Khan 29050, Pakistan

6. Department of Electrical Engineering, National University of Technology, Islamabad 44000, Pakistan

7. Department of Information Systems, College of Computer and Information Science, King Saud University, Riyadh 11543, Saudi Arabia

Abstract

Researchers have created cryptography algorithms that encrypt data using a public or private key to secure it from intruders. It is insufficient to protect the data by using such a key. No research article has identified an algorithm capable of protecting both the data and the associated key, nor has any mechanism been developed to determine whether access to the data is permissible or impermissible based on the authentication of the key. This paper presents a WEDEx-Kerberotic Framework for data protection, in which a user-defined key is firstly converted to a cipher key using the “Secure Words on Joining Key (SWJK)” algorithm. Subsequently, a WEDEx-Kerberotic encryption mechanism is created to protect the data by encrypting it with the cipher key. The first reason for making the WEDEx-Kerberotic Framework is to convert the user-defined key into a key that has nothing to do with the original key, and the length of the cipher key is much shorter than the original key. The second reason is that each ciphertext and key value are interlinked. When an intruder utilizes the snatching mechanism to obtain data, the attacker obtains data or a key unrelated to the original data. No matter how efficient the algorithm is, an attacker cannot access the data when these methods and algorithms are used to protect it. Finally, the proposed algorithm is compared to the previous approaches to determine the uniqueness of the algorithm and assess its superiority to the previous algorithms.

Funder

King Saud University

Publisher

MDPI AG

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3