Ensuring Cloud Data Security Using the Soldier Ant Algorithm
-
Published:2023
Issue:1
Volume:14
Page:
-
ISSN:1798-2340
-
Container-title:Journal of Advances in Information Technology
-
language:
-
Short-container-title:JAIT
Author:
Dawson John Kwao,Ayawli Ben Beklisi Kwame,Agyemang Sylvester,Baah Philemon,Akyeramfo-Sam Samuel
Abstract
Cloud computing is evolving as a firsthand archetype of large-scale distributed computing which adds more power to internet technologies. It is a framework aiming at convenient and on-request network access to an organized and shared pool of resources. Security of data transmitted and stored by a third party happens to be the greatest challenge for organizations embracing the technology. In this work, a proposed hybrid algorithm dubbed the Soldier Ant Algorithm (SAA) a blend of the Diffie-Hellman algorithm and Delta Encoding technique (Newton Forward and Backward Interpolation). The motivation obtained is the integration of algorithms for cryptography purposes. The integration makes the proposed SAA algorithm symmetric and also makes the Diffie-Hellman algorithm withstand security threats such as man-in-the-middle attacks. The proposed algorithm establishes a secured connection between the cloud client and the cloud service provider and at the same time secures the data sent to the cloud. A comparative analysis was performed against RSA and ElGamal and indicated that the proposed algorithms’ encryption and decryption time were lower even though it is linear (O(n)).
Publisher
Engineering and Technology Publishing
Subject
Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Information Systems,Software
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Visual Analysis of Xi Jinping's Network Security Ideology Research Based on Mapping Knowledge Domain;2024 9th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA);2024-04-25
2. Modeling Memory Bandwidth Interference in Cloud Data Centers via Deep Learning;2024 9th International Conference on Computer and Communication Systems (ICCCS);2024-04-19
3. Research on quality evaluation and risk control methods of open source cybersecurity datasets;2024 7th International Conference on Software and System Engineering (ICoSSE);2024-04-19
4. Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend;PLOS ONE;2024-04-16
5. Enhancing Cloud Security: A Deep Cryptographic Analysis;2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT);2023-11-23