Improved Cloud Computing Security

被引:1
|
作者
Hameed, Rasha Talal [1 ]
Hussain, Abdulatif Ali [1 ]
Mohamad, Omar Abdulwahabe [1 ]
Zidan, Khamis A. [2 ]
Hamid, Omar Talal [3 ]
Salman, Saba Abdulbaqi [1 ]
机构
[1] Al Iraqia Univ, Dept Comp, Coll Educ, Baghdad, Iraq
[2] Al Iraqia Univ, Coll Engn, Baghdad, Iraq
[3] Cihan Univ, Dept Comp Sci, Erbil, Iraq
关键词
Cloud Computing; Cloud Security; Cryptography; Dynamic Keys Generator; Block Cipher;
D O I
10.1109/AiCIS.2018.00041
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A large number of computers which are linked, workable and organized called cloud computing. In the cloud computing area, many challenges like security, reliability, execution, and balancing of the load. The most important of these issues is cloud security. In this paper, we describe the algorithm which is used to improve cloud security. The proposed algorithm has been designed and implemented for generating dynamic keys in cloud computing based on multiple techniques. These techniques in our proposal have used the coding, permutations and reorder bit by the search method in artificial intelligence. Also, it depends on polynomial equations to expand the original key. The algorithm has the ability to manage clients, generating secret keys of varying length and damage the key after a period of use. Also, the proposed block cipher algorithm has been designed and implemented to protect the data that is sent between clients with high complexity based on a number of techniques.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 50 条
  • [1] Security in cloud computing
    [J]. International Journal of Information Security, 2014, 13 : 95 - 96
  • [2] Security for Cloud Computing
    Nazeer, Shahrin A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [3] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    [J]. RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [4] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [5] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [6] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    [J]. 2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [7] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [8] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    [J]. ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [9] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    [J]. PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [10] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600