Improved Cloud Computing Security

被引:1
|
作者
Hameed, Rasha Talal [1 ]
Hussain, Abdulatif Ali [1 ]
Mohamad, Omar Abdulwahabe [1 ]
Zidan, Khamis A. [2 ]
Hamid, Omar Talal [3 ]
Salman, Saba Abdulbaqi [1 ]
机构
[1] Al Iraqia Univ, Dept Comp, Coll Educ, Baghdad, Iraq
[2] Al Iraqia Univ, Coll Engn, Baghdad, Iraq
[3] Cihan Univ, Dept Comp Sci, Erbil, Iraq
关键词
Cloud Computing; Cloud Security; Cryptography; Dynamic Keys Generator; Block Cipher;
D O I
10.1109/AiCIS.2018.00041
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A large number of computers which are linked, workable and organized called cloud computing. In the cloud computing area, many challenges like security, reliability, execution, and balancing of the load. The most important of these issues is cloud security. In this paper, we describe the algorithm which is used to improve cloud security. The proposed algorithm has been designed and implemented for generating dynamic keys in cloud computing based on multiple techniques. These techniques in our proposal have used the coding, permutations and reorder bit by the search method in artificial intelligence. Also, it depends on polynomial equations to expand the original key. The algorithm has the ability to manage clients, generating secret keys of varying length and damage the key after a period of use. Also, the proposed block cipher algorithm has been designed and implemented to protect the data that is sent between clients with high complexity based on a number of techniques.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 50 条
  • [21] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [23] Performance and security in cloud computing
    Weizhong Qiang
    [J]. The Journal of Supercomputing, 2019, 75 : 1 - 3
  • [24] Performance and security in cloud computing
    Qiang, Weizhong
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 1 - 3
  • [25] Analysis on the Security of Cloud Computing
    He Zhonglin
    He Yuhua
    [J]. PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
  • [26] Security Concerns in Cloud Computing
    Khalil, Issa M.
    Khreishah, Abdallah
    Bouktif, Salah
    Ahmad, Azeem
    [J]. PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 411 - 416
  • [27] Security Issues In Cloud Computing
    Tianfield, Huaglory
    [J]. PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1082 - 1089
  • [28] Hindrances in the Security of Cloud Computing
    Nanda, Mehul
    Tyagi, Aakarsh
    Saxena, Karan
    Chauhan, Neeru
    [J]. 2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 193 - 198
  • [29] Security and Privacy in Cloud Computing
    Hamouda, Sara
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [30] Security Concerns in Cloud Computing
    Kaur, Puneet Jai
    Kaushal, Sakshi
    [J]. HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 103 - 112