Enhanced Data Integrity Encryption Algorithm for Cloud Computing

被引:0
|
作者
Mothlabeng, Moloko P. [1 ]
Muchenje, Tonderai [1 ]
Mathonsi, Topside E. [1 ]
Du Plessis, Deon P. [1 ]
机构
[1] Tshwane Univ Technol, Dept Informat Technol, Pretoria, South Africa
关键词
Cloud Computing; Data Integrity; EDIE; Moving Target Defence; SCHEME;
D O I
10.1109/icABCD54961.2022.9856053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing storage services allow people to easily maintain and manage large amounts of data at a low cost. However, it cannot guarantee data integrity. Data is transferred to unsafe and untrustworthy remote cloud servers. Meaning that data could be manipulated by unauthorized users or the service provider unintentionally, resulting in data loss or modification. As a result, protecting data from hackers has become crucial in order to maintain its integrity. The Enhanced Data Integrity Encryption (EDIE) technique was proposed in this paper to enhance data integrity in cloud computing. The proposed algorithm is designed by integrating Moving Target Defense (MTD) and New Lightweight Cryptographic Algorithm (NLCA) . The EDIE algorithm used MTD to dynamically change network configurations and frequently confuse attackers, therefore minimizing the level of attacks and leading to enhanced data integrity. Computer simulation results further show that, compared to other traditional data integrity algorithms, EDIE yields an energy consumption of 6%, encounters the lowest level of 0.2% of all initiated man-in-the-middle attacks, and reduces server computing time by 21%.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] ENCRYPTION AS A SERVICE FOR SECURING DATA IN MOBILE CLOUD COMPUTING
    Mouhib, Ibtihal
    Driss, El Ouadghiri
    Zine-Dine, Khalid
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 546 - 550
  • [32] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [33] Enhanced Security in Cloud Computing Using Neural Network and Encryption
    Sana, Muhammad Usman
    Li, Zhanli
    Javaid, Fawad
    Liaqat, Hannan Bin
    Ali, Muhammad Usman
    IEEE Access, 2021, 9 : 145785 - 145799
  • [34] Enhanced Security in Cloud Computing Using Neural Network and Encryption
    Sana, Muhammad Usman
    Li, Zhanli
    Javaid, Fawad
    Bin Liaqat, Hannan
    Ali, Muhammad Usman
    IEEE ACCESS, 2021, 9 : 145785 - 145799
  • [35] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 61 - 67
  • [36] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 75 - 82
  • [37] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
    Kamboj, Minakshi
    Rana, Sanjeev
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
  • [38] Provable Cloud Data Transfer with Efficient Integrity Auditing for Cloud Computing
    Yang, Changsong
    Xiao, Jun
    Liu, Yueling
    Liu, Yang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [39] Data integrity and availability in cloud computing based on Megastore
    Yu, Yueyue
    Qin, Sujuan
    Wen, Qiaoyan
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 1062 - 1066
  • [40] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316