Enhanced Data Integrity Encryption Algorithm for Cloud Computing

被引:0
|
作者
Mothlabeng, Moloko P. [1 ]
Muchenje, Tonderai [1 ]
Mathonsi, Topside E. [1 ]
Du Plessis, Deon P. [1 ]
机构
[1] Tshwane Univ Technol, Dept Informat Technol, Pretoria, South Africa
关键词
Cloud Computing; Data Integrity; EDIE; Moving Target Defence; SCHEME;
D O I
10.1109/icABCD54961.2022.9856053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing storage services allow people to easily maintain and manage large amounts of data at a low cost. However, it cannot guarantee data integrity. Data is transferred to unsafe and untrustworthy remote cloud servers. Meaning that data could be manipulated by unauthorized users or the service provider unintentionally, resulting in data loss or modification. As a result, protecting data from hackers has become crucial in order to maintain its integrity. The Enhanced Data Integrity Encryption (EDIE) technique was proposed in this paper to enhance data integrity in cloud computing. The proposed algorithm is designed by integrating Moving Target Defense (MTD) and New Lightweight Cryptographic Algorithm (NLCA) . The EDIE algorithm used MTD to dynamically change network configurations and frequently confuse attackers, therefore minimizing the level of attacks and leading to enhanced data integrity. Computer simulation results further show that, compared to other traditional data integrity algorithms, EDIE yields an energy consumption of 6%, encounters the lowest level of 0.2% of all initiated man-in-the-middle attacks, and reduces server computing time by 21%.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Achieving an effective, confidentiality and integrity of data in cloud computing
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    International Journal of Network Security, 2019, 21 (02) : 326 - 332
  • [42] Data integrity verification: a novel approach for cloud computing
    Rajat Saxena
    Somnath Dey
    Sādhanā, 2019, 44
  • [43] Improving Dynamic Data Integrity Verification in Cloud Computing
    Khatri, Trushna S.
    Jethava, G. B.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [44] Trust establishment for data integrity checking in cloud computing
    Lu, J. (jinglu601@126.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [45] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274
  • [46] A method for achieving provable data integrity in cloud computing
    Li, Aiping
    Tan, Shuang
    Jia, Yan
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 92 - 108
  • [47] A Survey on the Integrity Checking of Outsourced Data In Cloud Computing
    Zhao, Haichun
    Zheng, Xuefeng
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1650 - 1656
  • [48] A data integrity verification scheme in mobile cloud computing
    Lin, Chen
    Shen, Zhidong
    Chen, Qian
    Sheldon, Frederick T.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 146 - 151
  • [49] Data integrity verification: a novel approach for cloud computing
    Saxena, Rajat
    Dey, Somnath
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (03):
  • [50] A method for achieving provable data integrity in cloud computing
    Aiping Li
    Shuang Tan
    Yan Jia
    The Journal of Supercomputing, 2019, 75 : 92 - 108