Secure data storage and retrieval system using hybridization of orthogonal knowledge swarm optimization and oblique cryptography algorithm in cloud

被引:0
|
作者
N. Madhusudhana Reddy
G. Ramesh
Srinivasa Babu Kasturi
D. Sharmila
G. Gopichand
L. Thomas Robinson
机构
[1] Rajeev Gandhi Memorial College of Engineering and Technology,Department of CSE
[2] Gokaraju Rangaraju Institute of Engineering & Technology,Department of CSE
[3] Nalla Narasimha Reddy Education Society’s Group of Institutions,Department of CSE
[4] Government Arts and Science College,Department of Computer Application
[5] Vellore Institute of Technology,School of Computer Science and Engineering
[6] Nanjil Catholic College of Arts and Science,Department of Computer Science
[7] Kaliyakkavilai,undefined
来源
Applied Nanoscience | 2023年 / 13卷
关键词
Cloud service provider; Privacy-preserving; Encryption; Retrieval; Elliptical cryptography algorithm; Orthogonal learning; And storage system;
D O I
暂无
中图分类号
学科分类号
摘要
Distributed computing provides extensive storage capacity for customers to carry out their applications with no investment in infrastructure. As a result, many companies do their trade in the Public Space. For an instance to process the initial information set, many mediator information sets will be used for information exhaustive applications. However, protecting the protection of the intermediate information set is a difficult job. To solve this problem, numerous algorithms are implemented in the literature for retrieval problems. As a result, in my previous study, the optimal privacy protection of cloud-based data search was proposed using an oppositional cuckoo search and an ElGamal encryption algorithm. However, the downside is ElGamal, and the ciphertext is twice as long as the plain text. In addition, this algorithm is slower and necessary for randomness. To overcome the problem in this work, we propose the Optimum oblique Cryptography (OOCC) Algorithm for Encryption. In this, we primarily choose the equivalent node starting with and create the transitional dataset and apply the Opposition Cuckoo Search (OCS) algorithm. We choose confidential material from the intermediate information. We then encrypt sensitive data using the OECC algorithm. We now use an algorithm for orthogonal wisdom element optimization (OLPSO) for input generation. The information can be stored securely in the cloud after encoding; we recover the query dependent statistics securely from the cloud; performance of proposed effort on a variety of procedures, such as data transfer rate, encryption time, memory usage, and information thrashing.
引用
收藏
页码:2449 / 2461
页数:12
相关论文
共 50 条
  • [31] Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
    M. Suganya
    T. Sasipraba
    Journal of Cloud Computing, 12
  • [32] Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5621 - 5633
  • [33] Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases
    S. Muthurajkumar
    M. Vijayalakshmi
    A. Kannan
    Wireless Personal Communications, 2017, 96 : 5621 - 5633
  • [34] Optimization for ice-storage air-conditioning system using particle swarm algorithm
    Lee, Wen-Shing
    Chen, Yi-Ting
    Wu, Ting-Hau
    APPLIED ENERGY, 2009, 86 (09) : 1589 - 1595
  • [35] Zero knowledge based data deduplication using in-line Block Matching protocol for secure cloud storage
    Kanagamani, Vivekrabinson
    Karuppiah, Muneeswaran
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (04) : 2067 - 2083
  • [36] ACPSO: Hybridization of Ant Colony and Particle Swarm Algorithm for Optimization in Data Clustering using Multiple Objective Functions
    Kharche, Dipali
    Thakare, Anuradha
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 835 - 840
  • [37] A secure data protection technique for healthcare data in the cloud using homomorphic encryption and Jaya-Whale optimization algorithm
    Sudha, I
    Nedunchelian, R.
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2019, 10 (06)
  • [38] Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System
    Mohiyuddin, Aqsa
    Javed, Abdul Rehman
    Chakraborty, Chinmay
    Rizwan, Muhammad
    Shabbir, Maryam
    Nebhen, Jamel
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2022, 24 (02) : 1203 - 1215
  • [39] Optimization of Day-Ahead Energy Storage System Scheduling in Microgrid Using Genetic Algorithm and Particle Swarm Optimization
    Raghavan, Ajay
    Maan, Paarth
    Shenoy, Ajitha K. B.
    IEEE ACCESS, 2020, 8 : 173068 - 173078
  • [40] A Secure Erasure Cloud Storage system using Advanced Encryption Standard algorithm and Proxy Re-encryption
    Nivedhaa, R.
    Justus, J. Jean
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 755 - 759