An Operative Encryption Method with Optimized Genetical method for Assuring Information Security in Cloud Computing
Keywords:
Encrypted Data, QKD, OGA, ThroughputAbstract
The cloud customer is typically uninformed of the provider's threat assessment and mitigation procedures. Ask what safety precautions the service provider takes. So, the client must likewise do something to improve the supplier's security. The function of quantum key distribution (QKD) in cryptographic infrastructures is investigated in this work. QKD uses quantum mechanical systems to promise safe key agreements. There is a claim that QKD will play a significant role in upcoming cryptographic infrastructures. Without relying on computational assumptions, it can guarantee long-term confidentiality for encrypted data. In fact, even when using public-key authentication, we contend that QKD still provides stronger security than conventional key agreements. Several researchers have put forth various data recovery strategies, but they are ineffective and unreliable. When the primary cloud server loses its data and is unable to offer data to users, the proposed technique gives the user the option to acquire information from any backup server in order to achieve reliability. The decryption procedure is then carried out in response to the user's request. Experiments were done to demonstrate the applicability of the proposed frameworks, and performance indicators were compared to those utilized by other researchers. Based on this study, a framework is developed, that guarantees authentication and lays the way for safe data access, with better performance and fewer complications than the previous efforts.
Downloads
References
Chandramohan Dhasarathan, Vengattaraman Thirumal & Dhavachelvan Ponnurangam 2017, ‗A secure data privacy preservation for on-demand cloud service,‘ Journal of King Saud University -Engineering Sciences, vol. 29, no. 2, pp. 144-150.
Chandramohan, D, Vengattaraman, T, Rajaguru, D & Dhavachelvan, P 2016, ‗A new privacy preserving technique for cloud service user endorsement using multi-agents,‘ Journal of King Saud University -Computer and Information Sciences, vol. 28, no. 1, pp. 37-54.
Chang Guo, QingniShen, Yahui Yang & Zhonghai Wu 2015, ‗User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System,‘ In Proceedings of the IEEE 39th Annual conference on Computer Software and Applications Conference, pp. 104-109.
Changhee Hahn & JunbeomHur 2016, ‗Efficient and privacy-preserving biometric identification in cloud,‘ ICT Express, vol. 2, no. 3, pp. 135-139.
Chen Lyu, Shi-Feng Sun, Yuanyuan Zhang, AmitPande, Haining Lu & DawuGu 2016, ‗Privacy-Preserving Data Sharing Scheme over Cloud for Social Applications,‘ Journal of Network and Computer Applications, vol. 74, pp. 44-55.
Chintureena Thingom 2014, ‗A Study on Tools for Cloud Disaster Management‘, International Journal of Interdisciplinary and Multidisciplinary Studies.
Stergiou, C., & Psannis, K. E. (2017). Recent advances delivered by Mobile Cloud Computing & Internet of Things for Big Data applications: a survey. International Journal of Network Management, 27(3), e1930.
Aceto, G., Persico, V., & Pescapé, A. (2020). Industry 4.0 & health: Internet of things, big data, & cloud computing for healthcare 4.0. Journal of Industrial Information Integration, 18, 100129.
Khayyat, M., Elgendy, I. A., Muthanna, A., Alshahrani, A. S., Alharbi, S., & Koucheryavy, A. (2020). Advanced deep-learning-based computational offloading for multilevel vehicular edge-cloud computing networks. IEEE Access, 8, 137052-137062.
Alam, T. (2020). Cloud Computing & its role in Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(2), 108-115.
Drake, J. H., Kheiri, A., Özcan, E., & Burke, E. K. (2020). Recent advances in selection hyper-heuristics. European Journal of Operational Research, 285(2), 405-428.
S. E. Alaojan and A. H. Alwattar, "A Modified Blowfish Algorithm to Secure Data in Cloud," 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 2022, pp. 218-222, doi: 10.1109/ISMSIT56059.2022.9932817.
Wei, H., Bao, H., & Ruan, X. (2020). Genetic algorithm-driven discovery of unexpected ther-mal conductivity enhancement by the disorder. Nano Energy, 71, 104619.
Wang, Z., & Sobey, A. (2020). A comparative review between genetic algorithm used in com-posite optimization & the state-of-the-art in evolutionary computation. Composite Struc-tures, 233, 111739.
Abbasi, M., Rafiee, M., Khosravi, M. R., Jolfaei, A., Menon, V. G., & Koushyar, J. M. (2020). An efficient parallel genetic algorithm solution for vehicle routing problems in cloud imple-mentation of intelligent transportation systems. Journal of Cloud Computing, 9(1), 6.
Jatana, N., & Suri, B. (2020). Particle swarm & genetic algorithm applied to mutation testing for test data generation: a comparative evaluation. Journal of King Saud University-Computer & Information Sciences, 32(4), 514-521.
Chen, X., An, Y., Zhang, Z., & Li, Y. (2020). An approximate nondominated sorting genetic algorithm to integrate optimization of production scheduling & accurate maintenance based on reliability intervals. Journal of Manufacturing Systems, 54, 227-241.
Jain, G., & Prasad, R. R. (2020, June). Machine learning, Prophet and XGBoost algorithm: Analysis of Traffic Forecasting in Telecom Networks with time-series data. In 2020 8th Inter-national Conference on Reliability, Infocom Technologies and Optimization (Trends and Fu-ture Directions)(ICRITO) (pp. 893-897). IEEE.
Lu, X.; Pan, Z.; Xian, H. An efficient and secure data sharing scheme for mobile devices in cloud computing. J. Cloud Comput. 2020, 9, 60.
Yu, H.; Lu, X.; Pan, Z. An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing. IEEE Access 2020, 8, 151465–151473.
Chan, J.O.P. Digital transformation in the era of big data and cloud computing. Int. J. Intell. Inf. Syst. 2020, 9, 16.
Ding, H.; Sun, C.; Zeng, J. Fuzzy Weighted Clustering Method for Numerical Attributes of Communication Big Data Based on Cloud Computing. Symmetry 2020, 12, 530.
Daskevics, A.; Nikiforova, A. IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you. In Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain, 6–9 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–8.
Ferrari, D.; Carminati, M.; Polino, M.; Zanero, S. NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. In Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA, 7–11 December 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 567–581.
Nikiforova, A.; Daskevics, A.; Azeroual, O. NoSQL security: Can my data-driven decision-making be affected from outside? arXiv 2022, arXiv:2206.11787.
Thakre, B., Thakre, R., Timande, S., & Sarangpure, V. (2021). An Efficient Data Mining Based Automated Learning Model to Predict Heart Diseases. Machine Learning Applications in Engineering Education and Management, 1(2), 27–33. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/17
Kumar, D. ., & Sonia, S. (2023). Resources Efficient Dynamic Clustering Algorithm for Flying Ad-Hoc Network. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 106–117. https://doi.org/10.17762/ijritcc.v11i2s.6034
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.