Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Issue on Advanced Cryptographic Techniques for Cloud and Big Data Computation
Guest editors: Fatos Xhafa and Zhenfu Cao
Article type: Research Article
Authors: Jeyabalu, Mahalakshmi; *; † | Krishnamoorthy, Kuppusamy
Affiliations: Department of Computer Science, Alagappa University, Karaikudi - 630 004, India. [email protected], [email protected]
Correspondence: [*] Address for correspondence: Department of Computer Science, Alagappa University, Karaikudi - 630 004, India
Note: [†] This research was supported by Alagappa University Research Fellowship Grant, Alagappa University, Karaikudi, India.
Abstract: Cloud Computing, a type of interpersonal computing offers services on demand. There arise numerous vulnerabilities and threats that jeopardize the authentication of the cloud services. Security services remain prevalent despite of standard policies offered by service providers, especially on public cloud. An encryption service is one of the conventional way to protect the plain data, by converting it into inarticulate form. This paper brings an interesting application service that provides security as a service to the users. This innovative service works based on a symmetric key encryption scheme. Encryption keys in the cryptographic process reveal the quality of encryption. Multiple keys are involved in this proposed encryption process, among them, one interesting key generation is from hybridization of improved cipher block chaining encryption operation and another from nature inspired genetic algorithm. Motivation for designing this hybrid algorithm is to minimize the execution time and storage space capacity. The experimental analysis is performed for multimedia files, including plain text, images. Performance of the proposed encryption algorithm is analyzed using various metrics that reveals the quality and strength of the algorithm in spite of various attacks. Evaluation reports state that this application service relics potential for authenticating multimedia files with better satisfaction while out-sourced as application in cloud computing environment.
Keywords: Security-as-a-service, Improved encryption algorithm, Genetic Algorithm, Multimedia files, Outsourcing, Public Cloud, local optimization, symmetric key encryption
DOI: 10.3233/FI-2018-1619
Journal: Fundamenta Informaticae, vol. 157, no. 1-2, pp. 79-109, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]