期刊论文详细信息
International Journal of Intelligent Networks
A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
Ozgu Can1  Sharaf Alhomdy2  Fursan Thabit3  Sudhir Jagtap4  Ghaleb H. Al-Gaphari4 
[1] Corresponding author. Department of Computer Engineering, Faculty of Engineering - Ege University Turkey.;Assoc. Prof Dr., Department of Computer Engineering, Faculty of Engineering Ege University, Turkey;Postdoctoral Researcher, Department of Computer Engineering, Faculty of Engineering Ege University, Turkey;Professor Faculty of Computer and Information Technology (F.C.I.T.), Sana'a University, Yemen;
关键词: Cloud computing;    Light-weight cryptographic;    Multiplicative homomorphic;    RSA;    cloud base IoT;   
DOI  :  
来源: DOAJ
【 摘 要 】

Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even authority that provides such services. It has become an important medium for enterprises to develop their networks because of these resources. With the growing need for cloud computing, security is becoming important for both individuals and business needs. Many researchers have studied the security of cloud computing. Still, security gaps or threats are increasing as the demand for cloud computing connectivity increases. Because a third party mostly provides cloud platforms to the cloud client, data protection in the cloud is the primary issue. This paper presents a novel, effective lightweight homomorphic cryptographic algorithm which contains two layers of encryption. The first layer uses the new effective, light-weight cryptographic algorithm and the second layer multiplicative homomorphic schemes considered for improving security data in cloud computing. This approach offers both symmetric and asymmetric cryptography features. The proposed approach's performance is evaluated using a variety of metrics, including memory, computational time and (key sensitivity), statistical analysis, image histogram, and entropy change analysis. The proposed algorithm's experimental findings showed a high level of security and an apparent improvement in encryption execution time, memory usage, and throughput. When compared to the cryptographic systems widely used in cloud computing.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:4次