Skip to content
2000
Volume 18, Issue 5
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Aim

Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from attackers when millions of users circulate the same network for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing data security approach prioritizes protecting data at rest in cloud storage but gives less thought to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts.

Methods

The third-party auditor is provided access to data during the transfer phase, which is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data more susceptible to unauthorized access. However, growing concerns regarding data privacy and security have made outsourcing sensitive information to faraway data centers difficult. As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management.

Results

The proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64, and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is illustrated graphically simulation results. This strategy reduces power consumption by 13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes.

Conclusion

As a result, the recommended architecture enhances safety, cuts down on wasted resources, and speeds up the rollout of computational cloud services.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965279410231221034431
2025-06-01
2025-11-05
Loading full text...

Full text loading...

References

  1. AdeeR. MouratidisH. A dynamic four-step data security model for data in cloud computing based on cryptography and steganography.Sensors2022223110910.3390/s22031109 35161853
    [Google Scholar]
  2. Kumar AngurajD. Advanced encryption standard based secure iot data transfer model for cloud analytics applications.J. Info. Techno. Dig. Wor.20224211412410.36548/jitdw.2022.2.006
    [Google Scholar]
  3. GopinathN. ShyryS. P. Enhancing the cloud security using side channel attack free QKD with entangled fuzzy logicJ. Intel. Fuzzy Syst.202211110.3233/JIFS‑220398
    [Google Scholar]
  4. SoniD. SrivastavaD. BhattA. AggarwalA. KumarS. ShahM.A. An empirical client cloud environment to secure data communication with alert protocol.Math. Probl. Eng.2022202211410.1155/2022/4696649
    [Google Scholar]
  5. ChillakuruP. MadiajaganM. PrashanthK.V. AmbalaS. Shaker ReddyP.C. PavanJ. Enhancing wind power monitoring through motion deblurring with modified GoogleNet algorithm.Soft Comput.202311110.1007/s00500‑023‑08358‑8
    [Google Scholar]
  6. RamachandraM.N. Srinivasa RaoM. LaiW.C. ParameshachariB.D. Ananda BabuJ. HemalathaK.L. An efficient and secure big data storage in cloud environment by using triple data encryption standard.Big Data Cognitive Comput.20226410110.3390/bdcc6040101
    [Google Scholar]
  7. DharanganB. PraveenJ. RajagopalS. JegajothiB. Secure cloud-based e-health system using advanced encryption standardIn 2022 3rd International Conference on Electronics and Sustainable Communication Systemsyear,(pp. 642-646). IEEE, 2022.
    [Google Scholar]
  8. KumarK. PandeS.V. KumarT.C.A. SainiP. ChaturvediA. ReddyP.C.S. ShahK.B. Intelligent controller design and fault prediction using machine learning model.Int. Trans. Electr. Energy Syst.202320231910.1155/2023/1056387
    [Google Scholar]
  9. ThabitF. CanO. AlhomdyS. Al-GaphariG.H. JagtapS. A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing.Int. J. Intel. Netw.202231630
    [Google Scholar]
  10. MuthappaK.A. NishaA.S.A. ShastriR. AvasthiV. ReddyP.C.S. Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs.Appl. Nanosci.20231385369537810.1007/s13204‑023‑02814‑5
    [Google Scholar]
  11. MaathavanK.S.K. VenkatramanS. A secure encrypted classified electronic healthcare data for public cloud environmentIntell. Autom. Soft Comput.2022322
    [Google Scholar]
  12. GopinathN. ShyryS.P. Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks.Soft Comput.20232718133651337210.1007/s00500‑022‑07479‑w
    [Google Scholar]
  13. SucharithaY. ReddyP.C.S. SuryanarayanaG. Network intrusion detection of drones using recurrent neural networksDrone Technology.Future Trends and Practical Applications2023375392
    [Google Scholar]
  14. AdeniyiA.E. AbiodunK.M. AwotundeJ.B. OlagunjuM. OjoO.S. EdetN.P. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach.Multimedia Tools Appl.20238213205372055110.1007/s11042‑023‑14338‑9
    [Google Scholar]
  15. AcharS. Cloud computing security for multi-cloud service providers: controls and techniques in our modern threat landscape.Inter. J. Comput. Sys. Eng.2022169379384
    [Google Scholar]
  16. GuptaI. SinghA.K. LeeC.N. BuyyaR. Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions.IEEE Access202210712477127710.1109/ACCESS.2022.3188110
    [Google Scholar]
  17. ShylaS.I. SujathaS.S. Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm.J. Ambient Intell. Humaniz. Comput.202213115116310.1007/s12652‑021‑02893‑8
    [Google Scholar]
  18. AhmedQ.W. GargS. Double diagonal puzzle encryption standard-512 for securing data over cloud environment.J. Grid Comput.20222033310.1007/s10723‑022‑09612‑3
    [Google Scholar]
  19. GuptaR.K. AlmuzainiK.K. PateriyaR.K. ShahK. ShuklaP.K. AkwafoR. An improved secure key generation using enhanced identity-based encryption for cloud computing in large-scale 5G.Wirel. Commun. Mob. Comput.2022202211410.1155/2022/7291250
    [Google Scholar]
  20. SucharithaY. ReddyP.C.S. ChittiT.N. Deep learning based framework for crop yield prediction.In AIP Conference Proceedingsvol. 2548. AIP Publishing., 202310.1063/5.0118526
    [Google Scholar]
  21. GopinathN. ShyryP. PBSK (Parity Bit Interleaved Shift Key) based Distribution for Controlling side channel attacks 2022In Third International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE) IEEE year.2022 ,18
    [Google Scholar]
  22. RajkumarV. PrakashM. VennilaV. Secure data sharing with confidentiality, integrity and access control in cloud environment.Comput. Syst. Sci. Eng.202240277979310.32604/csse.2022.019622
    [Google Scholar]
  23. Al-ShareedaM.A. ManickamS. COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing.Int. J. Environ. Res. Public Health202219231561810.3390/ijerph192315618 36497709
    [Google Scholar]
  24. Al-ShareedaM.A. AnbarM. ManickamS. HasbullahI.H. Se-cppa: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks.Sensors (Basel)20212124820610.3390/s21248206 34960311
    [Google Scholar]
  25. Al-ShareedaM.A. AnbarM. ManickamS. HasbullahI.H. Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks.IEEE Access2021911322611323810.1109/ACCESS.2021.3104148
    [Google Scholar]
  26. JyotiA. ChauhanR.K. A blockchain and smart contract-based data provenance collection and storing in cloud environment.Wirel. Netw.20222841541156210.1007/s11276‑022‑02924‑y
    [Google Scholar]
  27. GargD. BhatiaK.K. GuptaS. A novel genetic algorithm based encryption technique for securing data on fog network using DNA cryptography2022 2nd International Conference on Innovative Practices in Technology and Management, IEEE, 2022236236810.1109/ICIPTM54933.2022.9754031
    [Google Scholar]
  28. ShanmugarajaP. BhardwajM. MehbodniyaA. An efficient clustered m-path sinkhole attack detection (MSAD) algorithm for wireless sensor networks.Ad Hoc Sens. Wirel. Netw.202355
    [Google Scholar]
  29. SohalM. BharanyS. SharmaS. MaashiM.S. AljebreenM. A hybrid multi-cloud framework using the IBBE key management system for securing data storage.Sustainability202214201356110.3390/su142013561
    [Google Scholar]
  30. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  31. Al-ShareedaM.A. ManickamS. Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks.IEEE Access20221012060612061510.1109/ACCESS.2022.3222488
    [Google Scholar]
  32. BalP.K. MohapatraS.K. DasT.K. SrinivasanK. HuY.C. A joint resource allocation, security with efficient task scheduling in cloud computing using hybrid machine learning techniques.Sensors 2022223124210.3390/s22031242 35161987
    [Google Scholar]
  33. QureshiM.B. QureshiM.S. TahirS. AnwarA. HussainS. UddinM. ChenC.L. Encryption techniques for smart systems data security offloaded to the cloud.Symmetry 202214469510.3390/sym14040695
    [Google Scholar]
  34. AboodE.W. AbdullahA.M. Al SibaheM.A. AbduljabbarZ.A. NyangaresiV.O. KalafyS.A.A. GhrabtaM.J.J. Audio steganography with enhanced LSB method for securing encrypted text with bit cycling.Bullet. Elec. Eng. Info.202211118519410.11591/eei.v11i1.3279
    [Google Scholar]
  35. Shaker ReddyP.C. SucharithaY. A design and challenges in energy optimizing CR-Wireless sensor networks.Recent Advan. Comput. Sci. Commun.20231658292
    [Google Scholar]
  36. FatimaS. RehmanT. FatimaM. KhanS. AliM.A. Comparative analysis of aes and rsa algorithms for data security in cloud computing.Eng. Proceed.202220114
    [Google Scholar]
  37. RazaqueA. ShaldanbayevaN. AlotaibiB. AlotaibiM. MuratA. AlotaibiA. Big data handling approach for unauthorized cloud computing access.Electronics 202211113710.3390/electronics11010137
    [Google Scholar]
  38. KhadidosA.O. ShitharthS. KhadidosA.O. SangeethaK. AlyoubiK.H. Healthcare data security using IoT sensors based on random hashing mechanism.J. Sens.2022202211710.1155/2022/8457116
    [Google Scholar]
  39. HossainM.A. Al HasanM.A. Improving cloud data security through hybrid verification technique based on biometrics and encryption system.Int. J. Comput. Appl.202244545546410.1080/1206212X.2020.1809177
    [Google Scholar]
  40. KadamA.K.J. VarmaV. PatilS. PatilM. PatilM. “Data storage security in cloud computing using aes algorithm and Md5 algorithm. Samriddhi”, J. Phys. Sci.Eng. Technol.2022142296300
    [Google Scholar]
  41. ReddyP.C. NachiyappanS. RamakrishnaV. SenthilR. Sajid AnwerM.D. Hybrid model using scrum methodology for softwar development system.J. Nucl. Ene Sci. Power Generat. Technol.20211092
    [Google Scholar]
  42. NarayananU. PaulV. JosephS. “A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment”, J. King Saud Uni. -.Comput. Info. Sci.20223463121313510.1016/j.jksuci.2020.05.005
    [Google Scholar]
  43. UkwuomaH.C. AromeG. ThompsonA. AleseB.K. Post-quantum cryptography-driven security framework for cloud computing.Open Comput. Sci.202212114215310.1515/comp‑2022‑0235
    [Google Scholar]
  44. FaizM. FatimaN. SandhuR. KaurM. NarayanV. Improved homomorphic encryption for security in cloud using particle swarm optimization.J. Pharm. Negat. Results202247614771
    [Google Scholar]
  45. KumarG.R. ReddyR.V. JayarathnaM. PughazendiN. VidyullathaS. ReddyP.C.S. Web application based Diabetes prediction using Machine Learning2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) IEEE20231710.1109/ACCAI58221.2023.10200323
    [Google Scholar]
  46. JangjouM. SohrabiM.K. A comprehensive survey on security challenges in different network layers in cloud computing.Arch. Comput. Methods Eng.20222963587360810.1007/s11831‑022‑09708‑9
    [Google Scholar]
  47. RazzaqA. Blockchain-based secure data transmission for internet of underwater things.Cluster Comput.20222564495451410.1007/s10586‑022‑03701‑4
    [Google Scholar]
  48. VidhyaA. KumarP.M. Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud.Concurr. Eng. Res. Appl.202230217118010.1177/1063293X221089086
    [Google Scholar]
  49. UmapathyB. KalpanaG. A novel symmetric cryptographic method to design block complexity for data security.Comput. Electr. Eng.202210410846710.1016/j.compeleceng.2022.108467
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965279410231221034431
Loading
/content/journals/raeeng/10.2174/0123520965279410231221034431
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keyword(s): AES; Cloud computing; cyberattacks; data security; encryption; secure cloud
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test