Using a Lightweight Cryptographic Algorithm to Improve Cloud Computing Data Security

Authors

  • Fourcan Karim Mazumder Assistant Professor, Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh

Keywords:

cloud computing, data security, cryptographic algorithms, XOR, Encryption

Abstract

The use of cloud computing technology allows for the storage of vast amounts of data. It is now crucial to protect the integrity, confidentiality, privacy, and handling processes of cloud computing data from attackers. To improve data security in cloud computing, a novel, lightweight cryptographic algorithm was put forth in this study. The algorithm, which is a 16-byte or 128-bit block cipher, requires a 16-byte or 128-bit key to encrypt data. The algorithm's complexity is increased by incorporating Feistel and substitution-permutation architectural techniques. The algorithm uses logical operations such as XOR, XNOR, shifting, swapping to get Shannon’s theory of diffusion and confusion. Moreover, this algorithm offers flexible features regarding the secret key length and the number of turns used in the encryption process. This proposed algorithm provides a strong security level, low computation cost and less processing time compared with other cryptographic algorithms used in cloud computing.

References

Monika Y, Breja M. Secure DNA and Morse code based Profile access control models for Cloud Computing Environment. Procedia Comput Sci. 2020; 167: 2590–2598.

Carter AB. Considerations for Genomic Data Privacy and Security when Working in the Cloud. J Mol Diagn. 2019; 21(4): 542–552.

Du W, Ding J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security, ACM CCS. 2003; 42–51. doi: 10.1145/948117.948118.

Thabit F, Alhomdy APS, Al-Ahdal AHA, Jagtap PDS. A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings. 2021; 2(1): 91–99. https://doi.org/10.1016/j.gltp.2021.01.013.

Hussein NH, Khalid A. A survey of Cloud Computing Security challenges and solutions. Int J Comput Sci Inf Secur (IJCSIS). 2016; 14(1): 52–56.

Parikh S, Dave D, Patel R, Doshi N. Security and Privacy Issues in Cloud, Fog and Edge Computing. Procedia Comput Sci. 2019; 160: 734–739.

Iqbal A, Palacios RC. Key Opportunities and Challenges of Data Migration in Cloud: Results from a Multivocal Literature Review. Procedia Comput Sci. 2019; 164: 48–55. 8. Toumi H, Fagroud FZ, Zakouni A, Talea M. Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in IaaS Cloud. Procedia Comput Sci. 2019; 160: 819–824.

Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S. Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing. International Journal of Intelligent Networks (IJIN). 2022; 3: 16–30.

Mell P, Grance T. The NIST definition of cloud computing. NIST SP 800-145, NIST Special Publication; 2011. doi:10.1136/emj.2010.096966.

Amamoua S, Trifaa Z, Khmakhem M. Data protection in cloud computing: A Survey of the State-of- Art. Procedia Comput Sci. 2019; 159: 155–161.

Elminaam DSA, Kader HMA, Hadhoud MM. Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur. 2010; 10(3): 213–219.

Tawalbeh L, Darwazeh NS, Al-Qassas RS, AlDosari F. A secure cloud computing model based on data classification. Procedia Comput Sci. 2015; 52: 1153–1158. doi: 10.1016/j.procs.2015.05.150.

Arora R, Parashar A. Secure user data in cloud computing using encryption algorithms. Int J Eng Res Appl (IJERA). 2013; 3(4): 1922–1926.

Sighom JRN, Zhang P, You L. Security enhancement for data migration in the cloud. Future Internet. 2017; 9(3): 23. doi:10.3390/fi9030023.

Gong Z, Nikova S, Law YW. KLEIN: A New Family of Lightweight Block Ciphers. Proceedings of RFID. Security and Privacy - 7th International Workshop. 2011; 7056: 1–18.

Leander G, Paar C, Poschmann A, Schramm K. New lightweight DES variants. In: Fast Software Encryption – FSE. In: LNCS. 2007; 4593: 196–210. doi: 10.1007/978-3-540-74619-5_13.

Berger TP, Francq J, Minier M, Thomas G. Extended generalized feistel networks using matrix representation to propose a new lightweight block cipher: Lilliput. IEEE Trans Comput. 2015; 65(7): 2074–2089. doi:10.1109/TC.2015.2468218.

Usman M, Ahmed I, Imran M, Khan S, Ali U. SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl (IJACSA). 2017; 8(1): 402–411. doi:10.14569/ijacsa.2017.080151.

Published

2023-06-13