Open Access Open Access  Restricted Access Subscription Access

A Unique Approach for Disc Encryption Based on Data Matrix

Areeba Ramzan, Hifsa Mobeen

Abstract


The number of cloud users is growing due to contemporary facilities and technology. The Internet and cloud computing are the most often used categories nowadays. User privacy is a concern in cloud computing. Various approaches are being used to protect the data from intruders. This article uses a key to protect data that is comparable to plain text. The plain text and the key are partitioned into a matrix with different row and column sizes as the key matrix. When the size of two simple matrices is different. To encrypt the data, many formulae have been devised. It identifies the equation and encrypts it further by adding it to the disc equation. This method can be simply calculated to adjust the matrix where the character-specific values are supplied, and the data may be encrypted and decrypted. After the article, a comparison of other papers is presented, and the paper is concluded based on suggested work, with the discussion of how the proposed work differs from prior ones.


Keywords


Hill cipher, cryptography,cipher text, encryption, decryption, matrix

Full Text:

PDF

References


NadeemM, Arshad A, Riaz S, Band SS, Mosavi A.Intercept the cloud network from brute force and DDOS attacks via intrusion detection and prevention system,inIEEE Access.2021; 9: 152300–152309.

Naser SM. Cryptography: From the ancient history to now, it’s applications and a new complete numerical model. International Journal of Mathematics and Statistics Studies. Jul 2021; 9(3): 11–30.

Verma V, Kumar V. DoS/DDoS attack detection using machine learning: A review. Proceedings of the International Conference on Innovative Computing & Communication (ICICC) 2021 Apr 24.

Nicholas G. McDonald, Past, present, and future methods of cryptography and data encryption, a research review, University of Utah, May 2020.

IslamMM, Hasan MZ, ShaonRA.A novel approach for clientside encryption in cloud computing, International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox'sBazar, Bangladesh, pp. 1–6, 2019.

Amazon.com. (2024). Amazon S3 security—Amazon Simple Storage Service. [Online] Available from: https://docs.aws.amazon.com/AmazonS3/latest/userguide/security.html.

LulaP, Dospinescu O, Homocianu D, Sireteanu NA.An advanced analysis of cloud computing concepts based on the computer science ontology,Comput Mater Con. 2021; 66(3): 2425–2443.

RenY, Wang C, Chen Y, Chuah MC, Yang J.Signature verification using critical segments for securing mobile transactions,IEEE TransMobile Comput.2020; 19(3): 724–739.

Hasan M, Ariffin N, Sani N. A review of cryptographic impact in cybersecurity on smart grid: Threat, challenges and countermeasures. J. Theor. Appl. Inf. Technol. 2021; 99: 2458–2472.

Ahmad SA, GarkoAB.Hybrid cryptography algorithms in cloud computing: a review,2019 15th International Conference on Electronics, Computer and Computation (ICECCO), Abuja, Nigeria, pp. 1–6, 2019.

BrownPN, Borowski HP, MardenJR.Security against impersonation attacks in distributedsystems,IEEE Trans Control Netw Syst. 2019; 6(1): 440–450.

MeraoucheIshak, Dutta Sabyasachi,Tan Haowen,Sakurai Kouichi. Neural Networks Based Cryptography: A Survey, IEEE Access. 2021; 1–1. 10.1109/ACCESS.2021.3109635.

HuQ, Du B, Markantonakis K, Hancke GP.A session hijacking attack against a deviceassisted physical-layer key agreement,IEEE Trans Ind Inf.2020; 16(1): 691–702.

SharmaY, Gupta H, Khatri SK.a security model for the enhancement of data privacy in cloud computing, Amity International Conference on Artificial Intelligence, pp.898–902, 2019.

HanY, Duan L, ZhangR.Jamming-assisted eavesdropping over parallel fading channels,IEEETrans InfForensics Secur.2019; 14(9): 2486–2499.

Nirmala AP, Sundaram BM, Prema R. An analysis on security threats in cloud computing. Int. J. Inf. Comput. Sci. 2019; 6: 2138–2153.

KumariA, Kumar V, AbbasiMY, Kumari S, Chaudhary P, Chen CM.CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC, IEEE Access.2020; 8: 107838–107852.

Xu Z, Xu C, Xu J, Meng X. A computationally efficient authentication and key agreement scheme for multi-server switching in WBAN, Int J Sensor Netw. 2021; 35(3): 143–160.

Xiang LY, Shen XB, Qin JH, Hao W. Discrete multi-graph hashing for large-scale visual search, Neural Proces Lett. 2019; 49(3): 1055–1069.

Gu K, Wang Y, Wen S. Traceable threshold proxy signature, J Inf Sci Eng. 2017; 33(1): 63–79.

Gu K, Yang LH, Wang Y, Wen S. Traceable identity-based group signature, RAIRO-Theor Inf Appl. 2016; 50(3): 193–226.

Gu K, Jia WJ, Jiang CL. Efficient identity-based proxy signature in the standard model, Comput J. 2015; 58(4): 792–807.

Gu K, Yang LH, Yin B. Location data record privacy protection based on differential privacy mechanism, Inf Technol Control. 2018; 47(4): 639–654.

Sivan R, ZukarnainZA.Security and privacy in cloud-based e-health system, Symmetry (Basel),13(5), 2021.

Seth Bijeta,Dalal Surjeet,Jaglan Vivek,Le Dac-Nhuong,Mohan Senthilkumar,Srivastava Gautam. Integrating encryption techniques for secure data storage in the cloud, Trans Emerg Telecommun Tech.2022; 33. 10.1002/ett.4108.

He SM, Zeng WN, Xie K, Yang HM, Lai MY, et al. PPNC: privacy preserving scheme for random linear network coding in smart grid, KSII Trans Internet Inf Syst. 2017; 11(3): 1510–1532.

Disha Dahanukar,Durva Shelke, A review paper on cryptography and network security, Int J Ad ResSci Commun Technol.2021, 108–114.

Andola Nitish, Gahlot Raghav,Yadav Vijay,Venkatesan Sharannya,Verma Shekhar. Searchable encryption on the cloud: a survey, J Supercomput. 2022, 78. 10.1007/s11227-022-04309-6

Qiu-yu Zhang,Fu Minrui,Huang Yibo,Zhao Zhenyu. Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage, Secur Commun Netw. 2022. 1-14. 10.1155/2022/9045259

Saraswat Pankaj,Raj Swapnil. Encryption and Decryption Techniques in Cloud Computing,Int J Innov Res Comput Sci Technol.2021; 225-228. 10.55524/ijircst.2021.9.6.50.

AhmadSA, Garko AB.Hybrid Cryptography Algorithms in Cloud Computing: A Review,2019 15th International Conference on Electronics, Computer and Computation (ICECCO), pp. 1–6, 2019.

Al-ShabiMA.A survey on symmetric and asymmetric cryptography algorithms in information security, Int J Sci Res Publ. (IJSRP). March 2019; 9(3): 576–589.

Felix Bentil, Isaac Lartey. Cloud cryptography: A security aspect. Int. J Eng. Res Technol. (IJERT). May 2021; 10(5): 448–450.

Musa A, Mahmood A. Client-side cryptography based security for cloud computing system. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). 2021, Mar 25. pp. 594–600). IEEE.

Mihailescu MI, Nita SL.A searchable encryption scheme with biometric authentication and authorization for cloud environments,MDPI-Cryptography.Feb. 2022; 6(1): p. 8.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Communication Engineering & Systems