A Scheduling Genetic Algorithm For Real-Time Data Freshness And Cloud Data Security Over Keywords Searching

Divya Surendran, Sasikala K

Abstract


Cloud storage services allow customers to ingress data stored from any device at any time. The growth of the Internet helps the number of users who need to access online databases without a deep understanding of the schema or query. The languages have risen dramatically, allowing users to search secured data and retrieve desired data from cloud storage using keywords. On the other hand, there are fundamental difficulties such as security, which must be provided to secure user'spersonal information. A hybrid scheduling genetic algorithm (SGA) is proposed in this research. SGA technique enhances the security level and provides data freshness. For evaluation and comparison, parameters such as execution time throughputs are used. According to experimental results, the proposed technique ensures the security of user data from unauthorized parties. Furthermore, SGA is strong and more effective when compared to a set of parameters to the existing algorithm like Data Encryption Standard (DES), Blowfish, and AdvancedEncryption Standard (AES).


Full Text:

PDF

References


J. Yu, H. Wang, Strong key-exposure resilient auditing for secure cloud storage, IEEE Trans. Inf. Forensics Secure. 12 (8) (2017) 1931–1940.

Y. Yu, Y. Li, J. Tian, J. Liu, Blockchain-based solutions to security and privacy issues in the Internet of things, IEEE Wirel. Commun. 25 (6) (2018) 12–18.

J. Li, D. Lin, A.C. Squicciarini, J. Li, C. Jia, Towards privacy-preserving storage and retrieval in multiple clouds, IEEE Trans. Cloud Comput. 5 (3) (2017) 499–509.

Shekokar N, Sampat K, Chandawalla C, Shah J (2015) Implementation of fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of international conference on advanced computing technologies and applications (ICACTA-2015) held in Mumbai, India, ISBN: 978-1-5108-0136-3, vol 45. pp 499–505

Q. Huang, H. Li, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Inform. Sci. 403 (2017) 1–14.

J. Baek, R. Safavi-Naini, W. Susilo, Public key encryption with keyword search revisited, in: O. Gervasi, B. Murgante, A. Laganà, D. Taniar, Y. Mun, M.L. Gavrilova (Eds.), Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, - July 3, 2008, Pro- ceedings, Part I, Lecture Notes in Computer Science, volume 5072, Springer, 2008, pp. 1249–1259.

J.W. Byun, H.S. Rhee, H. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: W. Jonker, M. Petkovic (Eds.), Secure Data Management, Third VLDB Workshop, SDM 2006, Lecture Notes in Computer Science, volume 4165, Springer, 2006, pp. 75–83.

Miao, Meixia, Yunling Wang, Jianfeng Wang, and Xinyi Huang. "Verifiable database supporting keyword searches with forward security." Computer Standards & Interfaces 77 (2021): 103491.

Liu, Qin, Guojun Wang, and Jie Wu. "Secure and privacy preserving keyword searching for cloud storage services." Journal of network and computer applications 35, no. 3 (2012): 927-933.

Najafi, Aniseh, Hamid Haj Seyyed Javadi, and Majid Bayat. "Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security." Multimedia Tools and Applications (2021): 1-20.

Pandiaraja, P., and P. Vijayakumar. "Efficient multi-keyword search over encrypted data in untrusted cloud environment." In 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), pp. 251-256. IEEE, 2017.

Qin, Baodong, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. "Public-key authenticated encryption with keyword search revisited: Security model and constructions." Information Sciences 516 (2020): 515-528.

Tariq, Husna, and Parul Agarwal. "Secure keyword search using dual encryption in cloud computing." International Journal of Information Technology 12, no. 4 (2020): 1063-1072.

Ogata, Wakaha, and Takaaki Otemori. "Security analysis of secure kNN and ranked keyword search over encrypted data." International Journal of Information Security 19, no. 4 (2020): 419-425.

Byun, Jin Wook, and Dong Hoon Lee. "On a security model of conjunctive keyword search over encrypted relational database." Journal of Systems and Software 84, no. 8 (2011): 1364-1372.

Pakniat, Nasrollah, Danial Shiraly, and Ziba Eslami. "Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT." Journal of Information Security and Applications 53 (2020): 102525.

Zhang, Yuan, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. "Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage." IEEE Transactions on Cloud Computing (2019).

Naresh, R., Sayeekumar, M., Karthick, G., Supraja, P.: Attributebased hierarchical file encryption for efficient retrieval of files by dv index tree from cloud using crossover genetic algorithm. Soft Comput. 23(8), 2561–2574 (2019)

Tahir, Muhammad, Muhammad Sardaraz, Zahid Mehmood, and Shakoor Muhammad. "CryptoGA: a cryptosystem based on genetic algorithm for cloud data security." Cluster Computing 24, no. 2 (2021): 739-752.

Ahmed M, Hossain MA (2014) Cloud computing and security issues in the cloud. Int J Netw Sec Appl (IJNSA) 6(1):25–36

Barona R, Anita EAM (2017) A survey on data breach challenges in cloud computing security: issues and threats. In: International conference on circuit, power and computing technologies (ICCPCT-2017) held in Kollam, India, ISBN: 978-1-5090-4967-7. pp 20–21

Yusop ZM, Abawajy JH (2013) Analysis of insiders attack mitigation strategies. In: International conference on innovation, management and technology research held in Malaysia, vol 129. pp 611–618

Carlin A, Hammoudeh M, Aldabbas O (2015) Defense for distributed denial of service attacks in cloud computing. In: International conference on advanced wireless, information, and communication technologies (AWICT-2015), vol 73. pp 490–497

Wong R (2017) Research on data security technology based on cloud storage. In: 13th global congress on manufacturing and management, (GCMM-2016). pp 1340–1355

Watson MR, Shirazi NH, Marnerides AK, Mauthe A, Hutchison D (2016) Malware detection in cloud computing infrastructures. IEEE Trans Dependable Secure Comput 13(2):192–205




DOI: https://doi.org/10.29040/ijcis.v3i3.80

Article Metrics

Abstract view : 223 times
PDF - 129 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.