HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment

IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Wireless Personal Communications Pub Date : 2024-09-17 DOI:10.1007/s11277-024-11565-7
Pawan Kumar, Ashutosh Kumar Bhatt
{"title":"HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment","authors":"Pawan Kumar, Ashutosh Kumar Bhatt","doi":"10.1007/s11277-024-11565-7","DOIUrl":null,"url":null,"abstract":"<p>Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing, cloud usage has increased, so various vulnerabilities and threats have also been enhanced. Hence, data security and privacy are considered the major issues of multi-tenant environments in the cloud. Several existing studies have developed different mechanisms to solve security issues in multi-tenant cloud environments. However, they faced various problems while improving security, and this led to a lack of confidentiality, authenticity, and data integrity. Thus, this research paper intends to propose an efficient encryption approach for securing data delivery in the cloud with reduced time. For secure data delivery, homomorphic encryption is utilized to encode the cloud server’s data. In homomorphic encryption, four stages are available for data delivery: key generation, encryption, decryption, and evaluation. The main problems in this homomorphic encryption mechanism are key sharing and key management. Due to these problems, the performance of homomorphic encryption is diminished. Thus, the proposed work introduces an Aquila optimizer for the key generation process. In this, optimal keys are selected, and it provides improved data security and privacy for cloud users. Finally, the selected keys are generated for the encryption and decryption process. The efficiency of the proposed approach is proved by comparing the performance in terms of encryption time, decryption time and throughput over the existing schemes like Rivest, Shamir and Adleman, ElGamal, Algebra Homomorphic Encryption scheme based on ElGamal (AHEE) and modified AHEE. The experimental results reveal that the proposed model achieves reduced encryption and decryption time of 972 ms and 4261 ms for the data size ranges from 5 to 25 mb.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"387 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11565-7","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing, cloud usage has increased, so various vulnerabilities and threats have also been enhanced. Hence, data security and privacy are considered the major issues of multi-tenant environments in the cloud. Several existing studies have developed different mechanisms to solve security issues in multi-tenant cloud environments. However, they faced various problems while improving security, and this led to a lack of confidentiality, authenticity, and data integrity. Thus, this research paper intends to propose an efficient encryption approach for securing data delivery in the cloud with reduced time. For secure data delivery, homomorphic encryption is utilized to encode the cloud server’s data. In homomorphic encryption, four stages are available for data delivery: key generation, encryption, decryption, and evaluation. The main problems in this homomorphic encryption mechanism are key sharing and key management. Due to these problems, the performance of homomorphic encryption is diminished. Thus, the proposed work introduces an Aquila optimizer for the key generation process. In this, optimal keys are selected, and it provides improved data security and privacy for cloud users. Finally, the selected keys are generated for the encryption and decryption process. The efficiency of the proposed approach is proved by comparing the performance in terms of encryption time, decryption time and throughput over the existing schemes like Rivest, Shamir and Adleman, ElGamal, Algebra Homomorphic Encryption scheme based on ElGamal (AHEE) and modified AHEE. The experimental results reveal that the proposed model achieves reduced encryption and decryption time of 972 ms and 4261 ms for the data size ranges from 5 to 25 mb.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
HE-AO:基于优化的多租户环境数据交付模式加密方法
最近,云计算因其多种流畅的交付服务而成为信息技术行业中一项不断发展的技术。在云计算中,多租户是主要特征之一,它通过分发类似的云平台,为服务提供商和终端用户提供了经济性和可扩展性。由于对云计算的需求不断增加,云的使用率也随之提高,因此各种漏洞和威胁也随之增加。因此,数据安全和隐私被认为是云计算中多租户环境的主要问题。现有的一些研究开发了不同的机制来解决多用户云环境中的安全问题。然而,它们在提高安全性的同时也面临着各种问题,这导致了保密性、真实性和数据完整性的缺失。因此,本研究论文打算提出一种高效的加密方法,以确保在云中以更短的时间传输数据。为了确保数据传输的安全性,本文利用同态加密技术对云服务器的数据进行编码。在同态加密中,数据传输有四个阶段:密钥生成、加密、解密和评估。这种同态加密机制的主要问题是密钥共享和密钥管理。由于这些问题,同态加密的性能大打折扣。因此,本文提出在密钥生成过程中引入 Aquila 优化器。在此过程中,会选择最优密钥,为云用户提供更好的数据安全性和隐私性。最后,为加密和解密过程生成选定的密钥。通过在加密时间、解密时间和吞吐量方面与现有方案(如 Rivest、Shamir 和 Adleman、ElGamal、基于 ElGamal 的代数同态加密方案(AHEE)和修改后的 AHEE)的性能比较,证明了所提方法的效率。实验结果表明,在数据大小为 5 到 25 MB 的情况下,所提出的模型可将加密和解密时间分别缩短为 972 毫秒和 4261 毫秒。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Wireless Personal Communications
Wireless Personal Communications 工程技术-电信学
CiteScore
5.80
自引率
9.10%
发文量
663
审稿时长
6.8 months
期刊介绍: The Journal on Mobile Communication and Computing ... Publishes tutorial, survey, and original research papers addressing mobile communications and computing; Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia; Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.; 98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again. Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures. In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment. The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.
期刊最新文献
Capacity Analysis of a WLAN Cell Using VoWiFi Service for CBR Traffic Telecardiology in “New Normal” COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing A Robust Bias Reduction Method with Geometric Constraint for TDOA-Based Localization Variable Speed Drive Applications Performing Effectively with ANN Technique HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1