{"title":"HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment","authors":"Pawan Kumar, Ashutosh Kumar Bhatt","doi":"10.1007/s11277-024-11565-7","DOIUrl":null,"url":null,"abstract":"<p>Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing, cloud usage has increased, so various vulnerabilities and threats have also been enhanced. Hence, data security and privacy are considered the major issues of multi-tenant environments in the cloud. Several existing studies have developed different mechanisms to solve security issues in multi-tenant cloud environments. However, they faced various problems while improving security, and this led to a lack of confidentiality, authenticity, and data integrity. Thus, this research paper intends to propose an efficient encryption approach for securing data delivery in the cloud with reduced time. For secure data delivery, homomorphic encryption is utilized to encode the cloud server’s data. In homomorphic encryption, four stages are available for data delivery: key generation, encryption, decryption, and evaluation. The main problems in this homomorphic encryption mechanism are key sharing and key management. Due to these problems, the performance of homomorphic encryption is diminished. Thus, the proposed work introduces an Aquila optimizer for the key generation process. In this, optimal keys are selected, and it provides improved data security and privacy for cloud users. Finally, the selected keys are generated for the encryption and decryption process. The efficiency of the proposed approach is proved by comparing the performance in terms of encryption time, decryption time and throughput over the existing schemes like Rivest, Shamir and Adleman, ElGamal, Algebra Homomorphic Encryption scheme based on ElGamal (AHEE) and modified AHEE. The experimental results reveal that the proposed model achieves reduced encryption and decryption time of 972 ms and 4261 ms for the data size ranges from 5 to 25 mb.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"387 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11565-7","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing, cloud usage has increased, so various vulnerabilities and threats have also been enhanced. Hence, data security and privacy are considered the major issues of multi-tenant environments in the cloud. Several existing studies have developed different mechanisms to solve security issues in multi-tenant cloud environments. However, they faced various problems while improving security, and this led to a lack of confidentiality, authenticity, and data integrity. Thus, this research paper intends to propose an efficient encryption approach for securing data delivery in the cloud with reduced time. For secure data delivery, homomorphic encryption is utilized to encode the cloud server’s data. In homomorphic encryption, four stages are available for data delivery: key generation, encryption, decryption, and evaluation. The main problems in this homomorphic encryption mechanism are key sharing and key management. Due to these problems, the performance of homomorphic encryption is diminished. Thus, the proposed work introduces an Aquila optimizer for the key generation process. In this, optimal keys are selected, and it provides improved data security and privacy for cloud users. Finally, the selected keys are generated for the encryption and decryption process. The efficiency of the proposed approach is proved by comparing the performance in terms of encryption time, decryption time and throughput over the existing schemes like Rivest, Shamir and Adleman, ElGamal, Algebra Homomorphic Encryption scheme based on ElGamal (AHEE) and modified AHEE. The experimental results reveal that the proposed model achieves reduced encryption and decryption time of 972 ms and 4261 ms for the data size ranges from 5 to 25 mb.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.