Authors: D.I. George Amalarethinam; H.M. Leena
Addresses: Department of Computer Science, Jamal Mohamed College (Autonomous), Tiruchirappalli, Tamil Nadu, India ' Department of Computer Science, Holy Cross College (Autonomous), Tiruchirappalli, Tamil Nadu, India
Abstract: Cloud computing is the distributed and centralised network with the collection of systems providing the resources based on pay-per-use. Security is the major issue in the cloud. Protecting the users' data is a critical task in cloud. Traditional cryptographic symmetric algorithms are suitable for storing data in a more secured way. Asymmetric algorithms are preferred for encrypting the keys rather than the data because of its less speed. The technique for generating or selecting the key plays a vital role in securing the data. Genetic algorithm is a powerful tool for solving the most of the optimisation problems. The proposed genetic algorithm is used for generating the best key which satisfies the specified fitness function. The optimal key generated from the proposed genetic algorithm is encrypted with asymmetric addition chaining cryptographic algorithm (ACCA) to make the key strong. This strengthened key can be used for encrypting data.
Keywords: cloud computing; security; cryptography; encryption; key generation; genetic algorithm; optimisation problems; fitness function; data security; addition chaining.
International Journal of Cloud Computing, 2018 Vol.7 No.1, pp.4 - 14
Available online: 26 Apr 2018 *Full-text access for editors Access for subscribers Free access Comment on this article