Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend
John Kwao Dawson,
Twum Frimpong,
James Benjamin Hayfron Acquah
et al.
Abstract:The cloud is becoming a hub for sensitive data as technology develops, making it increasingly vulnerable, especially as more people get access. Data should be protected and secured since a larger number of individuals utilize the cloud for a variety of purposes. Confidentiality and privacy of data is attained through the use of cryptographic techniques. While each cryptographic method completes the same objective, they all employ different amounts of CPU, memory, throughput, encryption, and decryption times. I… Show more
“…This again defeats the notion that Chacha20 uses less memory during execution [ 45 ]. From the experimental results, SK 4 OA could be considered as a lightweight algorithm that could be better employed in the cloud to attain high security as it uses less loops and has lower run times [ 46 ]. Also, SK4OA could be used in environment, where less memory is needed such as ubiquitous computing.…”
Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA’s standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.
“…This again defeats the notion that Chacha20 uses less memory during execution [ 45 ]. From the experimental results, SK 4 OA could be considered as a lightweight algorithm that could be better employed in the cloud to attain high security as it uses less loops and has lower run times [ 46 ]. Also, SK4OA could be used in environment, where less memory is needed such as ubiquitous computing.…”
Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA’s standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.
“…A key component of research ethics is protecting participants' anonymity and confidentiality since people are more willing to divulge sensitive and private information when given that assurance [13]. The researcher must ensure the confidentiality of participant data to avoid any possible injury or discomfort resulting from its exposure.…”
Section: Privacy and Confidentialitymentioning
confidence: 99%
“…Maintaining ethical standards requires protecting the participants' anonymity and privacy [13]. The research will closely follow data protection standards to guarantee that all information is kept private and used only for the study.…”
This article delves into the paramount importance of upholding ethical integrity in doctoral research, particularly focusing on classroom remediation within secondary education contexts. It provides a comprehensive framework delineating ethical guidelines crucial for maintaining integrity throughout the research process. Key areas of focus include risk assessment, informed consent, privacy and confidentiality, data handling and reporting, and strategies for mitigating mistakes and negligence. Drawing from existing literature and ethical standards, this article underscores the need for meticulous planning and adherence to ethical principles to safeguard the well-being of research participants and ensure the validity and reliability of research outcomes. By prioritising ethical considerations, researchers can navigate complex ethical dilemmas and contribute meaningfully to scientific knowledge while upholding the integrity of their work.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.