2020
DOI: 10.5815/ijisa.2020.06.04
|View full text |Cite
|
Sign up to set email alerts
|

Improving Cloud Data Encryption Using Customized Genetic Algorithm

Abstract: Data Encryption is widely utilized for ensuring data privacy, integrity, and confidentiality. Nowadays, a large volume of data is uploaded to the cloud, which increases its vulnerability and adds to security breaches. These security breaches include circumstances where sensitive information is being exposed to third parties or any access to sensitive information by unauthorized personnel. The objective of this research is to propose a method for improving encryption by customizing the genetic algorithm (GA) wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…By defining and implementing a robust fitness function, the algorithm can systematically assess and enhance the quality of generated motifs. The fitness function used is as (1) [25]:…”
Section: Determining the Fitness Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…By defining and implementing a robust fitness function, the algorithm can systematically assess and enhance the quality of generated motifs. The fitness function used is as (1) [25]:…”
Section: Determining the Fitness Functionmentioning
confidence: 99%
“…For the fitness function, it is determined that the search for the optimum value uses the maximum function. Therefore, the fitness function can be rewritten as (2) [25]:…”
Section: Determining the Fitness Functionmentioning
confidence: 99%
“…Homomorphic encryption algorithm was used to support the operations in the encrypted domain. GA was customized in [19] for improving data encryption. The generated key is based on altering the population size, number of generations, and mutation rate.…”
Section: Related Workmentioning
confidence: 99%
“…Each layer of cloud computing is found to highly responsible for specific services in which SaaS layer enable accession to desired software thereby avoids downloading to our system, IaaS controls networks, virtual machines etc., and PaaS offers facility to employ various applications or services with reduced cost and software governing difficulties [5,6]. The users of cloud computing must encrypt the data before sharing their data to the cloud in order to provide proper security from leaking the data [7,8]. The process of controlling the access is the first and vital step in providing the security for preventing the unauthorized accessing of the data that have been shared.…”
Section: Introductionmentioning
confidence: 99%