Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm

Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm

Huthaifa A. Al Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al-Nawasrah
Copyright: © 2022 |Pages: 10
DOI: 10.4018/IJCAC.297101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data and the easily of sharing, and this data can also be accessed from anywhere in the world as long as it is on the Internet, large gaps have emerged around data theft and viewing. Accordingly, researchers have developed algorithms and methods to protect this data, but the attempts to penetrate the data did not stop. In this research, we developed a method that combines XOR and Genetic algorithm to protect the data on the cloud through encryption operations and keep the key from being lost or stolen. The data that is uploaded to cloud computing may be important and we should not allow any party to see it or steal it. Therefore, it became imperative to protect this data and encrypt it. We have developed an algorithm that uses XOR and genetic algorithms in the encryption process.
Article Preview
Top

Introduction

If a message has been altered or modified during transmission, the receiver must be capable of detecting it. No one should be able to exchange a false message for the actual message, or parts of it. (Delfs, Knebl, & Knebl, 2002; Gou, Yamaguchi, & Gupta, 2017). Fourthly, non-repudiation is the digital signature that provides the non-repudiation service to solve a problem that may happen when the sender does not pass the message.

The concept of cloud computing appeared around the year 2000, but the concept of computing appeared as a service around the year 1960 (“Zdnet,”), cloud computing is used to store and share data and it is a new form of data storage and retrieval. Examples include Google Drive, Dropbox, etc. A personal account is created with the username and password where a specific capacity is given to storage in the cloud, storage and access to data can be done at any time and from any place with the internet, the cloud can be used by users, companies, and governments (Gupta, Yamaguchi, & Agrawal, 2018). In the cloud, you'll find everything from standard office apps to storage, networking, and the ability to handle natural language and artificial intelligence. (Al-Nawasrah, Almomani, Atawneh, Alauthman, & Computing, 2020; Almomani, Alauthman, Alweshah, Dorgham, & Albalas, 2019; Dorgham, Al-Rahamneh, Almomani, Khatatneh, & Computing, 2018; Manasrah, Smadi, ALmomani, & Sciences, 2017; “Zdnet,”).

“Cloud computing” describes data centers that are accessible to multiple users via the Internet. (Bhushan, & Gupta, 2017; Mishra, Gupta, & Gupta 2020). The user can upload data on the cloud and share it with others; no one can take the data or know what the data is. In addition to that, cloud security consists of a set of procedures, controls, policies, and technologies that work together to protect systems, infrastructure, as well as cloud-based data. Storing data in the cloud rather than on local storage provides a number of advantages, but also raises questions about security and privacy. Store data in encrypted form to alleviate these issues. (Gupta, 2021).

Public, private, communal, and hybrid clouds are the four categories of clouds. The public cloud is a typical model and more popular, where users can use the cloud services by cloud service providers, such as Amazon, Google, etc. Private cloud use by a singular entity with high privacy, a private cloud used by organizations that required infrastructure for their applications, community cloud is used by a sociality of users, several organizations share the infrastructure, hybrid cloud is simply a combination of many clouds, it allows to users control in infrastructure.

The data on the cloud is hacked, due to poor protection and security. We specialize in data encryption operations (Stergiou, Psannis, Gupta, & Ishibashi, 2018; Gupta, & Agrawal, 2021), many encryption operations use a key to decryption and obtain data, in traditional encryption methods the key is stored with the user which leads to loss of the key and loss of information completely, we have developed a mechanism that stores the key with data and stores it in two clouds. When we apply our algorithm, we guarantee no data loss.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing