EconPapers    
Economics at your fingertips  
 

Improved End-to-End Data Security Approach for Cloud Computing

Soumalya Ghosh, Shiv Kumar Verma, Uttam Ghosh () and Mohammed Al-Numay
Additional contact information
Soumalya Ghosh: Department of Computer Science, Galgotias University, Greater Noida 203201, UP, India
Shiv Kumar Verma: Department of Computer Science, Galgotias University, Greater Noida 203201, UP, India
Uttam Ghosh: Department of Computer Science and Data Science, Meharry Medical College, Nashville, TN 37208, USA
Mohammed Al-Numay: Electrical Engineering Department, College of Engineering, King Saud University, Riyadh 11451, Saudi Arabia

Sustainability, 2023, vol. 15, issue 22, 1-15

Abstract: Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing service through a pay-and-use model. However, a major possible hindrance is security breaches, especially when the sender uploads or the receiver downloads the data from a remotely accessed server. It is a very generic approach to ensuring data security through different encryption techniques, but it might not be able to maintain the security standard. This paper proposes an end-to-end data security approach from the sender side to the receiver side by adding extra padding sequences, as well as randomized salting, followed by hashing and an encryption technique. The effectiveness of the proposed method was established using both a simulated system and mathematical formulations with different performance metrics. Furthermore, its performance was compared with those of contemporary algorithms, showing that the proposed algorithm creates a larger ciphertext that is almost impossible to crack due to randomization modules. However, it has significantly longer encryption and decryption times, although our primary concern is ensuring security, not reducing time.

Keywords: cloud computing; data security; cyber security; hashing; salt (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2071-1050/15/22/16010/pdf (application/pdf)
https://www.mdpi.com/2071-1050/15/22/16010/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:15:y:2023:i:22:p:16010-:d:1281562

Access Statistics for this article

Sustainability is currently edited by Ms. Alexandra Wu

More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jsusta:v:15:y:2023:i:22:p:16010-:d:1281562