A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud
Suresh Kumar Maddila and
Nagalakshmi Vadlamani ()
Additional contact information
Suresh Kumar Maddila: Department of Computer Science, GITAM School of Science, Gandhi Institute of Technology and Management (Deemed to be University), Visakhapatnam, Andhra Pradesh 530045, India
Nagalakshmi Vadlamani: Department of Computer Science, GITAM School of Science, Gandhi Institute of Technology and Management (Deemed to be University), Visakhapatnam, Andhra Pradesh 530045, India
Journal of Information & Knowledge Management (JIKM), 2024, vol. 23, issue 01, 1-28
Abstract:
Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become a major concern for business organisations and individuals, and hence, it is essential to ensure that the services are provided with high data security. Numerous researches have focused on devising effective techniques to enhance data security. However, with the increasing connectivity, security still remains to be a major challenge. This paper devises a novel data protection scheme in the cloud by using the Twofish encryption algorithm and a key generation scheme with the Bald Eagle Pelican Optimization (BEPO) Algorithm. The proposed Twofish+BEPO_KeyGen is implemented in various phases, like initialization, registration, key generation, data encryption, authentication, validation and data sharing, and data decryption. Here, the Twofish algorithm is used to encrypt the data that has to be outsourced to the cloud, and for encryption, the security key required is generated by the BEPO algorithm. The efficacy of the Twofish+BEPO_KeyGen approach is examined by considering metrics, like memory usage, validation time, normalized variance, and conditional privacy, and is detected to have achieved values of 76.3 MB, 37.278 s, 1.665, and 0.926, correspondingly.
Keywords: Cloud computing; encryption; Twofish algorithm; key generation; optimization (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.worldscientific.com/doi/abs/10.1142/S0219649223500624
Access to full text is restricted to subscribers
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wsi:jikmxx:v:23:y:2024:i:01:n:s0219649223500624
Ordering information: This journal article can be ordered from
DOI: 10.1142/S0219649223500624
Access Statistics for this article
Journal of Information & Knowledge Management (JIKM) is currently edited by Professor Suliman Hawamdeh
More articles in Journal of Information & Knowledge Management (JIKM) from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().