Abstract
Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become a major concern for business organisations and individuals, and hence, it is essential to ensure that the services are provided with high data security. Numerous researches have focused on devising effective techniques to enhance data security. However, with the increasing connectivity, security still remains to be a major challenge. This paper devises a novel data protection scheme in the cloud by using the Twofish encryption algorithm and a key generation scheme with the Bald Eagle Pelican Optimization (BEPO) Algorithm. The proposed Twofish+BEPO_KeyGen is implemented in various phases, like initialization, registration, key generation, data encryption, authentication, validation and data sharing, and data decryption. Here, the Twofish algorithm is used to encrypt the data that has to be outsourced to the cloud, and for encryption, the security key required is generated by the BEPO algorithm. The efficacy of the Twofish+BEPO_KeyGen approach is examined by considering metrics, like memory usage, validation time, normalized variance, and conditional privacy, and is detected to have achieved values of 76.3 MB, 37.278 s, 1.665, and 0.926, correspondingly.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.