Abstract

Cloud computing has become an integral part of modern technological infrastructure, facilitating the storage and processing of vast amounts of data. However, ensuring the security of sensitive information in the cloud remains a persistent challenge. This paper proposes a novel approach to enhance the security of cloud computing through hybrid encryption, leveraging the Whale Optimization Algorithm (WOA) and Cuckoo Search Optimization (CSO) algorithms. Hybrid encryption, combining symmetric and asymmetric cryptographic techniques, is employed to address the limitations of traditional encryption methods in cloud environments. The Whale Optimization Algorithm and Cuckoo Search Optimization are utilized to optimize key generation and management processes, enhancing the overall efficiency and security of the encryption scheme. The Whale Optimization Algorithm, inspired by the social behavior of humpback whales, is employed to optimize the parameters of the encryption algorithm. WOA's exploration and exploitation capabilities are leveraged to find an optimal balance in the encryption process, improving the overall robustness against potential attacks. Complementing WOA, the Cuckoo Search Optimization algorithm is applied to optimize the key distribution and update mechanisms. Modeled after the brood parasitism behavior of cuckoo birds, CSO excels in searching large solution spaces, making it suitable for refining the distribution of encryption keys and ensuring their constant adaptability to dynamic cloud environments.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.