Aim:
Cloud computing (CC) is a revolutionary new archetype in which users pool their
computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable
to diverse security threats from attackers when millions of users circulate the same network
for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing
data security approach prioritizes protecting data at rest in cloud storage but gives less thought
to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts.
Methodology:
The third-party auditor is provided access to data during the transfer phase, which
is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data
more susceptible to unauthorized access. However, growing concerns regarding data privacy and
security have made outsourcing sensitive information to faraway data centers difficult. As a result,
new security concerns in the cloud necessitate an improved version of the tried-and-true advanced
encryption standard (AES) algorithm. Key aspects presented in this study include a secure and
private framework for owner data. It improves upon the 128 AES technique by adding a second
round of encryption using a different key, allowing for a throughput of 1000 blocks per second.
However, the standard method uses a single round key and only 800 blocks per second. The suggested
approach reduces energy consumption, improves load distribution, and optimizes network
trust and resource management.
objective:
The third-party auditor is also provided access to data during the transfer phase, as is the current pattern. Because the attacker can now pose as a trusted third party, this also makes the data more susceptible to unauthorized access. However, growing concerns about data privacy and security make outsourcing sensitive information to faraway data centers difficult.
Results:
The proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64,
and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is
illustrated graphically via simulation results. This strategy reduces power consumption by
13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes.
method:
As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management.
Conclusion:
As a result, the recommended architecture enhances safety, cuts down on wasted
resources, and speeds up the rollout of computational cloud services.