A Robust Approach to Cloud Data Securityusing an Amalgamation of AES and Code-Based Cryptography
Data security in cloud environments is a critical concern that increases dependence on cloud services and the persistent threat. The purpose of this paper is to present a new approach that uses the McEliece cryptosystem a form of code-based cryptography, with Advanced Encryption Standard (AES) to pr...
Saved in:
Published in | 2024 International Conference on Science Technology Engineering and Management (ICSTEM) pp. 1 - 5 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
26.04.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Data security in cloud environments is a critical concern that increases dependence on cloud services and the persistent threat. The purpose of this paper is to present a new approach that uses the McEliece cryptosystem a form of code-based cryptography, with Advanced Encryption Standard (AES) to provide data security in the cloud. Code-based cryptography is to establish secure communication channels, while Advanced Encryption Standard is employed for efficient data encryption. Using hybrid cryptography techniques, this approach addresses the emerging need for quantum-resistant security measures and strong data protection in cloud environments. A comparative study is conducted to assess the effectiveness of this approach, examining the performance of a combination of codee-based and Advance Encryption standard. The findings suggest promising results in addressing the growing challenges of data security in cloud-based systems, paving the way for flexible and secure cloud infrastructure. |
---|---|
AbstractList | Data security in cloud environments is a critical concern that increases dependence on cloud services and the persistent threat. The purpose of this paper is to present a new approach that uses the McEliece cryptosystem a form of code-based cryptography, with Advanced Encryption Standard (AES) to provide data security in the cloud. Code-based cryptography is to establish secure communication channels, while Advanced Encryption Standard is employed for efficient data encryption. Using hybrid cryptography techniques, this approach addresses the emerging need for quantum-resistant security measures and strong data protection in cloud environments. A comparative study is conducted to assess the effectiveness of this approach, examining the performance of a combination of codee-based and Advance Encryption standard. The findings suggest promising results in addressing the growing challenges of data security in cloud-based systems, paving the way for flexible and secure cloud infrastructure. |
Author | R, Mahesh Muthulakshmi P, Anithaashri T. |
Author_xml | – sequence: 1 givenname: Mahesh Muthulakshmi surname: R fullname: R, Mahesh Muthulakshmi email: maheshmuthulakshmir1018.sse@saveetha.comshri3krra@gmail.com organization: Institute of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Médical and Technical Sciences,Thandalam Chennai,Tamilnadu,INDIA – sequence: 2 givenname: Anithaashri T. surname: P fullname: P, Anithaashri T. email: anithaashritp.sse@saveetha.com organization: Institute of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Médical and Technical Sciences,Thandalam Chennai,Tamilnadu,INDIA |
BookMark | eNo1j81OhDAUhWuiCx3nDVzUBwDbXmjpEhF1kjEmMvvxUgrTBCjhZ8HbS6KuzsmXky85d-S6970l5JGzkHOmnw5Zcco_JOegQsFEFHIWSxaDuCJ7rXQCMQMlNYdb8p3SL18u00zTYRg9mgudPc1av1T0BWekhTXL6OZ1mVzfUOxp2mHbYIez8z31NU3zYsMVzXxlg2ec7FbHdZh9M-JwWe_JTY3tZPd_uSPFa37K3oPj59shS4-BizQElRI1aNRcCollpEpWQSJBscRYUImJjEYesVKZ2iZGxVYxDQDxthLCcNiRh1-rs9aeh9F1OK7n_9vwA7LBUb8 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICSTEM61137.2024.10560532 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350376913 |
EndPage | 5 |
ExternalDocumentID | 10560532 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i493-d72f39a91626ab47b0d3863708ce378c4c9a140b7cfe8c75e7093335d3822c13 |
IEDL.DBID | RIE |
IngestDate | Wed Jul 03 05:40:33 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i493-d72f39a91626ab47b0d3863708ce378c4c9a140b7cfe8c75e7093335d3822c13 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10560532 |
PublicationCentury | 2000 |
PublicationDate | 2024-April-26 |
PublicationDateYYYYMMDD | 2024-04-26 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-April-26 day: 26 |
PublicationDecade | 2020 |
PublicationTitle | 2024 International Conference on Science Technology Engineering and Management (ICSTEM) |
PublicationTitleAbbrev | ICSTEM |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.9138811 |
Snippet | Data security in cloud environments is a critical concern that increases dependence on cloud services and the persistent threat. The purpose of this paper is... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Advanced Encryption Standard Cloud computing Cloud Environments Code Based Cryptography Communication channels Confidentiality Data Integrity Data protection Data Security Encryption Error correction codes McEliece cryptosystem Public key cryptography Quantum Security QuantumAttacks |
Title | A Robust Approach to Cloud Data Securityusing an Amalgamation of AES and Code-Based Cryptography |
URI | https://ieeexplore.ieee.org/document/10560532 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA1uB_Gk4sTfRPCabk3SpjnWujGFDbETdpv5VRG1HbM96F9v0naKguDtIwQSksPL9-V77wFwkSmusgGlyJcsRFQQH3ElCOJcYxMQnWnuCM6TaTi-pzfzYN6S1WsujDGmbj4zngvrv3xdqMqVyvrOJd45GXRAJxrghqy1Cc5b3cz-dZLOhpPQ9wmziR-m3nr-D-eUGjhG22C6XrLpF3n2qlJ66uOXGuO_97QDet8cPXj7hT67YMPke-AhhneFrN5KGLda4bAsYPJSVBpeiVLAtLWrc-3uj1DkMH51ZI6GvwiLDMbD1A5rmBTaoEsLcTZcvS_LVtm6B9LRcJaMUeuhgJ4oJ0gznBEu7BsQh0JSJgeaRCFhg0gZwiJFFRc2xZJMZSZSLDDMVThIYGdhrHyyD7p5kZsDAKUWggSSiYgKymgmIslqsTMiQp2x4BD03OEslo1IxmJ9Lkd_jB-DLXdH7mMGhyegW64qc2rxvZRn9b1-AlMkpcs |
link.rule.ids | 310,311,786,790,795,796,802,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA06QT2pOPG3Eby2a5u0aY61bmy6DbETdpv5VRG1HbM96F9v0naKguAthISE5PDyffneewBcpIKK1MHYcjkJLMyQa1HBkEWp9JSPZCqpITiPxkH_Hl9P_WlDVq-4MEqpqvhM2aZZ_eXLXJQmVdYxLvHGyWAVrGmgd2hN11oH541yZmcQJ5PuKHBdRHTo52F7OeOHd0oFHb0tMF4uWleMPNtlwW3x8UuP8d-72gbtb5YevP3Cnx2worJd8BDBu5yXbwWMGrVwWOQwfslLCa9YwWDSGNaZgvdHyDIYvRo6R81ghHkKo26iuyWMc6msSw1yurl4nxeNtnUbJL3uJO5bjYuC9YQpsiTxUkSZfgV6AeOYcEeiMEDECYVCJBRYUKaDLE5EqkJBfEVMjgP5epTnCRftgVaWZ2ofQC4ZQz4nLMQME5yykJNK7gyxQKbEPwBtczizeS2TMVuey-Ef_Wdgoz8ZDWfDwfjmCGya-zLfNF5wDFrFolQnGu0Lflrd8SdDfKkh |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+International+Conference+on+Science+Technology+Engineering+and+Management+%28ICSTEM%29&rft.atitle=A+Robust+Approach+to+Cloud+Data+Securityusing+an+Amalgamation+of+AES+and+Code-Based+Cryptography&rft.au=R%2C+Mahesh+Muthulakshmi&rft.au=P%2C+Anithaashri+T.&rft.date=2024-04-26&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICSTEM61137.2024.10560532&rft.externalDocID=10560532 |