Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm  

在线阅读下载全文

作  者:Ch.Chakradhara Rao Tryambak Hiwarkar B.Santhosh Kumar 

机构地区:[1]CSE Department,Sri Satya Sai University of Technology and Medical Sciences,Sehore,India [2]CSE Department,Guru Nanak Institute of Technology,Telangana,India

出  处:《Journal of Control and Decision》2023年第4期494-503,共10页控制与决策学报(英文)

摘  要:Because of its on-demand servicing and scalability features in cloud computing,security and confidentiality have converted to key concerns.Maintaining transaction information on thirdparty servers carries significant dangers so that malicious individuals trying for illegal access to information data security architecture.This research proposes a security-aware information transfer in the cloud-based on the blowfish algorithm(BFA)to address the issue.The user is verified initially with the identification and separate the imported data using pattern matching technique.Further,BFA is utilised to encrypt and save the data in cloud.This can safeguard the data and streamline the proof so that client cannot retrieve the information without identification which makes the environment secure.The suggested approach’s performance is evaluated using several metrics,including encryption time,decryption time,memory utilisation,and runtime.Compared to the existing methodology,the investigational findings clearly show that the method takes the least time to data encryption.

关 键 词:Blowfish algorithm cloud environment data encryption spotted hyena optimisation algorithm user authentication 

分 类 号:TP39[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象