Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory

Cloud computing is an advanced trend, which provides access to applications and resources over the internet. In a cloud computing environment, the data is stored on remote servers accessed through the internet. The increasing volume of necessary data brings up more focus on securely storing data. Encryption plays a vital role in security for different types of data. The existing methods encrypt all data using the same key without taking into account the confidentiality level of data, which in turn will increase the encryption time. In this research, a novel encryption algorithm based on chaos theory in the cloud computing environment is developed. The new hybrid cryptography algorithm based on chaotic mapped called (Chaotic NHCP). Chaotic NHCP uses a classification method. The new framework of data encryption operates as follows, Firstly, KNN method is used to classify the data credibility level, and then Fast RSA algorithm and blowfish algorithm are used to encrypt the data to achieve the effect of Fast data encryption. The objects are classified by a maximum value of its neighbours, with the object being assigned to the class with most common among its K-nearest neighbours. Then, the 32-bit plaintext data was split into two 16-bit plaintext data, and the 32-bit ciphertext data was synthesised after encryption by Fast RSA and Blowfish hybrid algorithm, respectively. The proposed method was tested with different encryption algorithms and evaluated according to the encryption time, throughput and power consumption. The experimental results show that the Chaotic NHCP method minimises the encryption time needed to secure data that leads to a suitable confidentiality level required for the data. In addition, it has high throughput and low power consumption along with time-saving. The proposed method has proven the superior in the performance of processing time when compared with other encryption algorithms.

[1]  Omkhar Arasaratnam,et al.  Introduction to Cloud Computing , 2011 .

[2]  S. Balamurali,et al.  Performance Analysis of Classifier Models to Predict Diabetes Mellitus , 2015 .

[3]  V. Suma,et al.  An Efficient Approach to Enhance Data Security in Cloud Using Recursive Blowfish Algorithm , 2014 .

[4]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[5]  Fahd M. Al-Dosari,et al.  A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.

[6]  Ting Peng,et al.  Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing , 2018, Int. J. Netw. Secur..

[7]  Anantha Chandrakasan,et al.  JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.

[8]  S. Manikandan,et al.  Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[9]  Mostafa Belkasmi,et al.  Applying Encryption Algorithm for Data Security in Cloud Storage , 2015, UNet.

[10]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[11]  Khalid M. Hosny,et al.  AN IMPROVED SECURITY SCHEMA FOR MOBILE CLOUD COMPUTING USING HYBRID CRYPTOGRAPHIC ALGORITHMS , 2018 .

[12]  M. Sulochana,et al.  Preserving Data Confidentiality Using Multi-cloud Architecture , 2015 .

[13]  Fatiha Merazka,et al.  Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).

[14]  Anshu Parashar,et al.  Secure User Data in Cloud Computing Using Encryption Algorithms , 2013 .

[15]  Pratap Chandra Mandal,et al.  Superiority of Blowfish Algorithm , 2012 .

[16]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[17]  Alan O. Freier,et al.  Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .

[18]  Deepak H. Sharma,et al.  Homomorphic Encryption for Security of Cloud Data , 2016 .

[19]  Nandita Sengupta,et al.  Contriving Hybrid DESCAST Algorithm for Cloud Security , 2015 .

[20]  Said E. El-Khamy,et al.  Classification of multi-user chirp modulation signals using higher order cumulant features and four types of classifiers , 2011, 2011 28th National Radio Science Conference (NRSC).

[21]  P. Vijaya Bharati,et al.  Data Storage Security in Cloud Using a Functional Encryption Algorithm , 2016 .

[22]  Klaus Hansen,et al.  On the Efficiency of Fast RSA Variants in Modern Mobile Phones , 2010, ArXiv.

[23]  Ashwin Machanavajjhala,et al.  Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.

[24]  Jean-Pierre Deschamps,et al.  Modular Multiplication and Exponentiation Architectures for Fast RSA Cryptosystem Based on Digit Serial Computation , 2011, IEEE Transactions on Industrial Electronics.

[25]  Guangchun Luo,et al.  An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map , 2019, Int. J. Netw. Secur..

[26]  Syam Kumar,et al.  An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing , 2011 .

[27]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[28]  Latha Tamilselvan,et al.  Encryption for Massive Data Storage in Cloud , 2015 .

[29]  Fahad Saeed,et al.  A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[30]  Priyadarshini Patila,et al.  A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .

[31]  Tzonelih Hwang,et al.  On the traceability on RSA-based partially signature with low computation , 2005, Appl. Math. Comput..

[32]  Min-Shiang Hwang,et al.  A Survey of Public Auditing for Secure Data Storage in Cloud Computing , 2016, Int. J. Netw. Secur..

[33]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[34]  Sagar Naik,et al.  Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.

[35]  Dan Dragomir,et al.  Measuring the performance and energy consumption of AES in wireless sensor networks , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).

[36]  Zhengquan Xu,et al.  A secure re‐encryption scheme for data services in a cloud computing environment , 2015, Concurr. Comput. Pract. Exp..

[37]  L. Chua,et al.  Chaos: A tutorial for engineers , 1987, Proceedings of the IEEE.

[38]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .

[39]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[40]  Jaime Raigoza,et al.  Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[41]  Subhadra Sahoo,et al.  An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption , 2015 .

[42]  Tiegang Gao,et al.  Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion , 2019, Int. J. Netw. Secur..

[43]  Anil Kumar,et al.  Overview of Information Security Using Genetic Algorithm and Chaos , 2009, Inf. Secur. J. A Glob. Perspect..

[44]  André L. M. dos Santos,et al.  Implementation of fast RSA key generation on smart cards , 2002, SAC '02.

[45]  Mohey M. Hadhoud,et al.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..

[46]  Guangchun Luo,et al.  A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map , 2018, Int. J. Netw. Secur..

[47]  Abdellah Ezzati,et al.  Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing , 2017, EUSPN/ICTH.

[48]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[49]  Sushil Kumar Saroj,et al.  A New Security Framework for Cloud Data , 2018 .