Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Novel Approach to Design Hybrid Vigenere Caesar Cipher Encryption with Genetic Algorithm (HVCEGA) for Data Security in Cloud Computing  
  Authors : Sonal Pawar; Dr. K. James Mathai
  Cite as:

 

In present scenario cloud computing is a large pool of easily and accessible virtualized resources, such as hardware, developmentplatforms and software services. Cloud computing is a broad solution that delivers IT as a service. Cloud is an internet based technology which uses theInternet& central remote servers to support data and applications. In cloud computing, the data will be stored in data storage provided by cloud service providers. But still many business companies are not willing to adopt cloud computing technology due to lack of proper security control policy which lead to many vulnerability in cloud computing. Cryptography is mostly used technology to protect data within cloud environment. It is an art and science of hiding existing data from the external environment. It allows information to be sent in a secure form in such a manner that only authorized person is able to retrieve the original information.The paper presentsa secure cloud data encryption technology which encrypts the data using Hybrid Algorithm (Vigenere and Caesar Cipher Encryption Algorithm and Genetic Algorithm- HVCEGA). A hybrid approach of more than one technique is more reliable and strong enough to provide security of data while processing and storage by using secured non-repeatable key (generated by one time pad). Computation time, avalanche effect and throughput are the parameters for which performance has been compared with existing encryption approach. The proposed HVCEGA algorithm provides more security by multi-layer encryption and reduces computation complexity using genetic algorithm.

 

Published In : IJCSN Journal Volume 5, Issue 4

Date of Publication : August 2016

Pages : 699-705

Figures :06

Tables : 02

 

Sonal Pawar : M.Tech. Scholar, Dept. of Computer Engineering &Applications NITTTR, Bhopal, India

Dr. K. James Mathai : Associate Professor, Dept. of Computer Engineering & Applications NITTTR, Bhopal, India

 

 

 

 

 

 

 

WCloud Computing, Cryptography, Hybrid Algorithm, Genetic Algorithm, One Time Pad (OTP), Avalanche Effect

In this paper hybrid algorithm is used for multi-layer encryptions which provide higher security. The main advantages of hybrid algorithm is that multiple encryption algorithm are used which is more secure and it reduces computation complexity by using GA functions. The comparison shows that HVCEGA algorithm reduces the computation time and avalanche effect is high as compare to HVCCE algorithm and also provides better security against brute force attack and data modification attacks. And throughput is increased as compare to the existing HVCCE algorithm. In future the performance of HVCEGA algorithm can be tested in real time environment and a possibility is to use the HVCEGA algorithm for video files in cloud computing for encryption.

 

[1] N. Sengupta and J. Holmes, “Designing of Cryptography Based Security System for Cloud Computing”, In Cloud Ubiquitous Computing Emerging Technologies (Cube), International Conference, 2013. [2] G. Singh “Modified Vigenere Encryption Algorithm and its Hybrid Implementation withBase64 and Aes”, In Advanced Computing, Networking and Security (Adcons), 2nd International Conference On, 2013. [3] K. Sindhuja and S. Pramela Devi, “A Symmetric Key Encryption Technique Using Genetic Algorithm”,Int J ComputSci Inform.Tech., Vol. 5, No. 1, Pp. 414-6, 2014. [4] G. Vijay and A. R. M. Reddy, “An Efficient Security Model in Cloud Computing Based on Soft Computing Techniques”,International Journal of Computer Applications, Vol. 60, No. 14, 2012. [5] William Stallings, “Cryptography and Network Security”, Fourth Edition, Prentice-Hall - Pp.80- 81. [6] Cloud simulator Http://Cloudbus.Org>Cloudsim. [7] Java downloads Www.Netbeans.Org. [8] Kinamik, “The CIA Triad: Have You Thought About Integrity”, Kinamik Data Integrity, 2007. [9] Peter Melland Tim Grance, “The NIST Definition of Cloud Computing”, NIST, 2010. [10] Cloud Computing Principles, Systems and Applications Nick Antonopoulos Http://Mgitech.Wordpress.Com. [11] Cloud Computing Methodology, Systems and Applications Lizhe Wang, Rajiv Ranjan. Http://Www.Unitiv.Com. [12] Ajit Singh, AartiNandal and Swati Malik, “Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security”, International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 12. Pp. 78-82, December 2012. [13] Quist-AphetsiKester, “A Hybrid Cryptosystem Based on Vigenere Cipher and Columnar Transposition Cipher,” Ghana Technology University College, Accra North, Ghana, January 2013. [14] Dr.Fadhil Salman Abed, “A Proposed Method of Information Hiding Based on Hybrid Cryptography and Steganogrpahy”, Ijaiem - Issn 2319 – 4847, Volume 2, Issue 4,april 2013.