This document proposes and compares two encryption algorithms, triple data encryption standard (3DES) and Rivest Shamir Adlemen (3kRSA), for securing data in cloud computing. The algorithms are implemented on the cloud operating system EyeOS. A comparative study finds that 3kRSA outperforms 3DES in complexity and output bytes, while 3DES is faster. Both algorithms encrypt data to provide confidentiality and integrity for data stored and transmitted over the insecure cloud environment. The document provides background on cloud security, the two algorithms, and the experimental setup using EyeOS for evaluation.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
"The paper introduces confidential computing approaches focused on protecting hierarchical data within
edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and
the range of networks near the endpoint devices. The proposed solutions allow data in this two-level
hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the
remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution
environment. Hierarchical data for each network device are linked and identified through distinct paths
between edge and main cloud using individual blockchain. Methods for data and cryptographic key
splitting between the edge and the main cloud are based on strong authentication techniques ensuring the
shared data confidentiality, integrity and availability.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Cloud data security and various cryptographic algorithms IJECEIAES
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
In general, the Cloud computing utilization becomes unavoidable in each and every data
communication as well as the service sharing center with various applications. Based on the requirements, the
clients are performing service selection (such as infrastructure, software or platforms) towards to fulfil their
needs in optimized manner. Whenever the data is going to be stored in a third party network, it automatically
brings a question mark for secure access along with its storage infrastructure. The security for data transaction
between cloud service providers and cloud clients is forever carry with the help of crypto graphic algorithms
either it may be an symmetric or asymmetric key generation mechanism with certain limitations . In this
research paper implement a new approach for ensure the secure data transaction by using Orthogonal
Handshaking Authentication Mechanism under cloud along with a proposed storage authentication protocol. It
creates a roadmap for data retrieval progress of authenticated cloud users among the service access in cloud
computing. Data on Cloud storage will get an encrypted format by using a symmetric key helps to maintain its
security and authentication will provide the cloud data utilization with appropriate cloud users.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
In the past decade, big technical advances have appeared which can bring more comfort not only in the corporate sector but at the personal level of everyday life activities. The growth and deployment of cloud computing technologies by either private or public sectors were important. Recently it became apparent to many organizations and businesses that their workloads were moved to the cloud. However, protection for cloud providers focused on Internet connectivity is a major problem, leaving it vulnerable to numerous attacks. Although cloud storage protection mechanisms are being introduced in recent years. However, cloud protection remains a major concern. This survey paper tackles this problem by recent technology that enables confidentiality conscious outsourcing of the data to public cloud storage and analysis of sensitive data. In specific, as an advancement, we explore outsourced data strategies focused on data splitting, anonymization and cryptographic methods. We then compare these approaches for operations assisted by accuracy, overheads, masked outsourced data and data processing implications. Finally, we recognize excellent solutions to these cloud security issues.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
"The paper introduces confidential computing approaches focused on protecting hierarchical data within
edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and
the range of networks near the endpoint devices. The proposed solutions allow data in this two-level
hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the
remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution
environment. Hierarchical data for each network device are linked and identified through distinct paths
between edge and main cloud using individual blockchain. Methods for data and cryptographic key
splitting between the edge and the main cloud are based on strong authentication techniques ensuring the
shared data confidentiality, integrity and availability.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Cloud data security and various cryptographic algorithms IJECEIAES
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
In general, the Cloud computing utilization becomes unavoidable in each and every data
communication as well as the service sharing center with various applications. Based on the requirements, the
clients are performing service selection (such as infrastructure, software or platforms) towards to fulfil their
needs in optimized manner. Whenever the data is going to be stored in a third party network, it automatically
brings a question mark for secure access along with its storage infrastructure. The security for data transaction
between cloud service providers and cloud clients is forever carry with the help of crypto graphic algorithms
either it may be an symmetric or asymmetric key generation mechanism with certain limitations . In this
research paper implement a new approach for ensure the secure data transaction by using Orthogonal
Handshaking Authentication Mechanism under cloud along with a proposed storage authentication protocol. It
creates a roadmap for data retrieval progress of authenticated cloud users among the service access in cloud
computing. Data on Cloud storage will get an encrypted format by using a symmetric key helps to maintain its
security and authentication will provide the cloud data utilization with appropriate cloud users.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
In the past decade, big technical advances have appeared which can bring more comfort not only in the corporate sector but at the personal level of everyday life activities. The growth and deployment of cloud computing technologies by either private or public sectors were important. Recently it became apparent to many organizations and businesses that their workloads were moved to the cloud. However, protection for cloud providers focused on Internet connectivity is a major problem, leaving it vulnerable to numerous attacks. Although cloud storage protection mechanisms are being introduced in recent years. However, cloud protection remains a major concern. This survey paper tackles this problem by recent technology that enables confidentiality conscious outsourcing of the data to public cloud storage and analysis of sensitive data. In specific, as an advancement, we explore outsourced data strategies focused on data splitting, anonymization and cryptographic methods. We then compare these approaches for operations assisted by accuracy, overheads, masked outsourced data and data processing implications. Finally, we recognize excellent solutions to these cloud security issues.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Similar to Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 6, December 2022, pp. 6496~6505
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i6.pp6496-6505 6496
Journal homepage: http://ijece.iaescore.com
Proposed system for data security in distributed computing in
using triple data encryption standard and Rivest Shamir
Adlemen
Shihab A. Shawkat1
, Bilal A. Tuama2
, Israa Al_Barazanchi3,4
1
Department of Quality Assurance and Academic Performance, University of Samarra, Samarra, Iraq
2
Department of Pathological Analysis, College of Applied Sciences, Samarra University, Samarra, Iraq
3
College of Computing and Informatics, Tenaga Nasional University, Kajang, Malaysia
4
Computer Techniques Engineering Department, Baghdad College of Economic Sciences University, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Sep 20, 2021
Revised Jun 21, 2022
Accepted Jul 18, 2022
Cloud computing is considered a distributed computing paradigm in which
resources are provided as services. In cloud computing, the applications do
not run from a user’s personal computer but are run and stored on distributed
servers on the Internet. The resources of the cloud infrastructures are shared
on cloud computing on the Internet in the open environment. This increases
the security problems in security such as data confidentiality, data integrity
and data availability, so the solution of such problems are conducted by
adopting data encryption is very important for securing users data. In this
paper, a comparative study is done between the two security algorithms on a
cloud platform called eyeOS. From the comparative study it was found that
the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data
encryption standard (3DES) algorithm with respect to the complexity, and
output bytes. The main drawback of the 3kRSA algorithm is its computation
time, while 3DES is faster than that 3kRSA. This is useful for storing large
amounts of data used in the cloud computing, the key distribution and
authentication of the asymmetric encryption, speed, data integrity and data
confidentiality of the symmetric encryption are also important also it enables
to execute required computations on this encrypted data.
Keywords:
3kRSA algorithm
Cloud security
Information security
Triple data encryption standard
algorithm
This is an open access article under the CC BY-SA license.
Corresponding Author:
Shihab A. Shawkat
Department of Quality Assurance and Academic Performance, University of Samarra
Samarra, Iraq
Email: shahab84ahmed@gmail.com
1. INTRODUCTION
The distributed computing has quickly arisen as an acknowledged figuring worldview in which the
resources of the registering frameworks are given as administrations of the web cloud processing is a hot
examination region in the scholarly community, the development of distributed computing, equal processing
and lattice figuring. Because of the consequences of such hybrid evolution, the applications can be expanded
by means of the web security in the cloud computing [1]. Distributed computing shares disseminated assets
in the open climate through the organization, so it makes security issues. Likewise, when the information is
in plaintext, it is helpless against different sorts of assaults, on different words, the distributed computing is
possible experiencing a number of known weaknesses, empowering aggressors to either get figuring
administrations for nothing or take data from cloud clients. In the world of processing, security and
protection issues are significant concern and the cloud computing is no exemption for these issues.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed system for data security in distributed computing in using … (Shihab A. Shawkat)
6497
Cryptographic instruments applied to information offer the best answer for information insurance.
Information ought to be scrambled locally preceding uploading to the cloud, and that information proprietor
holds the encryption keys. The objective of encoded stockpiling in the cloud is to make a virtual stockpiling
framework that maintains the cryptography objectives which are: confidentiality ,information uprightness on
the other words, the encryption calculations were utilized to secure the information so it cannot be perused by
a third-party while on the way [2], [3]. The main scholastic utilization of the cloud computing has all the
earmarks of being who initially characterized it as a figuring worldview where the limits of processing will
be controlled by monetary reasoning as opposed as far as possible definition for the cloud computing as:
“A way of computing in which versatile and flexible IT-empowered capacities are conveyed as a support of
outside clients utilizing Internet innovations” or “A normalized IT ability (administrations, programming, or
framework) conveyed through internet advances in a compensation for every utilization, self-administration
way” [4], [5]. Distributed computing is a model to empower on-request network admittance to a typical
arrangement of the most configurable distributed computing assets (workers, organizations, administrations,
stockpiling, and applications). The cloud model comprises of (five-fundamental provisions, three
administration models and four-sending models) [6], [7]. Distributed computing has seen the improvement of
innovations and business strategies that have arisen over the previous years. The fundamental squares range
through (web innovation to cloud specialist organizations), as displayed plainly in Figure 1 [8].
Figure 1. The main blocks of internet technology available to cloud service providers
The distributed computing separates itself from other registering standards like lattice processing,
worldwide figuring, internet figuring in the different perspectives, for example, on-demand service provision,
user centric interfaces, ensured quality of service (QoS), autonomous system [9], [10]. The distributed
computing conveyance models, arrangement models, characterizing characteristic, assets, and association of
the foundation examined in this part. There are three cloud conveyance models: software-as-a-service (SaaS),
platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS), sent as open, private, local area, and half
and half clouds. The parts of distributed computing are displayed in Figure 2 [11].
When settling on choices to take on cloud administrations, protection or security has consistently
been a significant issue. To manage these issues, the cloud supplier should develop adequate controls to give
such degree of safety than the association would have if the cloud was not utilized. It is discovered that
security positioned first as the best test of distributed computing that ensure classification and credibility over
an uncertain correspondence channel. The eyeOS is picked due to its components are: cloud based, easy-to-
utilize interface, collaboration, compatibility ensured and flexibility [12], [13]. Rest of this paper is
coordinated: section 2 presents the scientific classification dependent on foundation and related work in the
concerned exploration region, section 3 verbalizes the key ideas proposed work, section 4 presents the
outcomes and conversations, and section 5 presents end and future work.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6496-6505
6498
Figure 2. The cloud computing
2. BACKGROUND AND RELATED WORK
There are various studies done to compare the performance of these algorithms based on multiple
parameters; some of which are related to encryption and decryption. Users need to keep their information
safe and secure while in storage and/or transmission. The service providers ensure security through data
encryption and decryption. There are a variety of encryption and decryption algorithms to protect the data.
This section is categorized into four sub sections presenting a brief background of the main topics used in this
paper through shedding light on a number of related works in the area of text document classification. This
section reviews the literature in cryptography algorithms.
2.1. Cloud computing security
Cloud computing has become a known and important thing nowadays. However, privacy and
security remain a powerful barrier of problems for users for the purpose of adapting to cloud computing
systems. Note that these fears are not enough, and we must also add more in terms of five aspects (such as
confidentiality, availability, data integrity, control and review) to avoid security problems. Cryptography is a
technique used to make secure correspondence by controlling sent messages during the correspondence
happened so just expected party that can know the substance of that message. The absolute most ordinarily
utilized cryptography strategies to secure sent messages, particularly as message [14], [15]. Normal strategies
for ensuring client information incorporate encryption before capacity, client validation methods preceding
capacity or recovery, and building secure channels for information transmission. Normal information
encryption strategies incorporate symmetric and symmetric. This sort of encryption and unscrambling
measure utilizes a mysterious key. Awry cryptography, then again, utilizes two distinctive keys: a “public
key” for encryption and a “private key” for decoding. Symmetric cryptography is more effective, and is
reasonable for scrambling enormous volumes of information. Uneven cryptography requires more calculation
time and is utilized for the decoding keys which are needed for symmetric cryptography [16].
2.1.1. Triple data encryption standard (3DES)
3DES was made in light of the fact that DES calculation, concocted in the mid-1970s utilizing
56-bit key. 3DES gives powerful security to me just 112-bits because of the midterm assaults it gets in the
center. 3DES runs multiple times more slowly than DES, yet is considered more secure whenever utilized
effectively. The unscrambling methodology is exactly the same thing as the decoding system; however then
again, actually it is acted the other way. In information encryption and unscrambling (DES) is done in 64-bit
segments as the info key length of DES is 64-bit and the actual key that DES utilizes is just 56-bit genuine
length [17]. The most un-significant bit (extreme solidly) in every bite is the equality of the pieces, it should
be worked out and there must consistently be an odd number of 1 s in every byte and these equality pieces
are overlooked, so the utilization of the seven most significant pieces is just per bit, which prompts be 56-bits
in length. This demonstrates that the force of the compelling key for 3DES is really 168-bits in light of the
fact that every one of the three keys has 8 equality bits that are not utilized during the necessary encryption
measure [18], [19]. 3DES encryption measure block graph is displayed in Figure 3.
New block cipher algorithm. The main principles of 3DES algorithm are [20]: i) 3DES uses a “Key
Package” consisting of three keys (K1, K2, and K3) for every 56-bit; ii) the coding equation is Cipher-
text=EK3 (Dk2 (Ek1 (plain text))), DES encoding using “K1”, decoding DES using “K2”, and then encoding
DES using “K3”; and iii) the decoding equation is Plaintext=DK1 (Ek2 (Dk3 (Cipher text))), which will be
4. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed system for data security in distributed computing in using … (Shihab A. Shawkat)
6499
decoded using K3, encoded using K2, and then decoded using K). It enjoys the benefit of each triple
encoding that scrambles one square of 64-pieces of information. In every exemplification, the center cycle is
rather than the first and last, which works on the strength of the calculation when utilizing the lock choice 2,
and gives the contrary similarity the DES with the lock alternative 3. The principles characterize three
fundamental keying choices:
− Main keying alternatives 1: all three keys are separate,
− Main keying alternatives 2: (K1 and K2) are free and (K3=K1),
− Main keying alternatives 3: all 3 keys are indistinguishable (K1=K2=K3).
Figure 3. Flowchart of 3DES encryption and decryption algorithm
2.1.2. Rivest Shamir Adlemen
The calculation was created by Rivest, Shamir and Adlemen in 1977. It is a public key calculation
since it utilizes two keys one to encode and other to unscramble the message. Public key is utilized by the
sender to the private key (simply known to beneficiary) is utilized by the recipient to unscramble the
message. This private key, as the name proposes is known distinctly to the recipient. The RSA comprises of
some numerical tasks through which it can work out the encryption and unscrambling keys (R and T), after
that one can without much of a stretch compute the code text and the plain text by the accompanying formula
[21]:
𝐶 = 𝑀𝑅 mod (𝑛) (1)
𝑃 = 𝑀𝑇 mod (𝑛) (2)
where R and T are public and private keys and n is a worth acquired from numerical activities in RSA. To
complete execution investigation RSA was altered. 3kRSA is a protected algorithm, a third key was proposed
to be added to the RSA algorithm was proposed to twofold the security of the calculation. The RSA has been
utilized in different applications like in e-com which guarantee message trustworthiness, security;
verification and non-disavowal [22]. There are two types of encryption algorithms, symmetric and
asymmetric now see Table 1 represents the comparison among 3DES and RSA algorithms.
Table 1. Comparison among 3DES and RSA [21], [22]
Factors 3DES RSA
Cipher type Symmetric block cipher A symmetric block cipher
Security rate One only weak which is exit in DES Good
Key length (kl, k2 and k3)168 bits
(kl=k2) 112 bits
Based on No of bit in N=p*q
Rounds 48 Based on key length
Block Size 64 bits variance
Execution time Slow Slow
2.2. EyeOS
Is one of the most used web operating system which only needs (Apache, PHP5, and (MySQL) to be
installed, with eyeOS the user can build his private cloud desktop. Using eyeOS web runner the user can
open his eyeOS files from his browser with his local applications and save them automatically on his Cloud.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6496-6505
6500
Is free and open-source cloud OS software that can be installed on any Web server. It provides an interface
that is similar to that of a Linux distribution, Therefore, eyeOS can be accessed from anywhere, and view,
edit, share all of our documents that are stored remotely, by using the web applications available. The user
can work collaboratively with other users simultaneously in the same document. The eyeOS can be hosted as
a private cloud [23], [24]. The eyeOS will be used as a private platform to implement and evaluate our
proposed encryption algorithms. According to the displayed screen see Figure 4, we will be able to login to
our cloud OS [25].
Figure 4. The login of eyeOS
3. PROPOSED METHOD
The symmetric encryption algorithm called 3DES and the asymmetric encryption 3kRSA algorithm
has been applied has been implemented on a cloud operating system (EyeOS) as cloud platform Also, a
comparative study between 3DES and 3kRSA has been done. The similar outcomes tracked down that the
3kRSA calculation beats the calculation as for the intricacy, and yield bytes. The principal disadvantage of
the 3kRSA calculation is its calculation time and algorithms will be executed to scramble the information in
the distributed computing environment. According to the work in this paper, the eyeOS will be used as a
private platform to implement and evaluate our proposed encryption algorithm. The 3DES is used rather than
the others because of its effectiveness. The DES calculation plays out a great deal of bit handling in stages
called “trade” switches in every one of the 16 rounds. DES calculation encodes information in 64-bit block
size and uses successfully a 56-bit key. 3DES calculation is a development of applying DES three times in
grouping. The 3DES calculation have three diverse keys (Kl, K2 and K3) has viable key length is 168-bits
(The utilization of three particular keys is suggested of 3DES).
3.1. Experiment environment
The cloud operating system (CloudOS) an operating system designed to operate within cloud
computing and virtualization environments. A cloud operating system manages the operation, execution and
processes of virtual machines, virtual servers and virtual infrastructure, as well as the back-end hardware and
software resources. A cloud operating system primarily manages the operation of one or more virtual
machines within a virtualized environment. Depending on the virtual environment and cloud services in use,
the functionality of cloud operating systems varies. Cloud operating system developed to be used within a
computing-specific environment will manage the processes and threads of a single or cluster of virtual
machines and servers.
3.2. Encryption plaintext
In the first place, the 3DES and 3kRSA calculation packed the sender’s plaintext report to lessen its
size and fortifying its cryptographic security. The calculation made a key and afterward the meeting key is
handled utilizing symmetric encryption calculation 3DES or 3kRSA which creates a mysterious key, the
meeting key is utilized by encryption calculation to scramble the plaintext; the outcome is cipher-text. The
6. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed system for data security in distributed computing in using … (Shihab A. Shawkat)
6501
meeting key is scrambled to the beneficiary’s public key, utilizing encryption 3DES and 3kRSA. This public
key-scrambled meeting key is communicated alongside the cipher-text to the beneficiary. The encryption
algorithm is explained in more detail it as shown in Figure 5: i) create the session key, ii) compress the
plaintext with Zip compression algorithm, iii) encrypt the plaintext with session key using 3DES and 3kRSA
algorithm to produce cipher text, iv) the result is a single package combined from cipher text and encrypted
session key that is transmitted to the receiver, v) The key generation (3KRSA) takes places:
− Two of the indivisible numbers are picked including p, q and r. Modulus by sub 2 can be determined
utilizing these numbers, for example, n=p*q*2.
− While being the public type, the third number e which cannot partition similarly is chosen. It shows prime
pertinence to result of (p-1), (q-1), (r-1).
− The whole number d is a private type which can be determined from quotient ((ed-1))/((p-1) (q-1) (r-1)).
− The n and e are number pair of public keys. However, these are publically recognized qualities yet
bumbling for the assurance of d from e and n in any event, when q and p are sufficiently incredible.
− The figure message C is delivered through a public key for the production of scrambled message M. For
this reason, condition C=Me
Mod n is utilized.
− The ideal code text is decoded by recipient while using private key and condition M=Cd
Mod n.
Figure 5. Flowchart of 3DES and 3kRSA encryption
3.3. Decryption cipher texts
The decryption phase is done in the reverse way of the encryption process. The recipient’s copy of
the proposed 3DES and 3kRSA algorithm uses his or her private key to recover the session key, and then the
algorithm uses the session key to decrypt the encrypted cipher-text. The decryption algorithm is explained in
more detail it as shown in Figure 6: i) decrypt the encrypted session key with private key of receiver using
3DES and 3kRSA decryption algorithm and ii) after the sent message the recipient will trail the steps given:
i) private key d and n is used for the computation M=Cd
Mod n, ii) the integer descriptive M is extracted for
plain text, and iii) decompress the decrypted text.
In this exploration, executed every one of the procedures are helpful for ongoing encryption. Every
procedure is exceptional in its own way, which may be reasonable for various applications and has its own
genius’ and con’s. According to explore in this exploration, executed every one of the procedures are
valuable for ongoing encryption. Every strategy is interesting in its own way, which may be appropriate for
various applications and has its own genius’ and con’s according to investigate.
Figure 6. Flowchart of 3DES and 3kRSA decryption
4. RESULTS AND DISCUSSION
In this a comparative study between encryption algorithms 3DES and 3kRSA is done and
implemented on the two types of the encryption algorithms have been implemented 3DES, and 3kRSA on the
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6496-6505
6502
eyeOS it is a private-cloud application stage with an electronic work area interface. Normally it is known as a
cloud work area on account of its interesting graphical user interface (GUI). The interface was snappy
“moving and switching apps”, flawless. It is easy to upload and download files. The encryption processes
have been done on the client side, so no passwords or content are transferred to the server. Sensitive data is
saved into the eyeOS directories. According to 3DES and 3kRSA implementation, the performance of these
symmetric encryption algorithms has been compared by encrypting input files with varying contents and
sizes. The performance parameters and the performance evaluation of the proposed encryption algorithm are
discussed, according to the comparative study results cloud OS. The performance parameters and the
performance evaluation of the proposed encryption algorithm are discussed.
4.1. The simulator environment
EyeOS It is a private-cloud application stage with an electronic work area interface. Normally it is
known as a cloud work area on account of its interesting UI. eyeOS conveys an entire work area from the
cloud with document the executives, individual administration data instruments, and shared apparatuses and
with the combination of the customer’s applications. A standard WAMP/LAMP worker was utilized to
introduce eyeOS, and code applications in PHP. That more applications will be available for the EyeOS
platform in the long run eyeOS has a very interesting interface. The interface was snappy “moving and
switching apps”, flawless. It is easy to upload and download files.
4.2. The evaluating parameters
The performance of encryption algorithm is evaluated by considering the following parameters: i)
computation time is the time that an encryption algorithm takes to produce a cipher-text from a plain text in
case of encryption, also the time to produce plaintext from cipher-text in case of decryption; ii) output bytes
is calculated by the size of output byte of cipher-text that is transformed from plaintext for each algorithm;
and iii) time complexity used for the purpose of calculating the throughput of a cipher system and also
indicates the speed of the cipher. The throughput of the coding scheme (TE) is calculated by dividing the
total plain text in encrypted (megabytes) by the total output of the coding time and for each algorithm. Here,
the higher the throughput, the higher the energy consumption of this coding technology.
TE=Tp/Et (3)
Where Tp is total plain text (bytes), Et is encryption time (second). The time complexity of an algorithm
quantifies the amount of time taken by an algorithm to run as a function of the length of the string
representing the input.
4.3. Comparative study between 3DES and 3kRSA
First, the two types of the encryption algorithms have been implemented 3DES, and 3kRSA on the
eyeOS. The encryption processes have been done on the client side, so no passwords or content are
transferred to the server. Sensitive data is saved into the eyeOS directories. According to 3DES and 3kRSA
implementation, the performance of these symmetric encryption algorithms has been compared by encrypting
input files with varying contents and sizes (16.194, 24.933, 39.852, 44.904, 62.694, 71.395, 115.166,
135.065, 154.962, and 165.294 bytes). Table 2 represents the results of such experiments. According to the
results of the comparative study, 3kRSA algorithm was found to outperform 3DES in encryption and
decryption, it takes more time. According to the comparative study results, it is found that 3DES algorithm
outperforms 3kRSA in terms of computation time by 56% but it is not outperformed by the level of
encryption. The experimental results of implementing 3DES and 3kRSA algorithms are depicted in Figure 7.
Table 2. Comparative encryption time (milliseconds) of 3DES, and 3kRSA
No. Input size Time for 3DES Time for 3kRSA Percentage with respect to 3kRSA
1 16.194 18 45 52%
2 24.933 20 65 38%
3 39.852 28 75 42%
4 44.904 40 85 48%
5 62.694 48 95 52%
6 71.395 65 115 52%
7 115.166 68 125 50%
8 135.065 87 165 51%
9 154.962 89 185 53%
10 165.294 94 195 56%
8. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed system for data security in distributed computing in using … (Shihab A. Shawkat)
6503
Figure 7. Encryption time of encryption algorithms 3DES, and 3kRSA
4.4. The comparative results
The security issues are a major issue for distributed computing advancement. To safeguard the
protection of his information, the client should scramble information prior to being shipped off the cloud.
Distributed computing security dependent on encryption, thought about productive plan to get information in
distributed computing. This section describes the comparative results obtained after implementing the 3DES
and 3kRSA encryption algorithms. The algorithms are implemented on cloud platform (eyeOS). It takes data
input of size (25, 38, 66, 79, and 92 bytes). The algorithms are compared with each other using a set of
parameters like computation time, output bytes and time complexity. Table 3 represents the computation time
taken (encryption and decryption) and output bytes in the 3DES and 3kRSA algorithms respectively.
From Figure 8 which represents the computation time and output bytes of the two algorithms, it is
noticed that 3kRSA consumes more time than 3DES. Output bytes in 3kRSA encryption are more than those
bytes in 3DES encryption. 3DES algorithm is executed faster and with more throughput level as compared to
the 3kRSA algorithm but 3kRSA is more Security efficiency algorithm than 3DES.
Table 3. Time taken (encryption and decryption) and output bytes in 3DES and 3kRSA algorithms
No. Input Data
Size(bytes)
Encryption Decryption Output bytes
Computation
Time in 3DES
Computation
Time in 3kRSA
Computation
Time in 3DES
Computation
Time in 3kRSA
In 3DES In 3kRSA
1 25 8 10 4 35 36 65
2 38 4 8 6 51 52 97
3 66 15 35 17 75 92 161
4 79 20 43 22 88 115 180
5 92 28 49 25 102 140 195
Figure 8. Computation time taken (encryption and decryption) and output bytes in 3DES and 3kRSA
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6496-6505
6504
5. CONCLUSION AND FUTURE WORK
The security issues are a major issue for distributed computing advancement. To protect the security
of his information, the client should scramble information prior to being shipped off the cloud. Distributed
computing security dependent on encryption, thought about effective plan to get information in distributed
computing. This paper examined a portion of the current encryption plots and talked about the utilization of
the most effective one, to get distributed computing information. Future work will focus on implementation
and development of a method for data encryption that is important in the field of technology, where the
principles of physics and quantum theories can be applied in place of mathematical equations in encoding
and re-decoding data, since the “Q bit” units on which quantum physical theories depend are more capable
and efficient in coding than the “Bit” units that depend on them. Mathematical equations, which in turn
works to develop the results of actual use cases for the purpose of publishing them in all services
(governmental, banking, military and security) to setup a more secure environment for data storage and
retrieval.
REFERENCES
[1] S. Rani and A. Gangal, “Cloud security with encryption using hybrid algorithm and secured endpoints,” International journal of
computer science and information technologies, vol. 3, pp. 4302–4304, 2012.
[2] R. Buyya, “Cloud computing: the next revolution in information technology,” in 2010 First International Conference On
Parallel, Distributed and Grid Computing (PDGC 2010), Oct. 2010, pp. 2–3, doi: 10.1109/PDGC.2010.5679963.
[3] P. Guo, L. Ning, L. Su, and L. Bu, “A new strategy of resource management for cloud computing,” Information Technology
Journal, vol. 12, no. 17, pp. 3964–3969, Aug. 2013, doi: 10.3923/itj.2013.3964.3969.
[4] S. Pearson, “Privacy, security and trust in cloud computing,” in Computer Communications and Networks, Springer London,
2013, pp. 3–42, doi: 10.1007/978-1-4471-4189-1_1.
[5] J. W. Rittinghouse and J. F. Ransome, Cloud computing. CRC Press, 2017., doi: 10.1201/9781439806814.
[6] A. Nayyar, Handbook of cloud computing: basic to advance research on the concepts and design of cloud computing, BPB
Publications, 2019.
[7] A. Hameed et al., “A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems,”
Computing, vol. 98, no. 7, pp. 751–774, Jul. 2016, doi: 10.1007/s00607-014-0407-8.
[8] R. L. Krutz and R. D. Vines, Cloud security: A comprehensive guide to secure cloud computing, Wiley Publishing, 2010.
[9] S. S. Manvi and G. Krishna Shyam, “Resource management for infrastructure as a service (IaaS) in cloud computing: A survey,”
Journal of Network and Computer Applications, vol. 41, pp. 424–440, May 2014, doi: 10.1016/j.jnca.2013.10.004.
[10] A. Shawish and M. Salama, “Cloud computing: paradigms and technologies,” in Inter-cooperative Collective Intelligence:
Techniques and Applications, Springer Berlin Heidelberg, 2014, pp. 39–67, doi: 10.1007/978-3-642-35016-0_2.
[11] M. B. C and K. B. Ramesh, “Novel holistic architecture for analytical operation on sensory data relayed as cloud services,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 4322–4330, Aug. 2020, doi:
10.11591/ijece.v10i4.pp4322-4330.
[12] R. L. Grossman, “The case for cloud computing,” IT Professional, vol. 11, no. 2, pp. 23–27, Mar. 2009, doi:
10.1109/MITP.2009.40.
[13] R. F. Abdel-Kader, S. H. El-sherif, and R. Y. Rizk, “Efficient two-stage cryptography scheme for secure distributed data storage
in cloud computing,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 3, pp. 3295–3306, Jun.
2020, doi: 10.11591/ijece.v10i3.pp3295-3306.
[14] S. Shawkat, O. Abu-Elnasr, and T. Elarif, “Evolved algorithm to secure communication with steganography,” International
Journal of Intelligent Computing and Information Science (IJICIS), vol. 17, no. 1, pp. 1–17, 2017.
[15] B. Bordel, R. Alcarria, T. Robles, and D. Martín, “Cyber-physical systems: Extending pervasive sensing from control theory to
the internet of things,” Pervasive and Mobile Computing, vol. 40, pp. 156–184, Sep. 2017, doi: 10.1016/j.pmcj.2017.06.011.
[16] S. Keelveedhi, M. Bellare, and T. Ristenpart, “DupLESS: Server-aided encryption for deduplicated storage,” in 22nd USENIX
security symposium (USENIX security 13), 2013, pp. 179–194.
[17] A. Gahan and G. D. Devanagavi, “A empirical study of security issues in encryption techniques,” International Journal of
Applied Engineering Research, vol. 14, no. 5, pp. 1049–1061, 2019.
[18] P. Kumar and N. Rajaanadan, “Data encryption and decryption using by triple DES performance efficiency analysis of
cryptosystem,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 3,
pp. 4030–4040, 2016.
[19] S. A. Shawkat and R. N. Ismail, “Biometric technologies in recognition systems: a survey,” Tikrit Journal of Pure Science,
vol. 24, no. 6, Nov. 2019, doi: 10.25130/j.v24i6.899.
[20] I. Al_Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. Lateef Al-badri, “Modified RSA-based algorithm: a double secure
approach,” Telecommunication Computing Electronics and Control (TELKOMNIKA), vol. 17, no. 6, pp. 2818–2825, Dec. 2019,
doi: 10.12928/telkomnika.v17i6.13201.
[21] S. H. Alibadi and S. B. Sadkhan, “A proposed security evaluation method for bluetooth E0 based on fuzzy logic,” in 2018
International Conference on Advanced Science and Engineering (ICOASE), Oct. 2018, pp. 324–329, doi:
10.1109/ICOASE.2018.8548918.
[22] S. A. Shawkat, “Enhancing steganography techniques in digital images,” Faculty of Computers and Information, Mansoura
University Egypt-2016, 2007.
[23] D. G. Chandra and D. B. Malaya, “A study on cloud OS,” in 2012 International Conference on Communication Systems and
Network Technologies, May 2012, pp. 692–697, doi: 10.1109/CSNT.2012.154.
[24] R. VidyaBanu, J. Preethi, and N. Dinesh, “Implementation of financial system using eyeOS in the cloud environment,” in 2011
International Conference on Recent Trends in Information Technology (ICRTIT), Jun. 2011, pp. 656–660, doi:
10.1109/ICRTIT.2011.5972380.
[25] B. P. Rimal, A. Jukan, D. Katsaros, and Y. Goeleven, “Architectural requirements for cloud computing systems: an enterprise
cloud approach,” Journal of Grid Computing, vol. 9, no. 1, pp. 3–26, Mar. 2011, doi: 10.1007/s10723-010-9171-y.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed system for data security in distributed computing in using … (Shihab A. Shawkat)
6505
BIOGRAPHIES OF AUTHORS
Shihab A. Shawkat received the B.Sc. degree in Computer Science from
University of Tikrit in 2007 and M.Sc. Degree in Computer Science from Mansoura University
in 2017. Mr. Shihab A. Shawkat worked as a teacher during the period from 2008 to 2019 in
Directorate of Education in Salah Al-Din, Ministry of Education, Iraq. He has recently started
working at the University of Samarra at the end of 2019 till now. His research interest lies in
computer science, information security, image processing and AI. He can be contacted at
email: shahab84ahmed@gmail.com.
Bilal A. Tuama M.Sc. computer science, University of Science USM (Malaysia).
He is a Lecturer at the University of Samarra, College of Applied Sciences. His research
interests include pattern recognition, software analysis, and design patterns. He can be
contacted at email: Bilal.at@uosamarra.edu.iq.
Israa Al_Barazanchi received her Bachelor of Computer Science (BCS) from
Department of Computer Science, Baghdad college of economic science university-Iraq-
Baghdad in June 2002. In January 2010, she entered the master’s program at the Faculty of
Information and Communication Technology, Graduate School of Computer Science
(Internetworking Technology), Universiti Teknikal Malaysia. She is Currently a student
Doctor of Philosophy in Information and Communication Technology. She is a lecturer in
Computer Engineering Techniques Department. Editor-in-chief for international union of
universities journal. Member of editor board in many Scopus journals for computer science
field. Head of researcher group. Member in many conferences panel and communications
events. She is a Reviewer of various high impact factor journals. Her research activities are:
WBAN, WSN, WiMAX, WiFi on vehicular ad-hoc networks (VANETs), communications,
networking, signal processing, IoT, smart systems, and blockchain. She can be contacted at
email: israa.albarazanchi@baghdadcollege.edu.iq; israa44444@gmail.com.