AN ENHANCED SOFTWARE AS A SERVICE (SAAS) ARCHITECTURAL MODEL FOR CLOUD BASED SECURITY USING HYBRID SYMMETRIC ALGORITHM

Afiesimama Dimabo Joshua
{"title":"AN ENHANCED SOFTWARE AS A SERVICE (SAAS) ARCHITECTURAL MODEL FOR CLOUD BASED SECURITY USING HYBRID SYMMETRIC ALGORITHM","authors":"Afiesimama Dimabo Joshua","doi":"10.26483/ijarcs.v14i3.7007","DOIUrl":null,"url":null,"abstract":"Protecting cloud data from security breaches, preventing and ensuring safe cloud data is concealed from unauthorized access or infiltration by unwanted users are all part of cloud infrastructure security. This proposed technique is based on ensuring data confidentiality by adding extra-layer of security from the client side, developing a framework that implements the AES 256-bit key and Fernet 128-bits algorithms, which encrypt and decrypt files via random algorithm selection during uploads and downloads. When a file is uploaded to the cloud, the decryption key is recorded in the local server's file log. The software use randomized algorithm selection to provide security to ensure that an attacker having a prior link cannot reset the user account since the attacker cannot guess the token. Furthermore, invalidating this token ensures that the link cannot be used more than once if it was previously logged anywhere. To propose and verify the efficiency of the model the results generated(in quantitative values) are frequency (monobit) testing, with a minimum bit size of 64, given the P-values derived from the above study (i.e., 0.8838, 0.6187, 0.3768, 0.2817, 0.5843, 0.4167). The findings reveal throughput for encryption of 0.91531 and for decryption of 0.4854, space complexity of 0.4854, and entropy of 7.942616667.This research work studies the design of a robust, adaptable, and non-deterministic SaaS application that can be secure for enterprises and subsequent research studies will be conducted in the development.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26483/ijarcs.v14i3.7007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Protecting cloud data from security breaches, preventing and ensuring safe cloud data is concealed from unauthorized access or infiltration by unwanted users are all part of cloud infrastructure security. This proposed technique is based on ensuring data confidentiality by adding extra-layer of security from the client side, developing a framework that implements the AES 256-bit key and Fernet 128-bits algorithms, which encrypt and decrypt files via random algorithm selection during uploads and downloads. When a file is uploaded to the cloud, the decryption key is recorded in the local server's file log. The software use randomized algorithm selection to provide security to ensure that an attacker having a prior link cannot reset the user account since the attacker cannot guess the token. Furthermore, invalidating this token ensures that the link cannot be used more than once if it was previously logged anywhere. To propose and verify the efficiency of the model the results generated(in quantitative values) are frequency (monobit) testing, with a minimum bit size of 64, given the P-values derived from the above study (i.e., 0.8838, 0.6187, 0.3768, 0.2817, 0.5843, 0.4167). The findings reveal throughput for encryption of 0.91531 and for decryption of 0.4854, space complexity of 0.4854, and entropy of 7.942616667.This research work studies the design of a robust, adaptable, and non-deterministic SaaS application that can be secure for enterprises and subsequent research studies will be conducted in the development.
使用混合对称算法的基于云的安全性的增强软件即服务(saas)体系结构模型
保护云数据免受安全漏洞的侵害,防止和确保安全的云数据被隐藏,不受未经授权的访问或不受欢迎的用户渗透,都是云基础设施安全的一部分。该建议的技术是基于通过从客户端添加额外的安全层来确保数据机密性,开发一个实现AES 256位密钥和Fernet 128位算法的框架,在上传和下载期间通过随机算法选择加密和解密文件。当文件上传到云端时,解密密钥将记录在本地服务器的文件日志中。该软件使用随机算法选择来提供安全性,以确保具有先前链接的攻击者无法重置用户帐户,因为攻击者无法猜测令牌。此外,使此令牌失效可以确保如果链接以前在任何地方记录过,则该链接不能被多次使用。为了提出并验证模型的有效性,给出上述研究得出的p值(即0.8838、0.6187、0.3768、0.2817、0.5843、0.4167),生成的结果(定量值)是频率(单比特)测试,最小比特大小为64。结果表明,加密吞吐量为0.91531,解密吞吐量为0.4854,空间复杂度为0.4854,熵为7.942616667。这项研究工作研究了一个健壮的、可适应的、不确定的SaaS应用程序的设计,该应用程序对企业来说是安全的,后续的研究将在开发中进行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信