{"title":"Swarm Based Optimized Key Generation for Preserving the Privacy in Cloud Environment","authors":"Sasidhar Attuluri, B. Bama, K. Anand","doi":"10.1109/CONIT59222.2023.10205751","DOIUrl":null,"url":null,"abstract":"Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with a variety of cloud services in response to their specific needs. Cloud computing ensures a significant position in the technological business by allowing users to access services from almost any location in the globe. Cloud computing's biggest concerns are data privacy and integrity. The cloud's distributed nature makes it challenging to build a unified communication system. Therefore, it is crucial to establish security measures that guarantee privacy during data transfers. The primary goal of this study is to provide an optimization method for addressing the cloud industry's privacy preservation issues. Sensitive information is protected from unapproved access by having it obfuscated via data sanitization. The work comprises of generating an optimal key for data encryption through Kronecker method. The key generation is done using proposed Enhanced Harmony Search Algorithm (EHSA) where the continuous values of Harmony search method will be converted into discrete model using roundoff method. The results are compared with the recent state-of-the-art algorithms to prove its significance.","PeriodicalId":377623,"journal":{"name":"2023 3rd International Conference on Intelligent Technologies (CONIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT59222.2023.10205751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with a variety of cloud services in response to their specific needs. Cloud computing ensures a significant position in the technological business by allowing users to access services from almost any location in the globe. Cloud computing's biggest concerns are data privacy and integrity. The cloud's distributed nature makes it challenging to build a unified communication system. Therefore, it is crucial to establish security measures that guarantee privacy during data transfers. The primary goal of this study is to provide an optimization method for addressing the cloud industry's privacy preservation issues. Sensitive information is protected from unapproved access by having it obfuscated via data sanitization. The work comprises of generating an optimal key for data encryption through Kronecker method. The key generation is done using proposed Enhanced Harmony Search Algorithm (EHSA) where the continuous values of Harmony search method will be converted into discrete model using roundoff method. The results are compared with the recent state-of-the-art algorithms to prove its significance.