基于群的云环境下隐私保护密钥生成优化

Sasidhar Attuluri, B. Bama, K. Anand
{"title":"基于群的云环境下隐私保护密钥生成优化","authors":"Sasidhar Attuluri, B. Bama, K. Anand","doi":"10.1109/CONIT59222.2023.10205751","DOIUrl":null,"url":null,"abstract":"Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with a variety of cloud services in response to their specific needs. Cloud computing ensures a significant position in the technological business by allowing users to access services from almost any location in the globe. Cloud computing's biggest concerns are data privacy and integrity. The cloud's distributed nature makes it challenging to build a unified communication system. Therefore, it is crucial to establish security measures that guarantee privacy during data transfers. The primary goal of this study is to provide an optimization method for addressing the cloud industry's privacy preservation issues. Sensitive information is protected from unapproved access by having it obfuscated via data sanitization. The work comprises of generating an optimal key for data encryption through Kronecker method. The key generation is done using proposed Enhanced Harmony Search Algorithm (EHSA) where the continuous values of Harmony search method will be converted into discrete model using roundoff method. The results are compared with the recent state-of-the-art algorithms to prove its significance.","PeriodicalId":377623,"journal":{"name":"2023 3rd International Conference on Intelligent Technologies (CONIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Swarm Based Optimized Key Generation for Preserving the Privacy in Cloud Environment\",\"authors\":\"Sasidhar Attuluri, B. Bama, K. Anand\",\"doi\":\"10.1109/CONIT59222.2023.10205751\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with a variety of cloud services in response to their specific needs. Cloud computing ensures a significant position in the technological business by allowing users to access services from almost any location in the globe. Cloud computing's biggest concerns are data privacy and integrity. The cloud's distributed nature makes it challenging to build a unified communication system. Therefore, it is crucial to establish security measures that guarantee privacy during data transfers. The primary goal of this study is to provide an optimization method for addressing the cloud industry's privacy preservation issues. Sensitive information is protected from unapproved access by having it obfuscated via data sanitization. The work comprises of generating an optimal key for data encryption through Kronecker method. The key generation is done using proposed Enhanced Harmony Search Algorithm (EHSA) where the continuous values of Harmony search method will be converted into discrete model using roundoff method. The results are compared with the recent state-of-the-art algorithms to prove its significance.\",\"PeriodicalId\":377623,\"journal\":{\"name\":\"2023 3rd International Conference on Intelligent Technologies (CONIT)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Intelligent Technologies (CONIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIT59222.2023.10205751\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT59222.2023.10205751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算可以被描述为软件应用程序和硬件组件的集合,它们被串联使用,为用户提供各种云服务,以响应他们的特定需求。云计算通过允许用户从全球几乎任何位置访问服务,确保了在技术业务中的重要地位。云计算最大的问题是数据隐私和完整性。云的分布式特性使得构建统一的通信系统具有挑战性。因此,建立安全措施以保证数据传输过程中的隐私是至关重要的。本研究的主要目的是为解决云行业的隐私保护问题提供一种优化方法。通过数据清理对敏感信息进行模糊处理,可以防止未经批准的访问。该工作包括通过Kronecker方法生成数据加密的最优密钥。关键字生成采用提出的增强型和声搜索算法(EHSA),其中和声搜索方法的连续值采用舍入法转换为离散模型。结果与最新的算法进行了比较,以证明其意义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Swarm Based Optimized Key Generation for Preserving the Privacy in Cloud Environment
Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with a variety of cloud services in response to their specific needs. Cloud computing ensures a significant position in the technological business by allowing users to access services from almost any location in the globe. Cloud computing's biggest concerns are data privacy and integrity. The cloud's distributed nature makes it challenging to build a unified communication system. Therefore, it is crucial to establish security measures that guarantee privacy during data transfers. The primary goal of this study is to provide an optimization method for addressing the cloud industry's privacy preservation issues. Sensitive information is protected from unapproved access by having it obfuscated via data sanitization. The work comprises of generating an optimal key for data encryption through Kronecker method. The key generation is done using proposed Enhanced Harmony Search Algorithm (EHSA) where the continuous values of Harmony search method will be converted into discrete model using roundoff method. The results are compared with the recent state-of-the-art algorithms to prove its significance.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信