{"title":"改进的云虚拟机签名加密算法","authors":"Yogesh Gurav , Mukil Alagirisamy , Sathish Kumar Selvaperumal , Suresh Shirbahadurkar , Bankat Patil","doi":"10.1016/j.compeleceng.2025.110499","DOIUrl":null,"url":null,"abstract":"<div><div>Over the past few years, cloud computing has grown in popularity across all corporate sectors worldwide. However, security continues to be a major roadblock in the dependability of the cloud computing platform. As a result, tenant data security isolation is crucial for protecting sensitive tenant data. This paper's main goal is to present a new decentralized information flow control system for cloud virtual machines with multiple tenants. Three main elements make up the cloud computing environment: (a) Cloud Service Provider (CSP), (b) Data Store (DS), and (c) User. The Cloud Service Provider (CSP) is embedded with the newly proposed decentralized information flow control, and it enables the flow of control of data policies for regulating the flow of data between the cloud users within the cloud. The proposed technique involves three primary stages (i) data identification (ii) trust evaluation (iii) optimal key-based cipher-text information flow security. Initially, according to the security values, tactful information is derived from the input data, which is secured in the CA of CSP to safeguard the labels and keys authentically, subsequently, the decryption process takes place. Then the EP exhibit the flow of ciphertext data based on the proposed estimation of trust. The proposed improved Signcryption algorithm is employed to cipher the user's information and the optimal key is generated by using the proposed improved Sun Flow Optimization Algorithm, which ensures that data remains confidential and tamper-proof. Ultimately, based on the proposed trust value, a decryption key will be offered to users like direct users and indirect users, in which the direct users are the old users already having access rights whereas the indirect users are the new users. The proposed model is examined over various existing techniques, in which the cost function of the proposed work for the lung cancer dataset is 14.2%, 15.7%, 13.6%, 12.1%, 11.5% and 15.2% greater than the current methods like WOA, LA, SSA, ABC-GOA, FSO and SFO respectively. Therefore, the proposed ISFO has been proven to be very concurrent with the traditional optimization approaches, and this aids in increasing the security of the data.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"127 ","pages":"Article 110499"},"PeriodicalIF":4.0000,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improved Signcryption algorithm for cloud virtual machines\",\"authors\":\"Yogesh Gurav , Mukil Alagirisamy , Sathish Kumar Selvaperumal , Suresh Shirbahadurkar , Bankat Patil\",\"doi\":\"10.1016/j.compeleceng.2025.110499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Over the past few years, cloud computing has grown in popularity across all corporate sectors worldwide. However, security continues to be a major roadblock in the dependability of the cloud computing platform. As a result, tenant data security isolation is crucial for protecting sensitive tenant data. This paper's main goal is to present a new decentralized information flow control system for cloud virtual machines with multiple tenants. Three main elements make up the cloud computing environment: (a) Cloud Service Provider (CSP), (b) Data Store (DS), and (c) User. The Cloud Service Provider (CSP) is embedded with the newly proposed decentralized information flow control, and it enables the flow of control of data policies for regulating the flow of data between the cloud users within the cloud. The proposed technique involves three primary stages (i) data identification (ii) trust evaluation (iii) optimal key-based cipher-text information flow security. Initially, according to the security values, tactful information is derived from the input data, which is secured in the CA of CSP to safeguard the labels and keys authentically, subsequently, the decryption process takes place. Then the EP exhibit the flow of ciphertext data based on the proposed estimation of trust. The proposed improved Signcryption algorithm is employed to cipher the user's information and the optimal key is generated by using the proposed improved Sun Flow Optimization Algorithm, which ensures that data remains confidential and tamper-proof. Ultimately, based on the proposed trust value, a decryption key will be offered to users like direct users and indirect users, in which the direct users are the old users already having access rights whereas the indirect users are the new users. The proposed model is examined over various existing techniques, in which the cost function of the proposed work for the lung cancer dataset is 14.2%, 15.7%, 13.6%, 12.1%, 11.5% and 15.2% greater than the current methods like WOA, LA, SSA, ABC-GOA, FSO and SFO respectively. Therefore, the proposed ISFO has been proven to be very concurrent with the traditional optimization approaches, and this aids in increasing the security of the data.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"127 \",\"pages\":\"Article 110499\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2025-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625004422\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625004422","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Improved Signcryption algorithm for cloud virtual machines
Over the past few years, cloud computing has grown in popularity across all corporate sectors worldwide. However, security continues to be a major roadblock in the dependability of the cloud computing platform. As a result, tenant data security isolation is crucial for protecting sensitive tenant data. This paper's main goal is to present a new decentralized information flow control system for cloud virtual machines with multiple tenants. Three main elements make up the cloud computing environment: (a) Cloud Service Provider (CSP), (b) Data Store (DS), and (c) User. The Cloud Service Provider (CSP) is embedded with the newly proposed decentralized information flow control, and it enables the flow of control of data policies for regulating the flow of data between the cloud users within the cloud. The proposed technique involves three primary stages (i) data identification (ii) trust evaluation (iii) optimal key-based cipher-text information flow security. Initially, according to the security values, tactful information is derived from the input data, which is secured in the CA of CSP to safeguard the labels and keys authentically, subsequently, the decryption process takes place. Then the EP exhibit the flow of ciphertext data based on the proposed estimation of trust. The proposed improved Signcryption algorithm is employed to cipher the user's information and the optimal key is generated by using the proposed improved Sun Flow Optimization Algorithm, which ensures that data remains confidential and tamper-proof. Ultimately, based on the proposed trust value, a decryption key will be offered to users like direct users and indirect users, in which the direct users are the old users already having access rights whereas the indirect users are the new users. The proposed model is examined over various existing techniques, in which the cost function of the proposed work for the lung cancer dataset is 14.2%, 15.7%, 13.6%, 12.1%, 11.5% and 15.2% greater than the current methods like WOA, LA, SSA, ABC-GOA, FSO and SFO respectively. Therefore, the proposed ISFO has been proven to be very concurrent with the traditional optimization approaches, and this aids in increasing the security of the data.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.