改进的云虚拟机签名加密算法

IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Yogesh Gurav , Mukil Alagirisamy , Sathish Kumar Selvaperumal , Suresh Shirbahadurkar , Bankat Patil
{"title":"改进的云虚拟机签名加密算法","authors":"Yogesh Gurav ,&nbsp;Mukil Alagirisamy ,&nbsp;Sathish Kumar Selvaperumal ,&nbsp;Suresh Shirbahadurkar ,&nbsp;Bankat Patil","doi":"10.1016/j.compeleceng.2025.110499","DOIUrl":null,"url":null,"abstract":"<div><div>Over the past few years, cloud computing has grown in popularity across all corporate sectors worldwide. However, security continues to be a major roadblock in the dependability of the cloud computing platform. As a result, tenant data security isolation is crucial for protecting sensitive tenant data. This paper's main goal is to present a new decentralized information flow control system for cloud virtual machines with multiple tenants. Three main elements make up the cloud computing environment: (a) Cloud Service Provider (CSP), (b) Data Store (DS), and (c) User. The Cloud Service Provider (CSP) is embedded with the newly proposed decentralized information flow control, and it enables the flow of control of data policies for regulating the flow of data between the cloud users within the cloud. The proposed technique involves three primary stages (i) data identification (ii) trust evaluation (iii) optimal key-based cipher-text information flow security. Initially, according to the security values, tactful information is derived from the input data, which is secured in the CA of CSP to safeguard the labels and keys authentically, subsequently, the decryption process takes place. Then the EP exhibit the flow of ciphertext data based on the proposed estimation of trust. The proposed improved Signcryption algorithm is employed to cipher the user's information and the optimal key is generated by using the proposed improved Sun Flow Optimization Algorithm, which ensures that data remains confidential and tamper-proof. Ultimately, based on the proposed trust value, a decryption key will be offered to users like direct users and indirect users, in which the direct users are the old users already having access rights whereas the indirect users are the new users. The proposed model is examined over various existing techniques, in which the cost function of the proposed work for the lung cancer dataset is 14.2%, 15.7%, 13.6%, 12.1%, 11.5% and 15.2% greater than the current methods like WOA, LA, SSA, ABC-GOA, FSO and SFO respectively. Therefore, the proposed ISFO has been proven to be very concurrent with the traditional optimization approaches, and this aids in increasing the security of the data.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"127 ","pages":"Article 110499"},"PeriodicalIF":4.0000,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improved Signcryption algorithm for cloud virtual machines\",\"authors\":\"Yogesh Gurav ,&nbsp;Mukil Alagirisamy ,&nbsp;Sathish Kumar Selvaperumal ,&nbsp;Suresh Shirbahadurkar ,&nbsp;Bankat Patil\",\"doi\":\"10.1016/j.compeleceng.2025.110499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Over the past few years, cloud computing has grown in popularity across all corporate sectors worldwide. However, security continues to be a major roadblock in the dependability of the cloud computing platform. As a result, tenant data security isolation is crucial for protecting sensitive tenant data. This paper's main goal is to present a new decentralized information flow control system for cloud virtual machines with multiple tenants. Three main elements make up the cloud computing environment: (a) Cloud Service Provider (CSP), (b) Data Store (DS), and (c) User. The Cloud Service Provider (CSP) is embedded with the newly proposed decentralized information flow control, and it enables the flow of control of data policies for regulating the flow of data between the cloud users within the cloud. The proposed technique involves three primary stages (i) data identification (ii) trust evaluation (iii) optimal key-based cipher-text information flow security. Initially, according to the security values, tactful information is derived from the input data, which is secured in the CA of CSP to safeguard the labels and keys authentically, subsequently, the decryption process takes place. Then the EP exhibit the flow of ciphertext data based on the proposed estimation of trust. The proposed improved Signcryption algorithm is employed to cipher the user's information and the optimal key is generated by using the proposed improved Sun Flow Optimization Algorithm, which ensures that data remains confidential and tamper-proof. Ultimately, based on the proposed trust value, a decryption key will be offered to users like direct users and indirect users, in which the direct users are the old users already having access rights whereas the indirect users are the new users. The proposed model is examined over various existing techniques, in which the cost function of the proposed work for the lung cancer dataset is 14.2%, 15.7%, 13.6%, 12.1%, 11.5% and 15.2% greater than the current methods like WOA, LA, SSA, ABC-GOA, FSO and SFO respectively. Therefore, the proposed ISFO has been proven to be very concurrent with the traditional optimization approaches, and this aids in increasing the security of the data.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"127 \",\"pages\":\"Article 110499\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2025-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625004422\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625004422","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

在过去几年中,云计算在全球所有企业部门中越来越受欢迎。然而,安全性仍然是云计算平台可靠性的主要障碍。因此,租户数据安全隔离对于保护敏感租户数据至关重要。本文的主要目标是为具有多个租户的云虚拟机提供一种新的分散信息流控制系统。构成云计算环境的三个主要要素:(a)云服务提供商(CSP)、(b)数据存储(DS)和(c)用户。云服务提供商(CSP)嵌入了新提出的分散信息流控制,它支持数据策略的流控制,以调节云内云用户之间的数据流。该技术涉及三个主要阶段(1)数据识别(2)信任评估(3)基于密钥的最优密文信息流安全。首先,根据安全值从输入的数据中导出机智的信息,并将其安全保存在CSP的CA中,以真实地保护标签和密钥,随后进行解密过程。然后,EP展示了基于所提出的信任估计的密文数据流。采用改进的Signcryption算法对用户信息进行加密,采用改进的Sun Flow优化算法生成最优密钥,保证了数据的保密性和防篡改性。最终,根据提出的信任值向直接用户和间接用户提供解密密钥,其中直接用户是已经具有访问权限的老用户,间接用户是新用户。通过对各种现有技术的检验,所提出的模型在肺癌数据集上的成本函数分别比WOA、LA、SSA、ABC-GOA、FSO和SFO等现有方法高14.2%、15.7%、13.6%、12.1%、11.5%和15.2%。因此,所提出的ISFO已被证明与传统的优化方法非常并行,这有助于提高数据的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Improved Signcryption algorithm for cloud virtual machines
Over the past few years, cloud computing has grown in popularity across all corporate sectors worldwide. However, security continues to be a major roadblock in the dependability of the cloud computing platform. As a result, tenant data security isolation is crucial for protecting sensitive tenant data. This paper's main goal is to present a new decentralized information flow control system for cloud virtual machines with multiple tenants. Three main elements make up the cloud computing environment: (a) Cloud Service Provider (CSP), (b) Data Store (DS), and (c) User. The Cloud Service Provider (CSP) is embedded with the newly proposed decentralized information flow control, and it enables the flow of control of data policies for regulating the flow of data between the cloud users within the cloud. The proposed technique involves three primary stages (i) data identification (ii) trust evaluation (iii) optimal key-based cipher-text information flow security. Initially, according to the security values, tactful information is derived from the input data, which is secured in the CA of CSP to safeguard the labels and keys authentically, subsequently, the decryption process takes place. Then the EP exhibit the flow of ciphertext data based on the proposed estimation of trust. The proposed improved Signcryption algorithm is employed to cipher the user's information and the optimal key is generated by using the proposed improved Sun Flow Optimization Algorithm, which ensures that data remains confidential and tamper-proof. Ultimately, based on the proposed trust value, a decryption key will be offered to users like direct users and indirect users, in which the direct users are the old users already having access rights whereas the indirect users are the new users. The proposed model is examined over various existing techniques, in which the cost function of the proposed work for the lung cancer dataset is 14.2%, 15.7%, 13.6%, 12.1%, 11.5% and 15.2% greater than the current methods like WOA, LA, SSA, ABC-GOA, FSO and SFO respectively. Therefore, the proposed ISFO has been proven to be very concurrent with the traditional optimization approaches, and this aids in increasing the security of the data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computers & Electrical Engineering
Computers & Electrical Engineering 工程技术-工程:电子与电气
CiteScore
9.20
自引率
7.00%
发文量
661
审稿时长
47 days
期刊介绍: The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency. Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信