An enhanced data integrity encryption algorithm for cloud computing
Mothlabeng, Moloko P.
Mothlabeng, Moloko P.
Citations
Altmetric:
Abstract
Ever since the dawn of computing, information technology (IT) has brought a tremendous change to the globe. Today, smart devices empower users with access to a range of high-performance and cost-effective services and resources in various environments, such as Smart cities and more. This has led to the introduction of the Internet of Things (IoT), which enables things (devices) to share valuable information regardless of time and location. These devices generate, gather, and exchange data in real-time. Meanwhile, the generated data must be transmitted, processed, and stored in the cloud. Cloud computing is the delivery of various services through the internet, including data storage, servers, databases, networking, and software. Cloud-based storage makes it possible to save files to a remote database, retrieving them on demand. This benefit allows users to preserve and manage large amounts of data at minimal cost. On the other hand, it cannot ensure data integrity. In general, the data must be sent from end-user devices to remote cloud servers. Meanwhile, it passes through unsecured and untrustworthy routes because of unauthorized users or service providers who might accidentally modify data. This may result in data being lost or altered. Consequently, protecting this type of data becomes crucial to maintaining its integrity. Thus, this study proposed an Enhanced Data Integrity Encryption (EDIE) algorithm to improve data integrity in cloud computing environments. The proposed EDIE algorithm was designed by integrating Moving Target Defense (MTD) and the New Lightweight Cryptographic Algorithm (NLCA) to dynamically modify network configurations and regularly mislead attackers. The purpose of the proposed EDIE algorithm was to reduce the number of attacks while improving the integrity of the data. NLCA was used to provide secure encryption and decryption of data with faster execution time. Compared with EDSA and SAKAS data integrity techniques, the results show that EDIE consumes 6% less energy, encounters only 0.2% of all launched man-in-the-middle attacks, and reduces server computing time by 21%.
Description
Submitted in partial fulfilment of the requirements for the degree of Master of Computing in Information Technology in the Department of Information Technology,
Faculty of Information and Communication Technology at the Tshwane University of Technology.
Date
2022-08-01
Journal Title
Journal ISSN
Volume Title
Publisher
Tshwane University of Technology
Research Projects
Organizational Units
Journal Issue
Keywords
Data Integrity., IoT., Cloud Computing., MTD., NLCA., EDIE algorithm.
