3 research outputs found

    An Efficient Authentication Approach with Optimization Algorithms and Elliptical Curve Cryptography for Cloud Environment

    Get PDF
    The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a dual optimizer based key generation method for the improving the authentication with Elliptical Curve Cryptography (ECC) encryption algorithm. The optimal private and secret key for the encryption and decryption are obtained with the optimization techniques like Animal Migration Optimization (AMO), and Brain Storm Optimization (BSO) for strengthening the security in the Cloud Computing environment

    Hybrid Encryption based Access Control Approach for Securing Cloud Computing

    Get PDF
                    Cloud computing has become an integral part of modern technological infrastructure, facilitating the storage and processing of vast amounts of data. However, ensuring the security of sensitive information in the cloud remains a persistent challenge. This paper proposes a novel approach to enhance the security of cloud computing through hybrid encryption, leveraging the Whale Optimization Algorithm (WOA) and Cuckoo Search Optimization (CSO) algorithms. Hybrid encryption, combining symmetric and asymmetric cryptographic techniques, is employed to address the limitations of traditional encryption methods in cloud environments. The Whale Optimization Algorithm and Cuckoo Search Optimization are utilized to optimize key generation and management processes, enhancing the overall efficiency and security of the encryption scheme. The Whale Optimization Algorithm, inspired by the social behavior of humpback whales, is employed to optimize the parameters of the encryption algorithm. WOA's exploration and exploitation capabilities are leveraged to find an optimal balance in the encryption process, improving the overall robustness against potential attacks. Complementing WOA, the Cuckoo Search Optimization algorithm is applied to optimize the key distribution and update mechanisms. Modeled after the brood parasitism behavior of cuckoo birds, CSO excels in searching large solution spaces, making it suitable for refining the distribution of encryption keys and ensuring their constant adaptability to dynamic cloud environments

    Abstracts of National Conference on Biological, Biochemical, Biomedical, Bioenergy, and Environmental Biotechnology

    No full text
    This book contains the abstracts of the papers presented at the National Conference on Biological, Biochemical, Biomedical, Bioenergy, and Environmental Biotechnology (NCB4EBT-2021) Organized by the Department of Biotechnology, National Institute of Technology Warangal, India held on 29–30 January 2021. This conference is the first of its kind organized by NIT-W which covered an array of interesting topics in biotechnology. This makes it a bit special as it brings together researchers from different disciplines of biotechnology, which in turn will also open new research and cooperation fields for them. Conference Title: National Conference on Biological, Biochemical, Biomedical, Bioenergy, and Environmental BiotechnologyConference Acronym: NCB4EBT-2021Conference Date: 29–30 January 2021Conference Location: Online (Virtual Mode)Conference Organizer: Department of Biotechnology, National Institute of Technology Warangal, Indi
    corecore