4.6 Article

Development of Security Rules and Mechanisms to Protect Data from Assaults

Journal

APPLIED SCIENCES-BASEL
Volume 12, Issue 24, Pages -

Publisher

MDPI
DOI: 10.3390/app122412578

Keywords

intrusion detection; prevention system; cloud security; sids; semi-supervised clustering; network sensor; networking

Funding

  1. Almaarefa University, Riyadh, Saudi Arabia
  2. [TUMA-Project-2021-27]

Ask authors/readers for more resources

This paper presents the principles and methods of cloud cryptography, which protect data through bit-reversing and salting mechanisms, and encrypt data using Caesar cipher and cipher matrix algorithms. By comparing with other algorithms, it demonstrates the superiority of the proposed algorithm.
Cloud cryptography is the art of converting plain text into an unreadable format, which protects data and prevents the data from being misused by the attacker. Different researchers designed various Caesar cipher algorithms for data security. With the help of these algorithms, the data can be converted into a nonreadable format, but the data cannot be completely secured. In this paper, data security is provided in different phases. Firstly, data are secured through a bit-reversing mechanism in which those replace the actual values with no relation to the original data. Then the four-bit values are added at the beginning and end of bits using a salting mechanism to interlink the salting and existing bit-values and hide the original data. A Caesar cipher value is obtained by applying the Caesar cipher algorithm to the resulting bits. The Caesar cipher algorithm is used to implement number-of-shifting on the obtained values. An efficient cipher matrix algorithm is then developed in which different rules are designed to encrypt the data. Afterward, a secure cipher value is obtained by implementing Cipher XORation rules on the result obtained and the user-defined key. In the end, the proposed algorithm is compared with various papers. It identifies how much better the proposed algorithm performs than all the previous algorithms and how much the attack rate can be reduced if this algorithm is used for data security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available