Journal
CMC-COMPUTERS MATERIALS & CONTINUA
Volume 74, Issue 2, Pages 2625-2640Publisher
TECH SCIENCE PRESS
DOI: 10.32604/cmc.2023.030899
Keywords
Cryptography; symmetric algorithm; encryption; decryption; cipher text; cloud security; asymmetric algorithm
Ask authors/readers for more resources
Many organizations focus on protecting cloud servers from external attacks, but the majority of risks come from internal sources. While there are algorithms in place to safeguard against attacks, hackers constantly find ways to bypass these security measures. Cloud cryptography provides the best data protection algorithm for secure data exchange between authentic users.
Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double encryption algorithm will be implemented to send data in a secure format. First, the XOR function will be applied to plain text, and then salt technique will be used. Finally, a reversing mechanism will be implemented on that data to provide more data security. To decrypt data, the cipher text will be reversed, salt will be removed, and XOR will be implemented. At the end of the paper, the proposed algorithm will be compared with other algorithms, and it will conclude how much better the existing algorithm is than other algorithms.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available