4.6 Article

Development of Security Rules and Mechanisms to Protect Data from Assaults

期刊

APPLIED SCIENCES-BASEL
卷 12, 期 24, 页码 -

出版社

MDPI
DOI: 10.3390/app122412578

关键词

intrusion detection; prevention system; cloud security; sids; semi-supervised clustering; network sensor; networking

资金

  1. Almaarefa University, Riyadh, Saudi Arabia
  2. [TUMA-Project-2021-27]

向作者/读者索取更多资源

This paper presents the principles and methods of cloud cryptography, which protect data through bit-reversing and salting mechanisms, and encrypt data using Caesar cipher and cipher matrix algorithms. By comparing with other algorithms, it demonstrates the superiority of the proposed algorithm.
Cloud cryptography is the art of converting plain text into an unreadable format, which protects data and prevents the data from being misused by the attacker. Different researchers designed various Caesar cipher algorithms for data security. With the help of these algorithms, the data can be converted into a nonreadable format, but the data cannot be completely secured. In this paper, data security is provided in different phases. Firstly, data are secured through a bit-reversing mechanism in which those replace the actual values with no relation to the original data. Then the four-bit values are added at the beginning and end of bits using a salting mechanism to interlink the salting and existing bit-values and hide the original data. A Caesar cipher value is obtained by applying the Caesar cipher algorithm to the resulting bits. The Caesar cipher algorithm is used to implement number-of-shifting on the obtained values. An efficient cipher matrix algorithm is then developed in which different rules are designed to encrypt the data. Afterward, a secure cipher value is obtained by implementing Cipher XORation rules on the result obtained and the user-defined key. In the end, the proposed algorithm is compared with various papers. It identifies how much better the proposed algorithm performs than all the previous algorithms and how much the attack rate can be reduced if this algorithm is used for data security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据