You are in:Home/Publications/Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory.

Dr. Diaa Salama AbdElminam :: Publications:

Title:
Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory.
Authors: Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, Elsayed Badr
Year: 2020
Keywords: Not Available
Journal: IJ Network Security
Volume: 22
Issue: 2
Pages: 283-295
Publisher: Not Available
Local/International: International
Paper Link:
Full paper Diaa Salama AbdElminam_1816-3548-2020-00003.pdf
Supplementary materials Not Available
Abstract:

Cloud computing is an advanced trend, which provides access to applications and resources over the internet. In a cloud computing environment, the data is stored on remote servers accessed through the internet. The increasing volume of necessary data brings up more focus on securely storing data. Encryption plays a vital role in security for different types of data. The existing methods encrypt all data using the same key without taking into account the confidentiality level of data, which in turn will increase the encryption time. In this research, a novel encryption algorithm based on chaos theory in the cloud computing environment is developed. The new hybrid cryptography algorithm based on chaotic mapped called (Chaotic NHCP). Chaotic NHCP uses a classification method. The new framework of data encryption operates as follows, Firstly, KNN method is used to classify the data credibility level, and then Fast RSA algorithm and blowfish algorithm are used to encrypt the data to achieve the effect of Fast data encryption. The objects are classified by a maximum value of its neighbours, with the object being assigned to the class with most common among its K-nearest neighbours. Then, the 32-bit plaintext data was split into two 16-bit plaintext data, and the 32-bit ciphertext data was synthesised after encryption by Fast RSA and Blowfish hybrid algorithm, respectively. The proposed method was tested with different encryption algorithms and evaluated according to the encryption time, throughput and power consumption. The experimental results show that the Chaotic NHCP method minimises the encryption time needed to secure data that …

Google ScholarAcdemia.eduResearch GateLinkedinFacebookTwitterGoogle PlusYoutubeWordpressInstagramMendeleyZoteroEvernoteORCIDScopus