Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend

Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost...

Full description

Saved in:
Bibliographic Details
Published inPloS one Vol. 19; no. 4; p. e0301760
Main Authors Frimpong, Twum, Hayfron Acquah, James Benjamin, Missah, Yaw Marfo, Dawson, John Kwao, Ayawli, Ben Beklisi Kwame, Baah, Philemon, Sam, Samuel Akyeramfo
Format Journal Article
LanguageEnglish
Published United States Public Library of Science 16.04.2024
Public Library of Science (PLoS)
Subjects
Online AccessGet full text
ISSN1932-6203
1932-6203
DOI10.1371/journal.pone.0301760

Cover

Abstract Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA’s standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.
AbstractList Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA’s standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.
Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm's mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA's standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm's mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA's standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.
Audience Academic
Author Ayawli, Ben Beklisi Kwame
Baah, Philemon
Sam, Samuel Akyeramfo
Dawson, John Kwao
Frimpong, Twum
Hayfron Acquah, James Benjamin
Missah, Yaw Marfo
AuthorAffiliation University of the West of Scotland, UNITED KINGDOM
2 Department of Computer Science, Sunyani Technical University, Sunyani, Ghana
1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana
AuthorAffiliation_xml – name: 1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana
– name: 2 Department of Computer Science, Sunyani Technical University, Sunyani, Ghana
– name: University of the West of Scotland, UNITED KINGDOM
Author_xml – sequence: 1
  givenname: Twum
  surname: Frimpong
  fullname: Frimpong, Twum
– sequence: 2
  givenname: James Benjamin
  surname: Hayfron Acquah
  fullname: Hayfron Acquah, James Benjamin
– sequence: 3
  givenname: Yaw Marfo
  surname: Missah
  fullname: Missah, Yaw Marfo
– sequence: 4
  givenname: John Kwao
  orcidid: 0000-0002-7436-5550
  surname: Dawson
  fullname: Dawson, John Kwao
– sequence: 5
  givenname: Ben Beklisi Kwame
  surname: Ayawli
  fullname: Ayawli, Ben Beklisi Kwame
– sequence: 6
  givenname: Philemon
  surname: Baah
  fullname: Baah, Philemon
– sequence: 7
  givenname: Samuel Akyeramfo
  surname: Sam
  fullname: Sam, Samuel Akyeramfo
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38625954$$D View this record in MEDLINE/PubMed
BookMark eNqNUk1vEzEQtVARbQP_ACFLXMohwV57vbsnFFV8VFTqoXC2xl-pg9cO3t1W4dfjkFA1Egfkw9hv3jzP-PkcncQULUKvKVlQ1tD36zTlCGGxKfCCMEIbQZ6hM9qxai4qwk6e7E_R-TCsCalZK8QLdFpCVXc1P0P-1uop-7jCOqTJYAMj4GnYAYPV2Y74h91ijtNm9L3_BaNPEUNYpezHux5f3H7lN8t3-KGcMODS4jz4aKFktzhPEZcqi8dso3mJnjsIg311iDP0_dPHb5df5tc3n68ul9dzzTs6znmjuBF13QiqgLadE0w0QFxDhWKWcecciFq3lBhFBBgCnFZM0QqUI0oRNkNXe12TYC032feQtzKBl3-AlFcS8uh1sJKoxtTgROWY41VrVdMpxUwrOHV1V26boXqvNcUNbB8ghEdBSuTOBnmwQe5skAcbSt2Hfd1mUr012sYxQzhq5jgT_Z1cpXtJKalI23ZF4eKgkNPPyQ6j7P2gbQgQbZoGyQgnrKJ1wwv17Z66gjKTjy4VSb2jy2XTEcY5o7SwFv9glWVs73Vp3vmCHxW8eTrDY_N__04h8D1B5zQM2br_e5vfW6zbyg
Cites_doi 10.1016/j.jisa.2022.103412
10.1007/978-3-030-64758-2_2
10.1177/0962280219889080
10.1155/2023/9210803
10.1016/j.sysarc.2023.102950
10.3390/s22031109
10.1177/0253717620933419
10.1016/j.vlsi.2023.01.011
10.1504/IJCAET.2022.123996
10.1201/9781351011419
10.1049/iet-com.2020.0255
10.12720/jait.14.1.130-137
10.1609/aaai.v32i1.11534
10.1109/ICECCT56650.2023.10179752
10.1109/I-SMAC52330.2021.9640708
10.1109/TIMES-iCON47539.2019.9024583
10.1504/IJWGS.2023.135587
10.1016/j.iot.2023.100911
10.1007/978-3-030-36033-7_16
10.31449/inf.v46i8.4305
10.1145/3316615.3316689
10.3390/s23063254
10.1016/j.jisa.2023.103431
10.1109/EMBC48229.2022.9871499
10.22247/ijcna/2022/211630
10.1371/journal.pone.0290831
ContentType Journal Article
Copyright Copyright: © 2024 Frimpong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
COPYRIGHT 2024 Public Library of Science
2024 Frimpong et al 2024 Frimpong et al
Copyright_xml – notice: Copyright: © 2024 Frimpong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
– notice: COPYRIGHT 2024 Public Library of Science
– notice: 2024 Frimpong et al 2024 Frimpong et al
DBID AAYXX
CITATION
CGR
CUY
CVF
ECM
EIF
NPM
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.1371/journal.pone.0301760
DatabaseName CrossRef
Medline
MEDLINE
MEDLINE (Ovid)
MEDLINE
MEDLINE
PubMed
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
MEDLINE
Medline Complete
MEDLINE with Full Text
PubMed
MEDLINE (Ovid)
MEDLINE - Academic
DatabaseTitleList

MEDLINE - Academic
CrossRef
MEDLINE

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: EIF
  name: MEDLINE
  url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search
  sourceTypes: Index Database
– sequence: 4
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
DocumentTitleAlternate Securing cloud data using secret key 4 optimization algorithm (SK4OA)
EISSN 1932-6203
ExternalDocumentID oai_doaj_org_article_0b7d5af62f3f428eb79bb3d8641f593e
10.1371/journal.pone.0301760
PMC11020889
A790344311
38625954
10_1371_journal_pone_0301760
Genre Journal Article
GeographicLocations Ghana
GeographicLocations_xml – name: Ghana
GroupedDBID ---
123
29O
2WC
53G
5VS
7RV
7X2
7X7
7XC
88E
8AO
8C1
8CJ
8FE
8FG
8FH
8FI
8FJ
A8Z
AAFWJ
AAUCC
AAWOE
AAYXX
ABDBF
ABIVO
ABJCF
ABUWG
ACGFO
ACIHN
ACIWK
ACPRK
ACUHS
ADBBV
AEAQA
AENEX
AEUYN
AFKRA
AFPKN
AFRAH
AHMBA
ALMA_UNASSIGNED_HOLDINGS
AOIJS
APEBS
ARAPS
ATCPS
BAWUL
BBNVY
BCNDV
BENPR
BGLVJ
BHPHI
BKEYQ
BPHCQ
BVXVI
BWKFM
CCPQU
CITATION
CS3
D1I
D1J
D1K
DIK
DU5
E3Z
EAP
EAS
EBD
EMOBN
ESTFP
ESX
EX3
F5P
FPL
FYUFA
GROUPED_DOAJ
GX1
HCIFZ
HH5
HMCUK
HYE
IAO
IEA
IGS
IHR
IHW
INH
INR
IOV
IPY
ISE
ISR
ITC
K6-
KB.
KQ8
L6V
LK5
LK8
M0K
M1P
M48
M7P
M7R
M7S
M~E
NAPCQ
O5R
O5S
OK1
OVT
P2P
P62
PATMY
PDBOC
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQGLB
PQQKQ
PROAC
PSQYO
PTHSS
PUEGO
PV9
PYCSY
RNS
RPM
RZL
SV3
TR2
UKHRP
WOQ
WOW
~02
~KM
ADRAZ
ALIPV
CGR
CUY
CVF
ECM
EIF
IPNFZ
NPM
RIG
7X8
5PM
ADTOC
UNPAY
ID FETCH-LOGICAL-c491t-47b4d655761ba189f6367a0f716b3e34fffa65c810db06ad0a4123b12abf0bb03
IEDL.DBID M48
ISSN 1932-6203
IngestDate Fri Oct 03 12:53:46 EDT 2025
Sun Oct 26 04:03:59 EDT 2025
Tue Sep 30 17:10:07 EDT 2025
Fri Sep 05 13:11:40 EDT 2025
Mon Oct 20 22:57:02 EDT 2025
Mon Oct 20 17:07:29 EDT 2025
Mon Jul 21 06:01:31 EDT 2025
Wed Oct 01 04:47:13 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License Copyright: © 2024 Frimpong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c491t-47b4d655761ba189f6367a0f716b3e34fffa65c810db06ad0a4123b12abf0bb03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
Competing Interests: No authors have no competing interest.
ORCID 0000-0002-7436-5550
OpenAccessLink https://proxy.k.utb.cz/login?url=https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0301760&type=printable
PMID 38625954
PQID 3040321574
PQPubID 23479
ParticipantIDs doaj_primary_oai_doaj_org_article_0b7d5af62f3f428eb79bb3d8641f593e
unpaywall_primary_10_1371_journal_pone_0301760
pubmedcentral_primary_oai_pubmedcentral_nih_gov_11020889
proquest_miscellaneous_3040321574
gale_infotracmisc_A790344311
gale_infotracacademiconefile_A790344311
pubmed_primary_38625954
crossref_primary_10_1371_journal_pone_0301760
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-04-16
PublicationDateYYYYMMDD 2024-04-16
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-04-16
  day: 16
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
– name: San Francisco, CA USA
PublicationTitle PloS one
PublicationTitleAlternate PLoS One
PublicationYear 2024
Publisher Public Library of Science
Public Library of Science (PLoS)
Publisher_xml – name: Public Library of Science
– name: Public Library of Science (PLoS)
References pone.0301760.ref006
pone.0301760.ref028
pone.0301760.ref007
M. I. Hameed (pone.0301760.ref027) 2023
G. Arulkumaran (pone.0301760.ref005) 2023
pone.0301760.ref026
S. Gadde (pone.0301760.ref001) 2023; 73
A. Kousalya (pone.0301760.ref025) 2023
A. Kumar (pone.0301760.ref042) 2023; 90
pone.0301760.ref045
H. A. Alharbi (pone.0301760.ref011) 2023; 23
T. Kumar (pone.0301760.ref030) 2023; 19
M. Patel (pone.0301760.ref032) 2020; 7
M. Joseph (pone.0301760.ref020) 2022; 9
J. K. Dawson (pone.0301760.ref024) 2022; 16
J. K. Dawson (pone.0301760.ref008) 2023; 2023
J. K. Dawson (pone.0301760.ref014) 2022; 46
J. K. Dawson (pone.0301760.ref029) 2023; 14
P. Kumar (pone.0301760.ref018) 2020; 14
M. Sahu (pone.0301760.ref038) 2022
C. Andrade (pone.0301760.ref039) 2020; 42
U. A. Butt (pone.0301760.ref010) 2022
pone.0301760.ref019
Suyel Namasudra (pone.0301760.ref041) 2018
pone.0301760.ref013
pone.0301760.ref035
S. Mishra (pone.0301760.ref009) 2023
J. K. Dawson (pone.0301760.ref046) 2023; 18
pone.0301760.ref015
Y. Zhen (pone.0301760.ref003) 2023; 142
K. R. Sajay (pone.0301760.ref016) 2019
pone.0301760.ref031
M. Wang (pone.0301760.ref040) 2022
pone.0301760.ref033
A. A. Pandit (pone.0301760.ref034) 2023; 73
pone.0301760.ref012
A. Siva Kumar (pone.0301760.ref017) 2021
Y. Guo (pone.0301760.ref023) 2023
M. K. Hooshmand (pone.0301760.ref037) 2022
Y. Meng (pone.0301760.ref002) 2023; 24
S. McGrath (pone.0301760.ref043) 2020; 29
B. Ranganatha Rao (pone.0301760.ref036) 2023; 29
G. Sudhakar (pone.0301760.ref004) 2023
R. Adee (pone.0301760.ref022) 2022; 22
K.-Y. Chi (pone.0301760.ref044) 2023; 12
A. Vidhya (pone.0301760.ref021) 2022
References_xml – year: 2021
  ident: pone.0301760.ref017
  article-title: Efficient sensitivity orient blockchain encryption for improved data security in cloud
  publication-title: Concurrent Engineering
– volume: 73
  start-page: 103412
  year: 2023
  ident: pone.0301760.ref001
  article-title: A security model to protect the isolation of medical data in the cloud using hybrid cryptography
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2022.103412
– ident: pone.0301760.ref026
– ident: pone.0301760.ref045
  doi: 10.1007/978-3-030-64758-2_2
– volume: 29
  start-page: 2520
  issue: 9
  year: 2020
  ident: pone.0301760.ref043
  article-title: Estimating the sample mean and standard deviation from commonly reported quantiles in meta-analysis
  publication-title: Statistical Methods in Medical Research
  doi: 10.1177/0962280219889080
– volume: 2023
  start-page: 1
  year: 2023
  ident: pone.0301760.ref008
  article-title: PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud
  publication-title: Security and Communication Networks
  doi: 10.1155/2023/9210803
– volume: 142
  start-page: 102950
  year: 2023
  ident: pone.0301760.ref003
  article-title: Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems
  publication-title: Journal of Systems Architecture
  doi: 10.1016/j.sysarc.2023.102950
– volume: 22
  start-page: 1109
  issue: 3
  year: 2022
  ident: pone.0301760.ref022
  article-title: A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
  publication-title: Sensors
  doi: 10.3390/s22031109
– year: 2022
  ident: pone.0301760.ref040
  article-title: Review on Offloading of Vehicle Edge Computing
  publication-title: Journal of artificial intelligence and technology
– ident: pone.0301760.ref035
– volume: 42
  start-page: 409
  issue: 4
  year: 2020
  ident: pone.0301760.ref039
  article-title: Understanding the Difference Between Standard Deviation and Standard Error of the Mean, and Knowing When to Use Which
  publication-title: Indian Journal of Psychological Medicine
  doi: 10.1177/0253717620933419
– ident: pone.0301760.ref033
– volume: 90
  start-page: 224
  year: 2023
  ident: pone.0301760.ref042
  article-title: High-throughput and area-efficient architectures for image encryption using PRINCE cipher
  publication-title: Integration
  doi: 10.1016/j.vlsi.2023.01.011
– year: 2022
  ident: pone.0301760.ref038
  article-title: Local binary pattern-based reversible data hiding
  publication-title: CAAI Transactions on Intelligence Technology
– volume: 16
  start-page: 534
  issue: 4
  year: 2022
  ident: pone.0301760.ref024
  article-title: An enhanced RSA algorithm using Gaussian interpolation formula
  publication-title: International Journal of Computer Aided Engineering and Technology
  doi: 10.1504/IJCAET.2022.123996
– year: 2022
  ident: pone.0301760.ref037
  article-title: Network anomaly detection using deep learning techniques
  publication-title: CAAI Transactions on Intelligence Technology
– volume-title: Advances of DNA Computing in Cryptography
  year: 2018
  ident: pone.0301760.ref041
  doi: 10.1201/9781351011419
– volume: 14
  start-page: 3212
  issue: 18
  year: 2020
  ident: pone.0301760.ref018
  article-title: Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
  publication-title: IET Communications
  doi: 10.1049/iet-com.2020.0255
– volume: 14
  issue: 1
  year: 2023
  ident: pone.0301760.ref029
  article-title: Ensuring Cloud Data Security Using the Soldier Ant Algorithm
  publication-title: Journal of Advances in Information Technology
  doi: 10.12720/jait.14.1.130-137
– ident: pone.0301760.ref031
  doi: 10.1609/aaai.v32i1.11534
– year: 2023
  ident: pone.0301760.ref025
  article-title: Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
  publication-title: International Journal of Intelligent Networks
– ident: pone.0301760.ref006
  doi: 10.1109/ICECCT56650.2023.10179752
– ident: pone.0301760.ref019
  doi: 10.1109/I-SMAC52330.2021.9640708
– ident: pone.0301760.ref007
  doi: 10.1109/TIMES-iCON47539.2019.9024583
– volume: 19
  start-page: 463
  issue: 4
  year: 2023
  ident: pone.0301760.ref030
  article-title: Providing data security using DNA computing in the cloud computing environment
  publication-title: International Journal of Web and Grid Services
  doi: 10.1504/IJWGS.2023.135587
– year: 2022
  ident: pone.0301760.ref010
  article-title: Cloud Security Threats and Solutions: A Survey
  publication-title: Wireless Personal Communications
– year: 2023
  ident: pone.0301760.ref027
  article-title: New hybrid encryption algorithm for cloud computing security using chaotic system and mCrypton-salsa20 algorithms
  publication-title: Nucleation and Atmospheric Aerosols
– volume: 24
  start-page: 100911
  year: 2023
  ident: pone.0301760.ref002
  article-title: Secure and efficient data transmission based on quantum dialogue with hyperentangled states in cloud office
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2023.100911
– ident: pone.0301760.ref015
  doi: 10.1007/978-3-030-36033-7_16
– volume: 46
  issue: 8
  year: 2022
  ident: pone.0301760.ref014
  article-title: Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme
  publication-title: Informatica
  doi: 10.31449/inf.v46i8.4305
– year: 2023
  ident: pone.0301760.ref004
  publication-title: A Hybrid Cloud Security System using Cryptography
– year: 2022
  ident: pone.0301760.ref021
  article-title: Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
  publication-title: Concurrent Engineering
– ident: pone.0301760.ref012
  doi: 10.1145/3316615.3316689
– volume: 23
  start-page: 3254
  issue: 6
  year: 2023
  ident: pone.0301760.ref011
  article-title: Energy-Aware and Secure Task Offloading for Multi-Tier Edge-Cloud Computing Systems
  publication-title: Sensors
  doi: 10.3390/s23063254
– start-page: 1
  year: 2023
  ident: pone.0301760.ref023
  article-title: Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage
  publication-title: IEEE Transactions on Computers
– year: 2023
  ident: pone.0301760.ref009
  publication-title: An Efficient User Protected Encryption Storage Algorithm Used in Encrypted Cloud Data
– volume: 12
  issue: 1
  year: 2023
  ident: pone.0301760.ref044
  publication-title: Ten circumstances and solutions for finding the sample mean and standard deviation for meta-analysis
– volume: 73
  start-page: 103431
  year: 2023
  ident: pone.0301760.ref034
  article-title: LWR-based Quantum-Safe Pseudo-Random Number Generator
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2023.103431
– volume: 29
  start-page: 100870
  year: 2023
  ident: pone.0301760.ref036
  article-title: A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security
  publication-title: Measurement: Sensors
– ident: pone.0301760.ref028
– year: 2023
  ident: pone.0301760.ref005
  publication-title: An Effective Analysis of Proficient Two Level Security Contraptions For Loading Data In Cloud
– year: 2019
  ident: pone.0301760.ref016
  article-title: Enhancing the security of cloud data using hybrid encryption algorithm
  publication-title: Journal of Ambient Intelligence and Humanized Computing
– ident: pone.0301760.ref013
  doi: 10.1109/EMBC48229.2022.9871499
– volume: 9
  start-page: 114
  issue: 1
  year: 2022
  ident: pone.0301760.ref020
  article-title: A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography
  publication-title: International journal of computer networks and applications
  doi: 10.22247/ijcna/2022/211630
– volume: 18
  start-page: e0290831
  issue: 9
  year: 2023
  ident: pone.0301760.ref046
  article-title: Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend
  publication-title: PLOS ONE
  doi: 10.1371/journal.pone.0290831
– volume: 7
  start-page: 1
  issue: 2
  year: 2020
  ident: pone.0301760.ref032
  article-title: Prime numbers and their analysis
  publication-title: Journal of Emerging Technologies and Innovative Research
SSID ssj0053866
Score 2.454942
Snippet Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the...
SourceID doaj
unpaywall
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
StartPage e0301760
SubjectTerms Algorithms
Analysis
Cloud Computing
Computer and Information Sciences
Computer Security
Data security
Evaluation
Information Storage and Retrieval
Investment analysis
Mathematical optimization
Microcomputers
Physical Sciences
Research and Analysis Methods
Safety and security measures
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Nb9MwFLfQLnBBjM9uAxkJie2Qzo4dOzkWxDSBgANM2s2yE7ur1CVVm2jiv-e9xC0NHODANU6U-H3-fs7zMyFvALNKJ1hIBGCDROapS2zGROLTAMk8aKDQuDTw-Yu6vJIfr7PrvaO-sCZsaA88CO6cOV1lNqg0iABQ2TtdOCeqXEkeskJ4jL4sL7ZkaojB4MVKxY1yQvPzqJfpqqn9FEmA7ltS_kpEfb_-P6PyXlr6vWTyflev7I87u1zu5aOLR-RhBJJ0NkzgkNzz9WNyGF11Q09jP-mzJ2QR19TntFw2XUWxKJRivfucbhA0thQcmUraQPS4jdsyqV3Om_Wivbmlp98-ya-zM4orttTSuqkThKYWT72j666meDw9bbG29im5uvjw_f1lEk9YSEpZ8DaR2slKZcA5uLM8L4ISSlsWgEQ54YUMIViVlTlnlWPKVsxKyHSOp9YF5hwTz8gBvNa_ILQCblMyeMJnQRae2wDQIU8rB_wllUJOSLIVt1kNjTRM_zdNAwEZRGZQPSaqZ0LeoU5292Ib7P4CGIeJxmH-ZhwT8hY1atBZQW2ljXsO4D3Y9srMdIEtDwXnE3IyuhOcrBwNv97ahMEhrEyrfdNtjIAoKAA3aZjh88FGdt8MVgjsMoORfGQ9o0mNR-rFTd_jG1BZihVoEzLdGdo_ye3of8jtmDxIAbzhXzOuTshBu-78SwBfrXvV-9lPaowupw
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbK9gAXoDzKQkFGQtAektqx4yTHBVFVIAoSVCoHFNmJvV2xTVa7iRAc-O3MJN5VU4QEB25RbCfxeDLzjedhQp4BZpVGMBcIwAaBTCMT6JiJwEYOlLlLwITGrYF3J-r4VL45i8-2yJd1LoynINiI83rVefLxoq7soafkIdYr6r2nIRcJX48IF9ApRICfKPa8qziEO2MNJiBdI9sqBqg-ItunJx8mn3tPcxSoiAmfTvenJw3UVVfV_3fZfUl5XQ2svN5WC_39m57PL2mto1vk53q-fbDK17BtTFj8uFIK8r8R5Da56fEunfRP2SFbtrpDdrxEWdF9X_b64C6Z-a3_KS3mdVtSjF2lGJY_pSvEtg0FeUMlrUHIXfjsUarn03o5a84v6P7Ht_L95IDixjLVtKqrABG0xsP56LKtKIyytMEQ4Hvk9Oj1p1fHgT8IIihkxptAJkaWKgbTiBvN08wpoRLNHNh6RlghnXNaxUXKWWmY0iXTEhSy4ZE2jhnDxH0ygtfaB4SWYIIVDEbY2MnMcu0A4aRRacDMiqSQYxKs1ztf9PU-8s7pl4Cd1JMsR8LmnrBj8hKZYtMXq3V3N2Clcr9COTNJGWunIiccmHvWJJkxokyV5C7OhB2TF8hSOcoU4JtC-9QIeA8ubj5JMqzMKDgfk71BT5AFxaD56Zopc2zCALrK1u0qFyCsBcC7BGa42zPp5ptFikZwDC3pgH0Hkxq2VLPzrhQ5gMcIA-XGJNxw-l_R7eG_DnhEbkSAJ9GRx9UeGTXL1j4GPNiYJ_6v_gWhf2U1
  priority: 102
  providerName: Unpaywall
Title Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend
URI https://www.ncbi.nlm.nih.gov/pubmed/38625954
https://www.proquest.com/docview/3040321574
https://pubmed.ncbi.nlm.nih.gov/PMC11020889
https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0301760&type=printable
https://doaj.org/article/0b7d5af62f3f428eb79bb3d8641f593e
UnpaywallVersion publishedVersion
Volume 19
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVFSB
  databaseName: Free Full-Text Journals in Chemistry
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: HH5
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: http://abc-chemistry.org/
  providerName: ABC ChemistRy
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: KQ8
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: KQ8
  dateStart: 20061001
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: DOA
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: ABDBF
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: EBSCOhost Food Science Source
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: A8Z
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/login.aspx?authtype=ip,uid&profile=ehost&defaultdb=fsr
  providerName: EBSCOhost
– providerCode: PRVBFR
  databaseName: Free Medical Journals
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: DIK
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: http://www.freemedicaljournals.com
  providerName: Flying Publisher
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: GX1
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: M~E
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: RPM
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: 7X7
  dateStart: 20061201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: BENPR
  dateStart: 20061201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: 8FG
  dateStart: 20061201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Public Health Database
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: 8C1
  dateStart: 20061201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/publichealth
  providerName: ProQuest
– providerCode: PRVFZP
  databaseName: Scholars Portal Journals: Open Access
  customDbUrl:
  eissn: 1932-6203
  dateEnd: 20250930
  omitProxy: true
  ssIdentifier: ssj0053866
  issn: 1932-6203
  databaseCode: M48
  dateStart: 20061201
  isFulltext: true
  titleUrlDefault: http://journals.scholarsportal.info
  providerName: Scholars Portal
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELfG9gAviPFZGJWRkICHVHbs2MkDQt20MiGtmhCVylNkJ3Y3qUtKmwr233OXutXCl3jJQ5w0te_O9_vZ5ztCXgNmlVYwHwnABpFMYxuZhInIxR6cuddAoXFp4Hysziby0zSZ7pFtzdYwgKs_UjusJzVZzgc_vt18AIN_31Zt0Hz70mBRV26AEF8rIPEH4KsyLOZwLnf7CmDd7e4lopZIxUyEw3R_-5WOs2pz-v8-c99yXb-GVd5dVwtz893M57d81ugBuR_AJh1utOOQ7LnqITkM5ryib0PO6XePiAnr7jNazOt1STFwlGJM_IyuEFg2FIydSlrDDHMdjm5SM5_Vy6vm8priai41tKqrCGGrwYp4dLmuKJaupw3G3T4mk9Hpl5OzKFRfiAqZ8SaS2spSJcBHuDU8zbwSShvmgWBZ4YT03huVFClnpWXKlMxI8IKWx8Z6Zi0TT8g-fNY9I7QE3lMweMMlXmaOGw-wIo1LC9wmlkL2SLQd5nyxSbKRtzttGsjJZqhyFEsexNIjxyiL3bOYIru9US9nebC4nFldJsar2AsPHMtZnVkrylRJ7pNMuB55g5LMUbVAXIUJ5xHgO5gSKx_qDNMhCs575KjzJBhg0Wl-tdWFHJswaq1y9XqVC5ghBWAqDT18utGN3X8GTQTmmUBL2tGaTqe6LdXVZZv_GxBbjNFpPTLYKdh_jdvzf3fkBbkXA2TDvTKujsh-s1y7lwC5Gtsnd_RUwzU94XgdfeyTg-PT8cXnfruI0W-tDO5NxhfDrz8B9g8x3g
linkProvider Scholars Portal
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbK9gAXoDzKQkFGQtAektqx4yTHBVFVIAoSVCoHFNmJvV2xTVa7iRAc-O3MJN5VU4QEB25RbCfxeDLzjedhQp4BZpVGMBcIwAaBTCMT6JiJwEYOlLlLwITGrYF3J-r4VL45i8-2yJd1LoynINiI83rVefLxoq7soafkIdYr6r2nIRcJX48IF9ApRICfKPa8qziEO2MNJiBdI9sqBqg-ItunJx8mn3tPcxSoiAmfTvenJw3UVVfV_3fZfUl5XQ2svN5WC_39m57PL2mto1vk53q-fbDK17BtTFj8uFIK8r8R5Da56fEunfRP2SFbtrpDdrxEWdF9X_b64C6Z-a3_KS3mdVtSjF2lGJY_pSvEtg0FeUMlrUHIXfjsUarn03o5a84v6P7Ht_L95IDixjLVtKqrABG0xsP56LKtKIyytMEQ4Hvk9Oj1p1fHgT8IIihkxptAJkaWKgbTiBvN08wpoRLNHNh6RlghnXNaxUXKWWmY0iXTEhSy4ZE2jhnDxH0ygtfaB4SWYIIVDEbY2MnMcu0A4aRRacDMiqSQYxKs1ztf9PU-8s7pl4Cd1JMsR8LmnrBj8hKZYtMXq3V3N2Clcr9COTNJGWunIiccmHvWJJkxokyV5C7OhB2TF8hSOcoU4JtC-9QIeA8ubj5JMqzMKDgfk71BT5AFxaD56Zopc2zCALrK1u0qFyCsBcC7BGa42zPp5ptFikZwDC3pgH0Hkxq2VLPzrhQ5gMcIA-XGJNxw-l_R7eG_DnhEbkSAJ9GRx9UeGTXL1j4GPNiYJ_6v_gWhf2U1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+cloud+data+using+secret+key+4+optimization+algorithm+with+a+non-linearity+run+time+trend&rft.jtitle=PloS+one&rft.au=Frimpong%2C+Twum&rft.au=Hayfron+Acquah%2C+James+Benjamin&rft.au=Missah%2C+Yaw+Marfo&rft.au=Dawson%2C+John+Kwao&rft.date=2024-04-16&rft.pub=Public+Library+of+Science&rft.issn=1932-6203&rft.eissn=1932-6203&rft.volume=19&rft.issue=4&rft.spage=e0301760&rft_id=info:doi/10.1371%2Fjournal.pone.0301760&rft.externalDocID=A790344311
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-6203&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-6203&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-6203&client=summon