Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend
Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost...
Saved in:
| Published in | PloS one Vol. 19; no. 4; p. e0301760 |
|---|---|
| Main Authors | , , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
United States
Public Library of Science
16.04.2024
Public Library of Science (PLoS) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1932-6203 1932-6203 |
| DOI | 10.1371/journal.pone.0301760 |
Cover
| Abstract | Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA’s standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times. |
|---|---|
| AbstractList | Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer’s direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA’s standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times. Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm's mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA's standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times.Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm's mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA's standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times. |
| Audience | Academic |
| Author | Ayawli, Ben Beklisi Kwame Baah, Philemon Sam, Samuel Akyeramfo Dawson, John Kwao Frimpong, Twum Hayfron Acquah, James Benjamin Missah, Yaw Marfo |
| AuthorAffiliation | University of the West of Scotland, UNITED KINGDOM 2 Department of Computer Science, Sunyani Technical University, Sunyani, Ghana 1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana |
| AuthorAffiliation_xml | – name: 1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana – name: 2 Department of Computer Science, Sunyani Technical University, Sunyani, Ghana – name: University of the West of Scotland, UNITED KINGDOM |
| Author_xml | – sequence: 1 givenname: Twum surname: Frimpong fullname: Frimpong, Twum – sequence: 2 givenname: James Benjamin surname: Hayfron Acquah fullname: Hayfron Acquah, James Benjamin – sequence: 3 givenname: Yaw Marfo surname: Missah fullname: Missah, Yaw Marfo – sequence: 4 givenname: John Kwao orcidid: 0000-0002-7436-5550 surname: Dawson fullname: Dawson, John Kwao – sequence: 5 givenname: Ben Beklisi Kwame surname: Ayawli fullname: Ayawli, Ben Beklisi Kwame – sequence: 6 givenname: Philemon surname: Baah fullname: Baah, Philemon – sequence: 7 givenname: Samuel Akyeramfo surname: Sam fullname: Sam, Samuel Akyeramfo |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38625954$$D View this record in MEDLINE/PubMed |
| BookMark | eNqNUk1vEzEQtVARbQP_ACFLXMohwV57vbsnFFV8VFTqoXC2xl-pg9cO3t1W4dfjkFA1Egfkw9hv3jzP-PkcncQULUKvKVlQ1tD36zTlCGGxKfCCMEIbQZ6hM9qxai4qwk6e7E_R-TCsCalZK8QLdFpCVXc1P0P-1uop-7jCOqTJYAMj4GnYAYPV2Y74h91ijtNm9L3_BaNPEUNYpezHux5f3H7lN8t3-KGcMODS4jz4aKFktzhPEZcqi8dso3mJnjsIg311iDP0_dPHb5df5tc3n68ul9dzzTs6znmjuBF13QiqgLadE0w0QFxDhWKWcecciFq3lBhFBBgCnFZM0QqUI0oRNkNXe12TYC032feQtzKBl3-AlFcS8uh1sJKoxtTgROWY41VrVdMpxUwrOHV1V26boXqvNcUNbB8ghEdBSuTOBnmwQe5skAcbSt2Hfd1mUr012sYxQzhq5jgT_Z1cpXtJKalI23ZF4eKgkNPPyQ6j7P2gbQgQbZoGyQgnrKJ1wwv17Z66gjKTjy4VSb2jy2XTEcY5o7SwFv9glWVs73Vp3vmCHxW8eTrDY_N__04h8D1B5zQM2br_e5vfW6zbyg |
| Cites_doi | 10.1016/j.jisa.2022.103412 10.1007/978-3-030-64758-2_2 10.1177/0962280219889080 10.1155/2023/9210803 10.1016/j.sysarc.2023.102950 10.3390/s22031109 10.1177/0253717620933419 10.1016/j.vlsi.2023.01.011 10.1504/IJCAET.2022.123996 10.1201/9781351011419 10.1049/iet-com.2020.0255 10.12720/jait.14.1.130-137 10.1609/aaai.v32i1.11534 10.1109/ICECCT56650.2023.10179752 10.1109/I-SMAC52330.2021.9640708 10.1109/TIMES-iCON47539.2019.9024583 10.1504/IJWGS.2023.135587 10.1016/j.iot.2023.100911 10.1007/978-3-030-36033-7_16 10.31449/inf.v46i8.4305 10.1145/3316615.3316689 10.3390/s23063254 10.1016/j.jisa.2023.103431 10.1109/EMBC48229.2022.9871499 10.22247/ijcna/2022/211630 10.1371/journal.pone.0290831 |
| ContentType | Journal Article |
| Copyright | Copyright: © 2024 Frimpong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. COPYRIGHT 2024 Public Library of Science 2024 Frimpong et al 2024 Frimpong et al |
| Copyright_xml | – notice: Copyright: © 2024 Frimpong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. – notice: COPYRIGHT 2024 Public Library of Science – notice: 2024 Frimpong et al 2024 Frimpong et al |
| DBID | AAYXX CITATION CGR CUY CVF ECM EIF NPM 7X8 5PM ADTOC UNPAY DOA |
| DOI | 10.1371/journal.pone.0301760 |
| DatabaseName | CrossRef Medline MEDLINE MEDLINE (Ovid) MEDLINE MEDLINE PubMed MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef MEDLINE Medline Complete MEDLINE with Full Text PubMed MEDLINE (Ovid) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic CrossRef MEDLINE |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: EIF name: MEDLINE url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search sourceTypes: Index Database – sequence: 4 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| DocumentTitleAlternate | Securing cloud data using secret key 4 optimization algorithm (SK4OA) |
| EISSN | 1932-6203 |
| ExternalDocumentID | oai_doaj_org_article_0b7d5af62f3f428eb79bb3d8641f593e 10.1371/journal.pone.0301760 PMC11020889 A790344311 38625954 10_1371_journal_pone_0301760 |
| Genre | Journal Article |
| GeographicLocations | Ghana |
| GeographicLocations_xml | – name: Ghana |
| GroupedDBID | --- 123 29O 2WC 53G 5VS 7RV 7X2 7X7 7XC 88E 8AO 8C1 8CJ 8FE 8FG 8FH 8FI 8FJ A8Z AAFWJ AAUCC AAWOE AAYXX ABDBF ABIVO ABJCF ABUWG ACGFO ACIHN ACIWK ACPRK ACUHS ADBBV AEAQA AENEX AEUYN AFKRA AFPKN AFRAH AHMBA ALMA_UNASSIGNED_HOLDINGS AOIJS APEBS ARAPS ATCPS BAWUL BBNVY BCNDV BENPR BGLVJ BHPHI BKEYQ BPHCQ BVXVI BWKFM CCPQU CITATION CS3 D1I D1J D1K DIK DU5 E3Z EAP EAS EBD EMOBN ESTFP ESX EX3 F5P FPL FYUFA GROUPED_DOAJ GX1 HCIFZ HH5 HMCUK HYE IAO IEA IGS IHR IHW INH INR IOV IPY ISE ISR ITC K6- KB. KQ8 L6V LK5 LK8 M0K M1P M48 M7P M7R M7S M~E NAPCQ O5R O5S OK1 OVT P2P P62 PATMY PDBOC PHGZM PHGZT PIMPY PJZUB PPXIY PQGLB PQQKQ PROAC PSQYO PTHSS PUEGO PV9 PYCSY RNS RPM RZL SV3 TR2 UKHRP WOQ WOW ~02 ~KM ADRAZ ALIPV CGR CUY CVF ECM EIF IPNFZ NPM RIG 7X8 5PM ADTOC UNPAY |
| ID | FETCH-LOGICAL-c491t-47b4d655761ba189f6367a0f716b3e34fffa65c810db06ad0a4123b12abf0bb03 |
| IEDL.DBID | M48 |
| ISSN | 1932-6203 |
| IngestDate | Fri Oct 03 12:53:46 EDT 2025 Sun Oct 26 04:03:59 EDT 2025 Tue Sep 30 17:10:07 EDT 2025 Fri Sep 05 13:11:40 EDT 2025 Mon Oct 20 22:57:02 EDT 2025 Mon Oct 20 17:07:29 EDT 2025 Mon Jul 21 06:01:31 EDT 2025 Wed Oct 01 04:47:13 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | Copyright: © 2024 Frimpong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c491t-47b4d655761ba189f6367a0f716b3e34fffa65c810db06ad0a4123b12abf0bb03 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 Competing Interests: No authors have no competing interest. |
| ORCID | 0000-0002-7436-5550 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0301760&type=printable |
| PMID | 38625954 |
| PQID | 3040321574 |
| PQPubID | 23479 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_0b7d5af62f3f428eb79bb3d8641f593e unpaywall_primary_10_1371_journal_pone_0301760 pubmedcentral_primary_oai_pubmedcentral_nih_gov_11020889 proquest_miscellaneous_3040321574 gale_infotracmisc_A790344311 gale_infotracacademiconefile_A790344311 pubmed_primary_38625954 crossref_primary_10_1371_journal_pone_0301760 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2024-04-16 |
| PublicationDateYYYYMMDD | 2024-04-16 |
| PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-16 day: 16 |
| PublicationDecade | 2020 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: San Francisco, CA USA |
| PublicationTitle | PloS one |
| PublicationTitleAlternate | PLoS One |
| PublicationYear | 2024 |
| Publisher | Public Library of Science Public Library of Science (PLoS) |
| Publisher_xml | – name: Public Library of Science – name: Public Library of Science (PLoS) |
| References | pone.0301760.ref006 pone.0301760.ref028 pone.0301760.ref007 M. I. Hameed (pone.0301760.ref027) 2023 G. Arulkumaran (pone.0301760.ref005) 2023 pone.0301760.ref026 S. Gadde (pone.0301760.ref001) 2023; 73 A. Kousalya (pone.0301760.ref025) 2023 A. Kumar (pone.0301760.ref042) 2023; 90 pone.0301760.ref045 H. A. Alharbi (pone.0301760.ref011) 2023; 23 T. Kumar (pone.0301760.ref030) 2023; 19 M. Patel (pone.0301760.ref032) 2020; 7 M. Joseph (pone.0301760.ref020) 2022; 9 J. K. Dawson (pone.0301760.ref024) 2022; 16 J. K. Dawson (pone.0301760.ref008) 2023; 2023 J. K. Dawson (pone.0301760.ref014) 2022; 46 J. K. Dawson (pone.0301760.ref029) 2023; 14 P. Kumar (pone.0301760.ref018) 2020; 14 M. Sahu (pone.0301760.ref038) 2022 C. Andrade (pone.0301760.ref039) 2020; 42 U. A. Butt (pone.0301760.ref010) 2022 pone.0301760.ref019 Suyel Namasudra (pone.0301760.ref041) 2018 pone.0301760.ref013 pone.0301760.ref035 S. Mishra (pone.0301760.ref009) 2023 J. K. Dawson (pone.0301760.ref046) 2023; 18 pone.0301760.ref015 Y. Zhen (pone.0301760.ref003) 2023; 142 K. R. Sajay (pone.0301760.ref016) 2019 pone.0301760.ref031 M. Wang (pone.0301760.ref040) 2022 pone.0301760.ref033 A. A. Pandit (pone.0301760.ref034) 2023; 73 pone.0301760.ref012 A. Siva Kumar (pone.0301760.ref017) 2021 Y. Guo (pone.0301760.ref023) 2023 M. K. Hooshmand (pone.0301760.ref037) 2022 Y. Meng (pone.0301760.ref002) 2023; 24 S. McGrath (pone.0301760.ref043) 2020; 29 B. Ranganatha Rao (pone.0301760.ref036) 2023; 29 G. Sudhakar (pone.0301760.ref004) 2023 R. Adee (pone.0301760.ref022) 2022; 22 K.-Y. Chi (pone.0301760.ref044) 2023; 12 A. Vidhya (pone.0301760.ref021) 2022 |
| References_xml | – year: 2021 ident: pone.0301760.ref017 article-title: Efficient sensitivity orient blockchain encryption for improved data security in cloud publication-title: Concurrent Engineering – volume: 73 start-page: 103412 year: 2023 ident: pone.0301760.ref001 article-title: A security model to protect the isolation of medical data in the cloud using hybrid cryptography publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2022.103412 – ident: pone.0301760.ref026 – ident: pone.0301760.ref045 doi: 10.1007/978-3-030-64758-2_2 – volume: 29 start-page: 2520 issue: 9 year: 2020 ident: pone.0301760.ref043 article-title: Estimating the sample mean and standard deviation from commonly reported quantiles in meta-analysis publication-title: Statistical Methods in Medical Research doi: 10.1177/0962280219889080 – volume: 2023 start-page: 1 year: 2023 ident: pone.0301760.ref008 article-title: PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud publication-title: Security and Communication Networks doi: 10.1155/2023/9210803 – volume: 142 start-page: 102950 year: 2023 ident: pone.0301760.ref003 article-title: Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems publication-title: Journal of Systems Architecture doi: 10.1016/j.sysarc.2023.102950 – volume: 22 start-page: 1109 issue: 3 year: 2022 ident: pone.0301760.ref022 article-title: A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography publication-title: Sensors doi: 10.3390/s22031109 – year: 2022 ident: pone.0301760.ref040 article-title: Review on Offloading of Vehicle Edge Computing publication-title: Journal of artificial intelligence and technology – ident: pone.0301760.ref035 – volume: 42 start-page: 409 issue: 4 year: 2020 ident: pone.0301760.ref039 article-title: Understanding the Difference Between Standard Deviation and Standard Error of the Mean, and Knowing When to Use Which publication-title: Indian Journal of Psychological Medicine doi: 10.1177/0253717620933419 – ident: pone.0301760.ref033 – volume: 90 start-page: 224 year: 2023 ident: pone.0301760.ref042 article-title: High-throughput and area-efficient architectures for image encryption using PRINCE cipher publication-title: Integration doi: 10.1016/j.vlsi.2023.01.011 – year: 2022 ident: pone.0301760.ref038 article-title: Local binary pattern-based reversible data hiding publication-title: CAAI Transactions on Intelligence Technology – volume: 16 start-page: 534 issue: 4 year: 2022 ident: pone.0301760.ref024 article-title: An enhanced RSA algorithm using Gaussian interpolation formula publication-title: International Journal of Computer Aided Engineering and Technology doi: 10.1504/IJCAET.2022.123996 – year: 2022 ident: pone.0301760.ref037 article-title: Network anomaly detection using deep learning techniques publication-title: CAAI Transactions on Intelligence Technology – volume-title: Advances of DNA Computing in Cryptography year: 2018 ident: pone.0301760.ref041 doi: 10.1201/9781351011419 – volume: 14 start-page: 3212 issue: 18 year: 2020 ident: pone.0301760.ref018 article-title: Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach publication-title: IET Communications doi: 10.1049/iet-com.2020.0255 – volume: 14 issue: 1 year: 2023 ident: pone.0301760.ref029 article-title: Ensuring Cloud Data Security Using the Soldier Ant Algorithm publication-title: Journal of Advances in Information Technology doi: 10.12720/jait.14.1.130-137 – ident: pone.0301760.ref031 doi: 10.1609/aaai.v32i1.11534 – year: 2023 ident: pone.0301760.ref025 article-title: Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique publication-title: International Journal of Intelligent Networks – ident: pone.0301760.ref006 doi: 10.1109/ICECCT56650.2023.10179752 – ident: pone.0301760.ref019 doi: 10.1109/I-SMAC52330.2021.9640708 – ident: pone.0301760.ref007 doi: 10.1109/TIMES-iCON47539.2019.9024583 – volume: 19 start-page: 463 issue: 4 year: 2023 ident: pone.0301760.ref030 article-title: Providing data security using DNA computing in the cloud computing environment publication-title: International Journal of Web and Grid Services doi: 10.1504/IJWGS.2023.135587 – year: 2022 ident: pone.0301760.ref010 article-title: Cloud Security Threats and Solutions: A Survey publication-title: Wireless Personal Communications – year: 2023 ident: pone.0301760.ref027 article-title: New hybrid encryption algorithm for cloud computing security using chaotic system and mCrypton-salsa20 algorithms publication-title: Nucleation and Atmospheric Aerosols – volume: 24 start-page: 100911 year: 2023 ident: pone.0301760.ref002 article-title: Secure and efficient data transmission based on quantum dialogue with hyperentangled states in cloud office publication-title: Internet of Things doi: 10.1016/j.iot.2023.100911 – ident: pone.0301760.ref015 doi: 10.1007/978-3-030-36033-7_16 – volume: 46 issue: 8 year: 2022 ident: pone.0301760.ref014 article-title: Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme publication-title: Informatica doi: 10.31449/inf.v46i8.4305 – year: 2023 ident: pone.0301760.ref004 publication-title: A Hybrid Cloud Security System using Cryptography – year: 2022 ident: pone.0301760.ref021 article-title: Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud publication-title: Concurrent Engineering – ident: pone.0301760.ref012 doi: 10.1145/3316615.3316689 – volume: 23 start-page: 3254 issue: 6 year: 2023 ident: pone.0301760.ref011 article-title: Energy-Aware and Secure Task Offloading for Multi-Tier Edge-Cloud Computing Systems publication-title: Sensors doi: 10.3390/s23063254 – start-page: 1 year: 2023 ident: pone.0301760.ref023 article-title: Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage publication-title: IEEE Transactions on Computers – year: 2023 ident: pone.0301760.ref009 publication-title: An Efficient User Protected Encryption Storage Algorithm Used in Encrypted Cloud Data – volume: 12 issue: 1 year: 2023 ident: pone.0301760.ref044 publication-title: Ten circumstances and solutions for finding the sample mean and standard deviation for meta-analysis – volume: 73 start-page: 103431 year: 2023 ident: pone.0301760.ref034 article-title: LWR-based Quantum-Safe Pseudo-Random Number Generator publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2023.103431 – volume: 29 start-page: 100870 year: 2023 ident: pone.0301760.ref036 article-title: A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security publication-title: Measurement: Sensors – ident: pone.0301760.ref028 – year: 2023 ident: pone.0301760.ref005 publication-title: An Effective Analysis of Proficient Two Level Security Contraptions For Loading Data In Cloud – year: 2019 ident: pone.0301760.ref016 article-title: Enhancing the security of cloud data using hybrid encryption algorithm publication-title: Journal of Ambient Intelligence and Humanized Computing – ident: pone.0301760.ref013 doi: 10.1109/EMBC48229.2022.9871499 – volume: 9 start-page: 114 issue: 1 year: 2022 ident: pone.0301760.ref020 article-title: A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography publication-title: International journal of computer networks and applications doi: 10.22247/ijcna/2022/211630 – volume: 18 start-page: e0290831 issue: 9 year: 2023 ident: pone.0301760.ref046 article-title: Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend publication-title: PLOS ONE doi: 10.1371/journal.pone.0290831 – volume: 7 start-page: 1 issue: 2 year: 2020 ident: pone.0301760.ref032 article-title: Prime numbers and their analysis publication-title: Journal of Emerging Technologies and Innovative Research |
| SSID | ssj0053866 |
| Score | 2.454942 |
| Snippet | Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the... |
| SourceID | doaj unpaywall pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database |
| StartPage | e0301760 |
| SubjectTerms | Algorithms Analysis Cloud Computing Computer and Information Sciences Computer Security Data security Evaluation Information Storage and Retrieval Investment analysis Mathematical optimization Microcomputers Physical Sciences Research and Analysis Methods Safety and security measures |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Nb9MwFLfQLnBBjM9uAxkJie2Qzo4dOzkWxDSBgANM2s2yE7ur1CVVm2jiv-e9xC0NHODANU6U-H3-fs7zMyFvALNKJ1hIBGCDROapS2zGROLTAMk8aKDQuDTw-Yu6vJIfr7PrvaO-sCZsaA88CO6cOV1lNqg0iABQ2TtdOCeqXEkeskJ4jL4sL7ZkaojB4MVKxY1yQvPzqJfpqqn9FEmA7ltS_kpEfb_-P6PyXlr6vWTyflev7I87u1zu5aOLR-RhBJJ0NkzgkNzz9WNyGF11Q09jP-mzJ2QR19TntFw2XUWxKJRivfucbhA0thQcmUraQPS4jdsyqV3Om_Wivbmlp98-ya-zM4orttTSuqkThKYWT72j666meDw9bbG29im5uvjw_f1lEk9YSEpZ8DaR2slKZcA5uLM8L4ISSlsWgEQ54YUMIViVlTlnlWPKVsxKyHSOp9YF5hwTz8gBvNa_ILQCblMyeMJnQRae2wDQIU8rB_wllUJOSLIVt1kNjTRM_zdNAwEZRGZQPSaqZ0LeoU5292Ib7P4CGIeJxmH-ZhwT8hY1atBZQW2ljXsO4D3Y9srMdIEtDwXnE3IyuhOcrBwNv97ahMEhrEyrfdNtjIAoKAA3aZjh88FGdt8MVgjsMoORfGQ9o0mNR-rFTd_jG1BZihVoEzLdGdo_ye3of8jtmDxIAbzhXzOuTshBu-78SwBfrXvV-9lPaowupw priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbK9gAXoDzKQkFGQtAektqx4yTHBVFVIAoSVCoHFNmJvV2xTVa7iRAc-O3MJN5VU4QEB25RbCfxeDLzjedhQp4BZpVGMBcIwAaBTCMT6JiJwEYOlLlLwITGrYF3J-r4VL45i8-2yJd1LoynINiI83rVefLxoq7soafkIdYr6r2nIRcJX48IF9ApRICfKPa8qziEO2MNJiBdI9sqBqg-ItunJx8mn3tPcxSoiAmfTvenJw3UVVfV_3fZfUl5XQ2svN5WC_39m57PL2mto1vk53q-fbDK17BtTFj8uFIK8r8R5Da56fEunfRP2SFbtrpDdrxEWdF9X_b64C6Z-a3_KS3mdVtSjF2lGJY_pSvEtg0FeUMlrUHIXfjsUarn03o5a84v6P7Ht_L95IDixjLVtKqrABG0xsP56LKtKIyytMEQ4Hvk9Oj1p1fHgT8IIihkxptAJkaWKgbTiBvN08wpoRLNHNh6RlghnXNaxUXKWWmY0iXTEhSy4ZE2jhnDxH0ygtfaB4SWYIIVDEbY2MnMcu0A4aRRacDMiqSQYxKs1ztf9PU-8s7pl4Cd1JMsR8LmnrBj8hKZYtMXq3V3N2Clcr9COTNJGWunIiccmHvWJJkxokyV5C7OhB2TF8hSOcoU4JtC-9QIeA8ubj5JMqzMKDgfk71BT5AFxaD56Zopc2zCALrK1u0qFyCsBcC7BGa42zPp5ptFikZwDC3pgH0Hkxq2VLPzrhQ5gMcIA-XGJNxw-l_R7eG_DnhEbkSAJ9GRx9UeGTXL1j4GPNiYJ_6v_gWhf2U1 priority: 102 providerName: Unpaywall |
| Title | Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/38625954 https://www.proquest.com/docview/3040321574 https://pubmed.ncbi.nlm.nih.gov/PMC11020889 https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0301760&type=printable https://doaj.org/article/0b7d5af62f3f428eb79bb3d8641f593e |
| UnpaywallVersion | publishedVersion |
| Volume | 19 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: HH5 dateStart: 20060101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: KQ8 dateStart: 20060101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: KQ8 dateStart: 20061001 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: DOA dateStart: 20060101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: ABDBF dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: EBSCOhost Food Science Source customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: A8Z dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/login.aspx?authtype=ip,uid&profile=ehost&defaultdb=fsr providerName: EBSCOhost – providerCode: PRVBFR databaseName: Free Medical Journals customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: DIK dateStart: 20060101 isFulltext: true titleUrlDefault: http://www.freemedicaljournals.com providerName: Flying Publisher – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: GX1 dateStart: 20060101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: M~E dateStart: 20060101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: RPM dateStart: 20060101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: 7X7 dateStart: 20061201 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: BENPR dateStart: 20061201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: 8FG dateStart: 20061201 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVPQU databaseName: Public Health Database customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: 8C1 dateStart: 20061201 isFulltext: true titleUrlDefault: https://search.proquest.com/publichealth providerName: ProQuest – providerCode: PRVFZP databaseName: Scholars Portal Journals: Open Access customDbUrl: eissn: 1932-6203 dateEnd: 20250930 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: M48 dateStart: 20061201 isFulltext: true titleUrlDefault: http://journals.scholarsportal.info providerName: Scholars Portal |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELfG9gAviPFZGJWRkICHVHbs2MkDQt20MiGtmhCVylNkJ3Y3qUtKmwr233OXutXCl3jJQ5w0te_O9_vZ5ztCXgNmlVYwHwnABpFMYxuZhInIxR6cuddAoXFp4Hysziby0zSZ7pFtzdYwgKs_UjusJzVZzgc_vt18AIN_31Zt0Hz70mBRV26AEF8rIPEH4KsyLOZwLnf7CmDd7e4lopZIxUyEw3R_-5WOs2pz-v8-c99yXb-GVd5dVwtz893M57d81ugBuR_AJh1utOOQ7LnqITkM5ryib0PO6XePiAnr7jNazOt1STFwlGJM_IyuEFg2FIydSlrDDHMdjm5SM5_Vy6vm8priai41tKqrCGGrwYp4dLmuKJaupw3G3T4mk9Hpl5OzKFRfiAqZ8SaS2spSJcBHuDU8zbwSShvmgWBZ4YT03huVFClnpWXKlMxI8IKWx8Z6Zi0TT8g-fNY9I7QE3lMweMMlXmaOGw-wIo1LC9wmlkL2SLQd5nyxSbKRtzttGsjJZqhyFEsexNIjxyiL3bOYIru9US9nebC4nFldJsar2AsPHMtZnVkrylRJ7pNMuB55g5LMUbVAXIUJ5xHgO5gSKx_qDNMhCs575KjzJBhg0Wl-tdWFHJswaq1y9XqVC5ghBWAqDT18utGN3X8GTQTmmUBL2tGaTqe6LdXVZZv_GxBbjNFpPTLYKdh_jdvzf3fkBbkXA2TDvTKujsh-s1y7lwC5Gtsnd_RUwzU94XgdfeyTg-PT8cXnfruI0W-tDO5NxhfDrz8B9g8x3g |
| linkProvider | Scholars Portal |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbK9gAXoDzKQkFGQtAektqx4yTHBVFVIAoSVCoHFNmJvV2xTVa7iRAc-O3MJN5VU4QEB25RbCfxeDLzjedhQp4BZpVGMBcIwAaBTCMT6JiJwEYOlLlLwITGrYF3J-r4VL45i8-2yJd1LoynINiI83rVefLxoq7soafkIdYr6r2nIRcJX48IF9ApRICfKPa8qziEO2MNJiBdI9sqBqg-ItunJx8mn3tPcxSoiAmfTvenJw3UVVfV_3fZfUl5XQ2svN5WC_39m57PL2mto1vk53q-fbDK17BtTFj8uFIK8r8R5Da56fEunfRP2SFbtrpDdrxEWdF9X_b64C6Z-a3_KS3mdVtSjF2lGJY_pSvEtg0FeUMlrUHIXfjsUarn03o5a84v6P7Ht_L95IDixjLVtKqrABG0xsP56LKtKIyytMEQ4Hvk9Oj1p1fHgT8IIihkxptAJkaWKgbTiBvN08wpoRLNHNh6RlghnXNaxUXKWWmY0iXTEhSy4ZE2jhnDxH0ygtfaB4SWYIIVDEbY2MnMcu0A4aRRacDMiqSQYxKs1ztf9PU-8s7pl4Cd1JMsR8LmnrBj8hKZYtMXq3V3N2Clcr9COTNJGWunIiccmHvWJJkxokyV5C7OhB2TF8hSOcoU4JtC-9QIeA8ubj5JMqzMKDgfk71BT5AFxaD56Zopc2zCALrK1u0qFyCsBcC7BGa42zPp5ptFikZwDC3pgH0Hkxq2VLPzrhQ5gMcIA-XGJNxw-l_R7eG_DnhEbkSAJ9GRx9UeGTXL1j4GPNiYJ_6v_gWhf2U1 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+cloud+data+using+secret+key+4+optimization+algorithm+with+a+non-linearity+run+time+trend&rft.jtitle=PloS+one&rft.au=Frimpong%2C+Twum&rft.au=Hayfron+Acquah%2C+James+Benjamin&rft.au=Missah%2C+Yaw+Marfo&rft.au=Dawson%2C+John+Kwao&rft.date=2024-04-16&rft.pub=Public+Library+of+Science&rft.issn=1932-6203&rft.eissn=1932-6203&rft.volume=19&rft.issue=4&rft.spage=e0301760&rft_id=info:doi/10.1371%2Fjournal.pone.0301760&rft.externalDocID=A790344311 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-6203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-6203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-6203&client=summon |