Securing cloud data using secret key 4 optimization algorithm
Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as...
Saved in:
| Published in | PloS one Vol. 19; no. 4; p. e0301760 |
|---|---|
| Main Authors | , , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Public Library of Science
16.04.2024
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1932-6203 1932-6203 |
| DOI | 10.1371/journal.pone.0301760 |
Cover
| Abstract | Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm's mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA's standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times. |
|---|---|
| AbstractList | Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the customer's direct personal involvement. Cloud computing has developed dramatically among many organizations due to its benefits such as cost savings, resource pooling, broad network access, and ease of management; nonetheless, security has been a major concern. Researchers have proposed several cryptographic methods to offer cloud data security; however, their execution times are linear and longer. A Security Key 4 Optimization Algorithm (SK4OA) with a non-linear run time is proposed in this paper. The secret key of SK4OA determines the run time rather than the size of the data as such is able to transmit large volumes of data with minimal bandwidth and able to resist security attacks like brute force since its execution timings are unpredictable. A data set from Kaggle was used to determine the algorithm's mean and standard deviation after thirty (30) times of execution. Data sizes of 3KB, 5KB, 8KB, 12KB, and 16 KB were used in this study. There was an empirical analysis done against RC4, Salsa20, and Chacha20 based on encryption time, decryption time, throughput and memory utilization. The analysis showed that SK4OA generated lowest mean non-linear run time of 5.545±2.785 when 16KB of data was executed. Additionally, SK4OA's standard deviation was greater, indicating that the observed data varied far from the mean. However, RC4, Salsa20, and Chacha20 showed smaller standard deviations making them more clustered around the mean resulting in predictable run times. |
| Audience | Academic |
| Author | Ayawli, Ben Beklisi Kwame Baah, Philemon Sam, Samuel Akyeramfo Dawson, John Kwao Frimpong, Twum Hayfron Acquah, James Benjamin Missah, Yaw Marfo |
| Author_xml | – sequence: 1 fullname: Frimpong, Twum – sequence: 2 fullname: Hayfron Acquah, James Benjamin – sequence: 3 fullname: Missah, Yaw Marfo – sequence: 4 fullname: Dawson, John Kwao – sequence: 5 fullname: Ayawli, Ben Beklisi Kwame – sequence: 6 fullname: Baah, Philemon – sequence: 7 fullname: Sam, Samuel Akyeramfo |
| BookMark | eNqFj8FKAzEURYNUsK3-gYusBBdT8_KSmcnCRSlWC4WCFbclzaTTqWlSJhlQv16LLurK1b0cDhfugPR88JaQa2AjwALudqFrvXajwzceMWRQ5OyM9EEhz3LOsHfSL8ggxh1jEss875P7pTVd2_iaGhe6ilY6adrFI4jWtDbRN_tBBQ2H1OybT52a4Kl2dWibtN1fkvONdtFe_eaQLKcPL5OnbL54nE3G86xWCjLOOFjFCuAFrg1qLIVUSq5FXpWqFMZwhRsh0ShTQSkVCAYocmk3a65A4pDc_qzW2tlV403wyb6nWncxrmbL59W4UAyFQIB_3MXrX_fmxN1a7dI2BtcdP8ZT8QtHsWks |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2024 Public Library of Science |
| Copyright_xml | – notice: COPYRIGHT 2024 Public Library of Science |
| DBID | IOV ISR |
| DOI | 10.1371/journal.pone.0301760 |
| DatabaseName | Gale In Context: Opposing Viewpoints Gale In Context: Science |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| EISSN | 1932-6203 |
| ExternalDocumentID | A790344311 |
| GeographicLocations | Ghana |
| GeographicLocations_xml | – name: Ghana |
| GroupedDBID | --- 123 29O 2WC 53G 5VS 7RV 7X2 7X7 7XC 88E 8AO 8C1 8CJ 8FE 8FG 8FH 8FI 8FJ A8Z AAFWJ AAUCC AAWOE ABDBF ABIVO ABJCF ABUWG ACGFO ACIHN ACIWK ACPRK ACUHS ADBBV AEAQA AENEX AEUYN AFKRA AFPKN AFRAH AHMBA ALIPV ALMA_UNASSIGNED_HOLDINGS AOIJS APEBS ARAPS ATCPS BAWUL BBNVY BBORY BCNDV BENPR BGLVJ BHPHI BKEYQ BPHCQ BVXVI BWKFM CCPQU CS3 D1I D1J D1K DIK DU5 E3Z EAP EAS EBD EMOBN ESX EX3 F5P FPL FYUFA GROUPED_DOAJ GX1 HCIFZ HH5 HMCUK HYE IAO IEA IGS IHR IHW INH INR IOV IPY ISE ISR ITC K6- KB. KQ8 L6V LK5 LK8 M0K M1P M48 M7P M7R M7S M~E NAPCQ O5R O5S OK1 P2P P62 PATMY PDBOC PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO PTHSS PV9 PYCSY RNS RPM RZL SV3 TR2 UKHRP WOQ WOW ~02 ~KM ESTFP OVT PJZUB PPXIY PQGLB |
| ID | FETCH-LOGICAL-g991-2021e9071273bc3a3845995b46d8984cc293f453c9cd185914013465efb29153 |
| IEDL.DBID | M48 |
| ISSN | 1932-6203 |
| IngestDate | Thu Oct 16 16:00:25 EDT 2025 Thu Oct 16 16:21:10 EDT 2025 Thu May 22 21:25:24 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-g991-2021e9071273bc3a3845995b46d8984cc293f453c9cd185914013465efb29153 |
| PageCount | e0301760 |
| ParticipantIDs | gale_incontextgauss_ISR_A790344311 gale_incontextgauss_IOV_A790344311 gale_healthsolutions_A790344311 |
| PublicationCentury | 2000 |
| PublicationDate | 20240416 |
| PublicationDateYYYYMMDD | 2024-04-16 |
| PublicationDate_xml | – month: 04 year: 2024 text: 20240416 day: 16 |
| PublicationDecade | 2020 |
| PublicationTitle | PloS one |
| PublicationYear | 2024 |
| Publisher | Public Library of Science |
| Publisher_xml | – name: Public Library of Science |
| SSID | ssj0053866 |
| Score | 2.449652 |
| Snippet | Cloud computing alludes to the on-demand availability of personal computer framework resources, primarily information storage and processing power, without the... |
| SourceID | gale |
| SourceType | Aggregation Database |
| StartPage | e0301760 |
| SubjectTerms | Algorithms Analysis Cloud computing Evaluation Mathematical optimization |
| Title | Securing cloud data using secret key 4 optimization algorithm |
| Volume | 19 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: HH5 dateStart: 20060101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: KQ8 dateStart: 20060101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: KQ8 dateStart: 20061001 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: DOA dateStart: 20060101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: ABDBF dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: EBSCOhost Food Science Source customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: A8Z dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/login.aspx?authtype=ip,uid&profile=ehost&defaultdb=fsr providerName: EBSCOhost – providerCode: PRVBFR databaseName: Free Medical Journals customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: DIK dateStart: 20060101 isFulltext: true titleUrlDefault: http://www.freemedicaljournals.com providerName: Flying Publisher – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: GX1 dateStart: 20060101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: M~E dateStart: 20060101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: RPM dateStart: 20060101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: 7X7 dateStart: 20061201 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: Proquest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: BENPR dateStart: 20061201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: 8FG dateStart: 20061201 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVPQU databaseName: Public Health Database customDbUrl: eissn: 1932-6203 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: 8C1 dateStart: 20061201 isFulltext: true titleUrlDefault: https://search.proquest.com/publichealth providerName: ProQuest – providerCode: PRVFZP databaseName: Scholars Portal Journals: Open Access customDbUrl: eissn: 1932-6203 dateEnd: 20250930 omitProxy: true ssIdentifier: ssj0053866 issn: 1932-6203 databaseCode: M48 dateStart: 20061201 isFulltext: true titleUrlDefault: http://journals.scholarsportal.info providerName: Scholars Portal |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5KvXgR6wProy7iQQ8p2ewjyaFIEUsVqmCt9FaSzW4U2kSbFPTfO5uupQeF3mcXZoeZ-WbnhdAlFb5myg0dJUEMjEfCiaSrHZ5ocBCxJrpKFwweRX_EHsZ8XEO_O1vtAxZ_hnZmn9RoPm1_fX7fgMJ3qq0NPvk91P7IM9U2EN8XEMRvga8KzTKHAVvlFUC7q-ylQS2O8Fxqm-n-u8Xa6TWP09tFOxYq4u5Stg1UU9kealhlLPCVnRh9vY869tc8xXKaLxJsyj6xqWhPcWFgYYlBVTHDOdiHmW28xNE0zefv5dvsAA17dy-3fcfuRXBSU6fkgVtWENMSQB6xpBENmJkaFjORBGHApAQPrhmnMpQJMePpTAjFBFc69kIwcIeongGPRwhTTjkByOElwmWJDmOmAjfiXsKoHyvuNtG5YX-ybMlc6cKk64dmUiAlpIkuKgozSSIzpSpptCiKyf3T6wZEw-c1ouNNbjpB28B9VTlDxCmql_OFOgNQUMatKphuVdL-AZ1AtCE |
| linkProvider | Scholars Portal |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+cloud+data+using+secret+key+4+optimization+algorithm&rft.jtitle=PloS+one&rft.au=Frimpong%2C+Twum&rft.au=Hayfron+Acquah%2C+James+Benjamin&rft.au=Missah%2C+Yaw+Marfo&rft.au=Dawson%2C+John+Kwao&rft.date=2024-04-16&rft.pub=Public+Library+of+Science&rft.issn=1932-6203&rft.eissn=1932-6203&rft.volume=19&rft.issue=4&rft.spage=e0301760&rft_id=info:doi/10.1371%2Fjournal.pone.0301760&rft.externalDBID=IOV&rft.externalDocID=A790344311 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-6203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-6203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-6203&client=summon |