خلاصه
1. معرفی
2. کارهای مرتبط
3. رویکرد پیشنهادی
4. تجزیه و تحلیل آزمایش
5. نتیجه گیری و آینده کاری
اعلامیه منافع رقابتی
منابع
Abstract
1. introduction
2. Related work
3. The proposed approach
4. Experiment analysis
5. Conclusion and futurework
Declaration of competing interest
References
چکیده:
رایانش ابری شیوه مدیریت و استفاده از منابع محاسباتی توسط مشاغل و افراد را متحول کرده است و مزایای قابل توجهی مانند مقیاس پذیری، انعطاف پذیری و مقرون به صرفه بودن را ارائه می دهد. با این حال، استفاده روزافزون از محاسبات ابری برای ذخیره و انتقال داده های حساس، نگرانی هایی را در مورد امنیت داده ها ایجاد کرده است. اطمینان از محرمانه بودن و یکپارچگی داده ها در حالی که امکان انتقال موثر داده ها را فراهم می کند یک چالش مهم است. برای غلبه بر این مشکل، رویکرد پیشنهادی روشهای رمزگذاری و فشردهسازی را برای بهبود عملکرد انتقال در ابر و جلوگیری از دسترسی غیرمجاز به اطلاعات محرمانه ادغام میکند. این رویکرد چندین لایه از الگوریتمهای رمزنگاری قوی را اعمال میکند، به دنبال آن LZMA، که هدف آن فشردهسازی اندازه داده در عین حصول اطمینان از امنیت دادهها است. رویکرد پیشنهادی برای پیاده سازی بلادرنگ مناسب است و کیفیت رمزگذاری و قابلیت فشرده سازی بالایی را ارائه می دهد. معیارهای مختلف عملکرد، از جمله درصد صرفه جویی در فضا، زمان پردازش و تست تصادفی NIST، عملکرد آن را ارزیابی می کنند. این بهبود قابل توجهی در درصد صرفه جویی در فضا از 58.63٪ به 81.8٪، تضمین بهره وری ارائه می دهد. تجزیه و تحلیل امنیتی تأیید می کند که متون رمزی تولید شده توسط این رویکرد تمام تست های NIST را پشت سر می گذارند و سطح اطمینان 99٪ را در مورد تصادفی بودن متن رمز ایجاد می کنند. رویکرد ترکیبی پیشنهادی یک راه حل موثر برای پرداختن به چالش های ایمن سازی داده های حساس در حالی که از مزایای محاسبات ابری بهره می برد، ارائه می دهد.
Abstract
Cloud computing has revolutionized the way businesses and individuals manage and utilize computing resources, providing significant benefits such as scalability, flexibility, and cost-effectiveness. However, the increasing use of cloud computing to store and transmit sensitive data has raised concerns about data security. Ensuring confidentiality and data integrity while enabling effective data transmission is a significant challenge. To overcome this issue, the proposed approach integrates encryption and compression methods to enhance transmission performance in the cloud and prevent unauthorized access to confidential information. This approach applies multiple layers of robust encryption algorithms, followed by LZMA, which aims to compress data size while ensuring data security. The proposed approach is well-suited for real-time implementation and delivers high encryption quality and compression capabilities. Various performance metrics evaluate its performance, including space-saving percentage, processing time, and the NIST randomness test. It provides a substantial improvement in space-saving percentage from 58.63% to 81.8%, ensuring efficiency. The security analysis confirms that ciphertexts generated by this approach pass all NIST tests, generating a 99% confidence level regarding the randomness of the ciphertext. The proposed hybrid approach offers an effective solution for addressing the challenges of securing sensitive data while taking advantage of the benefits of cloud computing.
introduction
Cloud computing has become an increasingly popular way in the networking and computer science field. It has given small and medium-scale businesses with a cost-saving opportunity to avoid the expense of purchasing hardware resources. It gives us an equal opportunity to shine as it enables users with access to a powerful computing resource without having to invest in expensive hardware or software. Cloud computing operates on the principle of virtualization, wherein a single large machine is utilized by multiple clients with a view that they have their dedicated resources. Due to the significant benefits of managing resources in unlimited storage in the most inexpensive way, business continuity, and scalability, cloud computing has had rapid growth in the IT industry, therefore, this technology has emerged as one of the most powerful innovations that has attracted the interest of technologists globally (Sajay, 2019). Cloud computing services can be classified into three primary categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). SaaS provides software packages, system software, and application-related server storage networks to end users such as Gmail. PaaS is used by application developers to create applications that are hosted in the cloud such as Google App Engine. IaaS deals with hardware services, virtual machines, and network architecture infrastructure such as Microsoft Azure (Mahesh et al., 2023). The deployment models include private cloud, public cloud, community cloud and hybrid cloud. Public clouds are available to everyone while private clouds are used by organizations. Community clouds are shared by multiple organizations and hybrid clouds combine both private and public clouds (El-Booz and Attiya, 2017, Thabit et al., 2021).
Conclusion and futurework
This research utilized a multi-layered security approach with compression to secure and compress text data streams while preserving the original data sequence without any changes. This research focused on developing a secure and efficient way of storing and transferring data streams in the cloud computing environment by incorporating existing encryption and data compression techniques, including symmetric key encryption techniques Rc4, AES, and the substitution cipher Vigenère, while AES is a more advanced encryption standard. Combining these techniques provided a more robust and comprehensive solution for data security while maintaining low storage of text data through LZMA compression. The proposed approach consists of seven stages in the encoding phase (sender Side) Initial Encryption, Decomposition, Substitution, Data size treatment, Compression, Encryption2, and Uploading Encrypted-compressed data in the cloud and the inverse on the (receiver side). Experimental results proved that the proposed approach achieved faster processing time compared to performing the encryption and compression techniques as separate steps. Security analysis demonstrated that the proposed approach for generating ciphertexts passed all NIST tests with a high level of confidence (99 %) in terms of ciphertext randomness. Additionally, compression efficiency analysis demonstrates that the proposed approach produced a significantly higher range of space-saving percentages (58.63 % to 81.8 %) compared to standard techniques while also providing adequate security.