CFP last date
20 December 2024
Reseach Article

Fuzzy Elgamal Technique for Securing Data Over Cloud

by Vipin Saxena, Karam Veer Singh, Banshidhar Choudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 51
Year of Publication: 2023
Authors: Vipin Saxena, Karam Veer Singh, Banshidhar Choudhary
10.5120/ijca2023922642

Vipin Saxena, Karam Veer Singh, Banshidhar Choudhary . Fuzzy Elgamal Technique for Securing Data Over Cloud. International Journal of Computer Applications. 184, 51 ( Mar 2023), 38-44. DOI=10.5120/ijca2023922642

@article{ 10.5120/ijca2023922642,
author = { Vipin Saxena, Karam Veer Singh, Banshidhar Choudhary },
title = { Fuzzy Elgamal Technique for Securing Data Over Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2023 },
volume = { 184 },
number = { 51 },
month = { Mar },
year = { 2023 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number51/32654-2023922642/ },
doi = { 10.5120/ijca2023922642 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:37.300992+05:30
%A Vipin Saxena
%A Karam Veer Singh
%A Banshidhar Choudhary
%T Fuzzy Elgamal Technique for Securing Data Over Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 51
%P 38-44
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the most popular computing approach among the scientists and engineers and lots of data are uploaded and downloaded from the cloud servers across 365x24x7 hours using high speed internet services. As the hackers are also watching transfer of the important data especially related to digital currency, hence, there is need to develop secure technique for uploading and downloading the data in secure manner. The present work is an attempt in this direction and Elgamal approach has been converted into the fuzzy based Elgamal approach for secure access of the data through cloud servers. The approach is tested by taking a case study and the results are reported in the form of tables and graphs.

References
  1. Davida, G., Wells, D. L., and Kam, J. B.,A Database Encryption System with Sub-Keys, ACM Transactions on Database Systems;1981; 6(2): 312–328.
  2. He, J. and Wang, M., Cryptography and Relational Database Management System, IDEAS;2001; 273–284.
  3. Oracle, Oracle9i Database Security for e-Business, An Oracle White Paper, June 2001.
  4. Hacig¨um¨us, H., Iyer, B., andMehrotraS.,Providing Database as a Service, Proceedings of ICDE; 2002; 29– 38.
  5. Brown, H., Considerations in Implementing aDatabase Management System Encryption Security Solution, Research Report Presented to The Department of Computer Science at the University of Cape Town, 2003.
  6. Chang,Weng-Long,MinyiGuo and Ho, M.S.,Fast Parallel Molecular Algorithms for DNA-based, International Journal of Computer Applications (0975 – 8887); October 2013, 79(14).
  7. Kumar, N. and Arya, Y. D. S., Rate Controlled Adaptive Resource Coordination Framework for Wireless Aware Multimedia Applications, International Journal of Computer Science and Network Security; 2010; 10(12): 99-105.
  8. OMG, UnifiedModeling Language Specification, 2010, http://www.omg.org.
  9. MeikangQiu, Chen WenzhongGao Min, NiuJian-Wei and Zhang Lei,Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System,SmartGrid, IEEE Transactions; 2011; 2(4), 715 – 723.
  10. Singhal,Nidhi and RainaJ.P.S.,Comparative Analysis of AES and RC4 Algorithms for Better Utilization, International Journal of Computer Trends and Technology- July to Aug Issue 2011.
  11. Cuzzocrea, A., and Russo, V., Privacy Preserving OLAP and OLAP Security. In Encyclopedia of Data Warehousing and Mining, Second Edition. 2011. https://doi.org/10.4018/978-1-60566-010-3.ch241
  12. Kumar,Narander,Verma,VishalandSaxenaVipin, Data Cube Representation for Vehicle Insurance Policy System, International Journal of Computer and Application;2012; 58(1): 1-4.
  13. Bhati,Sunita, Bhati, Anita and Sharma, S. K., A New Approach towards Encryption Schemes: Byte–Rotation Encryption Algorithm, Proceedings of the World Congress on Engineering and Computer Science;2012; 2:1-4.
  14. Madanayake,Ravindu,Peiris,Nikila andRanaweera,Gayan, Advanced Encryption Algorithm using Fuzzy Logic, International Conference on Information and Computer Networks, IACSIT Press Singapore;2012; 27: 32-36.
  15. Maram,Balajee, Rao, K. Lakshmanaand Kumar, Y.Ramesh, Encryption and Decryption Algorithm using 2-D Matrices, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X;2013; 3(4):352-356.
  16. Khan, Ayesha, Bhanarkar,Parul and Patil,Pragati, RSA Encryption Technique based on Geo Location, International Journal of Advanced Research in Computer Science and Software Engineering; ISSN: 2277 128X;2013; 3(4):352-356.
  17. Bhagat,Priti, V., Satpute,Kaustubh, S. andPalekar,Vikas, R., ReverseEncryption Algorithm: A Technique for Encryption andDecryption, International Journal of Latest Trends in Engineering and Technology;2013;2(1): 99-95.
  18. Bhosle,Amol and Pandey,Yogadhar, ApplyingSecurity to Data using Symmetric Encryption in MANET, International Journal of Emerging Technology and Advanced Engineering;2013; 3(1): 426-430.
  19. Singh, Pia and Singh,Karamjeet, Image Encryption and Decryption usingBlowfish Algorithm in MATLAB, International Journal of Scientific & Engineering Research;2013; 4(7): 150-154.
  20. Chaudhari,MohiniandSaxena,Kanak, Fast and Secure Data Transmission using Symmetric Encryption and Loss-less Compression, International Journal of Computer Science and Mobile Computing;2013; 2(2): 58 – 63.
  21. Jamgekar,Rajan, S. andJoshi,Geeta, Shantanu, File Encryption and Decryption using Secure RSA, International Journal of Emerging Science and Engineering (IJESE);2013; 1(4): 11-14.
  22. Rad Reza,Moradi, Attar,Abdolrahman and Ebrahimi,Atani Reza, A Comprehensive Layer based Encryption Method for Visual Data, International Journal of Signal Processing, Image Processing and Pattern Recognition; February 2013; 6(1): 37-48.
  23. Pal,Mukul, Chandra, Data Security and Cryptography based on DNA Sequencing, International Journal of Computer Applications; July/August 2013;10(3):1-9.
  24. Kaur,Manpreet and Singh,Rajbir, Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing, International Journal of Computer Applications (0975 – 8887);May 2013;70(18): 1-6.
  25. Sharma,RichaKumari, Biradar, S.R. and Singh, B.P., Shared Architecture forEncryption/Decryption of AES, International Journal of Computer Applications; May 2013;69(18): 1-6.
  26. Dehkordi, M. N., ANovel Association Rule Hiding Approach in OLAP Data Cubes, Indian Journal of Science and Technology;2013; 6(2): 1–13. https://doi.org/10.17485/ijst/2013/v6i2.17
  27. Blanco, C. and de Guzmán, I. G. R., Fernández-Medina, E., and Trujillo, J,Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications,Journal of Universal Computer Science;2014; 20(2). https://doi.org/10.3217/jucs-020-02-0079
  28. Blanco, C., G., Fernández-Medina, E., and Trujillo, J., An MDA Approach for Developing Secure OLAP Applications:Metamodels and Transformations, Computer Science and Information Systems; 2015; 12(2):541–565. https://doi.org/10.2298/CSIS140617007B
  29. Ravi, C. N., andNalini, Chidambaram, C, Comparative Study on OLAP Security and Integrity in Data Warehousing, International Journal of Pharmacy and Technology; 2016;8(4).
  30. Gupta, A., and Shandilya, K,SecurityTools for Data Warehousein Data Storage, Journal of Systems, Management and Security Issues, 2017
  31. Prarthana, T. S., and Gangadhar, N. D., UserBehaviourAnomaly Detection in Multidimensional Data, Proceedings - 2017 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2017; 2018-January.https://doi.org/10.1109/CCEM.2017.19.
  32. Ranasinghe, R., and Athukorala, P, AGeneralization of the ElGamalPublic-key Cryptosystem,Journal of Discrete Mathematical Sciences and Cryptography;2021.https://doi.org/10.1080/09720529.2020.1857902.
  33. Saif, H. A., Gharib, G. M. I., and AL-Mousa, M. R, AMathematicalProposed Model for Public Key Encryption Algorithm in Cybersecurity, Advances in Mathematics: Scientific Journal;2021;10(9). 2021.https://doi.org/10.37418/amsj.10.9.1.
  34. Shen. Y., Sun. Z. and Zhou. T, Survey on Asymmetric Cryptography Algorithms, International Conference on Electronic Information Engineering and Computer Science; EIECS 2021. 2021. https://doi.org/10.1109/EIECS53707.2021.9588106.
  35. Umapathy, K., andKhare,N., PPHE-Automatic Detection of Sensitive Attributes in a Privacy Preserved Hadoop Environment using Data Mining Techniques. International Journal of Computer Aided Engineering and Technology;2021; 14(3). https://doi.org/10.1504/IJCAET.2021.114488.
  36. Bufalo, M., Bufalo, D., and Orlando, G., ANote on the Computation of the Modular Inverse for Cryptography. Axioms; 2021; 10(2). https://doi.org/10.3390/axioms10020116.
  37. Madhu, A., and Prajeesha,P., Prevention of FDI Attacks in Smart Meter by providing Multi-Layer Authentication using El-Gamal and SHA, Proceedings-5th International Conference on Computing Methodologies and Communication, ICCMC 2021. https://doi.org/10.1109/ICCMC51019.2021.9418464.
  38. Maxrizal and Irawadi S., Nonsingular Matrix as Private Key on ElGamalCryptosystem, Journal of Physics: Conference Series; 2021; 1821(1).https://doi.org/10.1088/1742-6596/1821/1/ 012018.
  39. Charles, V. B., Surendran, D., and Suresh,Kumar A, HeartDisease Data based Privacy Preservation using Enhanced ElGamal and ResNetClassified, Biomedical Signal Processing and Control, 7; 2022. https://doi.org/10.1016/j.bspc.2021.103185.
  40. AUTHORS’ PROFILES
  41. Prof. Vipin Saxena received his Ph.D. degree from Indian Institute of Technology, Roorkee, Uttarakhand, India. Presently, he is working as Professor in Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, India. He has published more than 190 research articles in the International and National Journals and Conferences, authored 05 books in the field of Computer Science and Scientific Computing, attended 55 International and National Conferences and received three Natio
  42. Karm Veer Singh received his Ph.D. degree from Indian Institute of Technology (BHU), Varanasi, India. He is working as Assistant Professor in Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, India. His research interests include Multimedia Information Retrieval, Pattern Recognition, Mathematical Modeling, Data Science, Medical Imaging, Quantum Neural Networks, Reliability, Cyber Security and Artificial Intelligence.
  43. Banshidhar Choudhary received Post Graduate Degree in Computer Applications (M.C.A.) from Indira Gandhi National Open University, New Delhi in 2002 and M.Phil. Degree from Madurai Kamraj University in 2007 and currently a research scholar in the Department of Computer Science, Babasaheb Bhimrao Ambedkar University. He has 15 years of teaching experience in Computer Science field in the various Indian Universities and 03 years in the Al-Jabal Al-Garbi University, Libya. Currently, he is solving t
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Service Data Cube Security Challenge Fuzzy logic and Elgamal Technique