Secure Algorithm Using Encoding, Mathematical Key Generation and Redundancy in Cloud Computing

Main Article Content

Rimpi Rani, R.K. Bathla

Abstract

This research paper explores the design and implementation of a customized encryption algorithm tailored to meet the unique security challenges of cloud computing environments. We discuss the algorithm's structure, customization options, and its potential benefits in enhancing data security within cloud-based applications. We introduce a tailored encryption algorithm that incorporates encoding, mathematical key generation and redundancy bits techniques to optimize data security, integrity, and efficiency within the cloud. A secure enhanced algorithm is developed. Customized encoding methods are employed to enhance data representation and facilitate efficient encryption and decryption. This includes the conversion of data into binary format for subsequent encryption. Redundancy bits are introduced into the encryption process to provide error detection and correction capabilities. The integration of these bits ensures data integrity, particularly during data transmission and storage. Random key is generated using Mathematical function. Experimental results demonstrate the algorithm's performance in terms of encryption and decryption times, file size comparisons, and data integrity measurements. Proposed Algorithm shows encryption time does not increases if the size of file bit increases. It increases only when size increases too much. It shows that encryption time is zero when size is small. With the increase of size decryption time also increases. When proposed algorithm is compared with traditional algorithm it takes less time. than RSA. However, encryption time and decryption time also depends on performance of system. Results may be differed. A novel algorithm is developed to improve the security of cloud computing. It has adopted three levels: the first level uses the Encoding Techniques. In second level: Redundancy bits are introduced Random key is generated using Mathematical function logical-mathematical function

Article Details

How to Cite
R.K. Bathla, R. R. (2024). Secure Algorithm Using Encoding, Mathematical Key Generation and Redundancy in Cloud Computing. International Journal on Recent and Innovation Trends in Computing and Communication, 11(11), 968–975. Retrieved from https://ijritcc.org/index.php/ijritcc/article/view/10466
Section
Articles