admin, admin and Kathirvelu, Kalaivani (2024) A Hybrid Logistic Scroll Chaotic Encryption Algorithm for Ensuring the Cloud Security to Counerfeiting the Attacks. Journal of Intelligent Systems and Internet of Things, 12 (2). pp. 138-149.
![[thumbnail of 41722103907.pdf]](https://ir.vistas.ac.in/style/images/fileicons/text.png)
41722103907.pdf
Download (951kB)
Abstract
A Hybrid Logistic Scroll Chaotic Encryption Algorithm for Ensuring the Cloud Security to Counerfeiting the Attacks Department of Computer Science and Engineering, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai admin admin Department of Computer Science and Engineering, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai Kalaivani Kathirvelu
Cloud computing is meant for storing the huge data using third party that ensures that confidential data cannot be accessed by the other users. But with rapid growth of technologies, data in the cloud normally increases which questions its security in storing in the cloud. Hence the protecting the cloud data seeks the strong security levels to counterfeit the different cloud attack. In order to achieve the highest level of security for cloud data, this study suggests a powerful encryption technique that combines chaotic scrolls and logistic maps. The proposed model exhibits the following advantages over the other algorithms: 1) High dynamic key generation 2) ability to counterfeit the multiple attacks 3) High randomness encrypted data which can provide more confusion of hacking from the intruder’s insight. To prove the strength of the proposed model, NIST National Institute of Science and Technology (NIST) is used for significant experiments. in which different statistical tests were carried out to prove the strength of the proposed model. The level of security of the suggested model is also evaluated and investigated using formal analysis using Burrows-Abadi-Needham Logic (BAN). The given model is thoroughly verified using both the Profverif tool and AVISPA. In terms of communication costs and unpredictability, the suggested model's randomness has also been contrasted with that of another existing algorithm. Results demonstrates that the proposed model shows its ability to provide more potent protection to the cloud data than the other existing encryption algorithms.
2024 2024 138 149 10.54216/JISIoT.120210 https://www.americaspg.com/articleinfo/18/show/2710
Item Type: | Article |
---|---|
Subjects: | Computer Science Engineering > Algorithms |
Domains: | Computer Science Engineering |
Depositing User: | Mr IR Admin |
Date Deposited: | 22 Aug 2025 10:44 |
Last Modified: | 22 Aug 2025 10:44 |
URI: | https://ir.vistas.ac.in/id/eprint/10499 |