shree, S. Raja and Chilambu Chelvan, A. and Rajesh, M. (2021) Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA. 2020 International Conference on Computer Communication and Informatics (ICCCI). pp. 1-5.
![[thumbnail of 2195.pdf]](https://ir.vistas.ac.in/style/images/fileicons/text.png)
2195.pdf
Download (278kB)
Abstract
Abstract: Optimization plays an important role in many
problems that expect the accurate output. Security of the
data stored in remote servers purely based on secret key
which is used for encryption and decryption purpose.
Many secret key generation algorithms such as RSA,
AES are available to generate the key. The key generated
by such algorithms are need to be optimized to provide
more security to your data from unauthorized users as
well as from the third party auditors(TPA) who is going
to verify our data for integrity purpose. In this paper a
method to optimize the secret key by using cuckoo search
algorithm (CSA) is proposed.
Item Type: | Article |
---|---|
Subjects: | Computer Science > Operating System |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 11 Sep 2024 06:37 |
Last Modified: | 11 Sep 2024 06:37 |
URI: | https://ir.vistas.ac.in/id/eprint/5537 |