Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA

shree, S. Raja and Chilambu Chelvan, A. and Rajesh, M. (2021) Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA. 2020 International Conference on Computer Communication and Informatics (ICCCI). pp. 1-5.

[thumbnail of 2195.pdf] Text
2195.pdf

Download (278kB)

Abstract

Abstract: Optimization plays an important role in many
problems that expect the accurate output. Security of the
data stored in remote servers purely based on secret key
which is used for encryption and decryption purpose.
Many secret key generation algorithms such as RSA,
AES are available to generate the key. The key generated
by such algorithms are need to be optimized to provide
more security to your data from unauthorized users as
well as from the third party auditors(TPA) who is going
to verify our data for integrity purpose. In this paper a
method to optimize the secret key by using cuckoo search
algorithm (CSA) is proposed.

Item Type: Article
Subjects: Computer Science > Operating System
Divisions: Computer Science
Depositing User: Mr IR Admin
Date Deposited: 11 Sep 2024 06:37
Last Modified: 11 Sep 2024 06:37
URI: https://ir.vistas.ac.in/id/eprint/5537

Actions (login required)

View Item
View Item