مشخصات مقاله | |
ترجمه عنوان مقاله | یک رویکرد ترکیبی برای ایمن سازی و فشرده سازی جریان های داده در محیط محاسبات ابری |
عنوان انگلیسی مقاله | A hybrid approach to secure and compress data streams in cloud computing environment |
نشریه | الزویر |
انتشار | مقاله سال 2024 |
تعداد صفحات مقاله انگلیسی | 14 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
7.400 در سال 2022 |
شاخص H_index | 60 در سال 2024 |
شاخص SJR | 1.198 در سال 2022 |
شناسه ISSN | 2213-1248 |
شاخص Quartile (چارک) | Q1 در سال 2022 |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | مهندسی نرم افزار – رایانش ابری – هوش مصنوعی – مهندسی الگوریتم ها و محاسبات – امنیت اطلاعات |
نوع ارائه مقاله |
ژورنال |
مجله | مجله دانشگاه ملک سعود – علوم کامپیوتر و اطلاعات – Journal of King Saud University – Computer and Information Sciences |
دانشگاه | Arab Open University, Faculty of Computing, Egypt |
کلمات کلیدی | پردازش ابری – امنیت اطلاعات – رمزهای متقارن – متراکم سازی داده ها – جریان های داده – LZMA |
کلمات کلیدی انگلیسی | Cloud Computing – Information security – Symmetric ciphers – Data Compression – Data streams – LZMA |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.jksuci.2024.101999 |
لینک سایت مرجع | https://www.sciencedirect.com/science/article/pii/S1319157824000880 |
کد محصول | e17767 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract 1 introduction 2 Related work 3 The proposed approach 4 Experiment analysis 5 Conclusion and futurework Declaration of competing interest References |
بخشی از متن مقاله: |
Abstract Cloud computing has revolutionized the way businesses and individuals manage and utilize computing resources, providing significant benefits such as scalability, flexibility, and cost-effectiveness. However, the increasing use of cloud computing to store and transmit sensitive data has raised concerns about data security. Ensuring confidentiality and data integrity while enabling effective data transmission is a significant challenge. To overcome this issue, the proposed approach integrates encryption and compression methods to enhance transmission performance in the cloud and prevent unauthorized access to confidential information. This approach applies multiple layers of robust encryption algorithms, followed by LZMA, which aims to compress data size while ensuring data security. The proposed approach is well-suited for real-time implementation and delivers high encryption quality and compression capabilities. Various performance metrics evaluate its performance, including space-saving percentage, processing time, and the NIST randomness test. It provides a substantial improvement in space-saving percentage from 58.63% to 81.8%, ensuring efficiency. The security analysis confirms that ciphertexts generated by this approach pass all NIST tests, generating a 99% confidence level regarding the randomness of the ciphertext. The proposed hybrid approach offers an effective solution for addressing the challenges of securing sensitive data while taking advantage of the benefits of cloud computing. introduction Cloud computing has become an increasingly popular way in the networking and computer science field. It has given small and medium-scale businesses with a cost-saving opportunity to avoid the expense of purchasing hardware resources. It gives us an equal opportunity to shine as it enables users with access to a powerful computing resource without having to invest in expensive hardware or software. Cloud computing operates on the principle of virtualization, wherein a single large machine is utilized by multiple clients with a view that they have their dedicated resources. Due to the significant benefits of managing resources in unlimited storage in the most inexpensive way, business continuity, and scalability, cloud computing has had rapid growth in the IT industry, therefore, this technology has emerged as one of the most powerful innovations that has attracted the interest of technologists globally (Sajay, 2019). Cloud computing services can be classified into three primary categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). SaaS provides software packages, system software, and application-related server storage networks to end users such as Gmail. PaaS is used by application developers to create applications that are hosted in the cloud such as Google App Engine. IaaS deals with hardware services, virtual machines, and network architecture infrastructure such as Microsoft Azure (Mahesh et al., 2023). The deployment models include private cloud, public cloud, community cloud and hybrid cloud. Public clouds are available to everyone while private clouds are used by organizations. Community clouds are shared by multiple organizations and hybrid clouds combine both private and public clouds (El-Booz and Attiya, 2017, Thabit et al., 2021). Conclusion and futurework This research utilized a multi-layered security approach with compression to secure and compress text data streams while preserving the original data sequence without any changes. This research focused on developing a secure and efficient way of storing and transferring data streams in the cloud computing environment by incorporating existing encryption and data compression techniques, including symmetric key encryption techniques Rc4, AES, and the substitution cipher Vigenère, while AES is a more advanced encryption standard. Combining these techniques provided a more robust and comprehensive solution for data security while maintaining low storage of text data through LZMA compression. The proposed approach consists of seven stages in the encoding phase (sender Side) Initial Encryption, Decomposition, Substitution, Data size treatment, Compression, Encryption2, and Uploading Encrypted-compressed data in the cloud and the inverse on the (receiver side). Experimental results proved that the proposed approach achieved faster processing time compared to performing the encryption and compression techniques as separate steps. Security analysis demonstrated that the proposed approach for generating ciphertexts passed all NIST tests with a high level of confidence (99 %) in terms of ciphertext randomness. Additionally, compression efficiency analysis demonstrates that the proposed approach produced a significantly higher range of space-saving percentages (58.63 % to 81.8 %) compared to standard techniques while also providing adequate security. |