مقاله انگلیسی رایگان در مورد روش ترکیبی برای ایمن سازی و فشرده سازی جریان های داده در محیط محاسبات ابری – الزویر 2024

 

مشخصات مقاله
ترجمه عنوان مقاله یک رویکرد ترکیبی برای ایمن سازی و فشرده سازی جریان های داده در محیط محاسبات ابری
عنوان انگلیسی مقاله A hybrid approach to secure and compress data streams in cloud computing environment
نشریه الزویر
انتشار مقاله سال 2024
تعداد صفحات مقاله انگلیسی 14 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
7.400 در سال 2022
شاخص H_index 60 در سال 2024
شاخص SJR 1.198 در سال 2022
شناسه ISSN 2213-1248
شاخص Quartile (چارک) Q1 در سال 2022
فرضیه ندارد
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط مهندسی نرم افزار – رایانش ابری – هوش مصنوعی – مهندسی الگوریتم ها و محاسبات – امنیت اطلاعات
نوع ارائه مقاله
ژورنال
مجله  مجله دانشگاه ملک سعود – علوم کامپیوتر و اطلاعات – Journal of King Saud University – Computer and Information Sciences
دانشگاه Arab Open University, Faculty of Computing, Egypt
کلمات کلیدی پردازش ابری – امنیت اطلاعات – رمزهای متقارن – متراکم سازی داده ها – جریان های داده – LZMA
کلمات کلیدی انگلیسی Cloud Computing – Information security – Symmetric ciphers – Data Compression – Data streams – LZMA
شناسه دیجیتال – doi
https://doi.org/10.1016/j.jksuci.2024.101999
لینک سایت مرجع https://www.sciencedirect.com/science/article/pii/S1319157824000880
کد محصول e17767
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
1 introduction
2 Related work
3 The proposed approach
4 Experiment analysis
5 Conclusion and futurework
Declaration of competing interest
References

بخشی از متن مقاله:

Abstract

Cloud computing has revolutionized the way businesses and individuals manage and utilize computing resources, providing significant benefits such as scalability, flexibility, and cost-effectiveness. However, the increasing use of cloud computing to store and transmit sensitive data has raised concerns about data security. Ensuring confidentiality and data integrity while enabling effective data transmission is a significant challenge. To overcome this issue, the proposed approach integrates encryption and compression methods to enhance transmission performance in the cloud and prevent unauthorized access to confidential information. This approach applies multiple layers of robust encryption algorithms, followed by LZMA, which aims to compress data size while ensuring data security. The proposed approach is well-suited for real-time implementation and delivers high encryption quality and compression capabilities. Various performance metrics evaluate its performance, including space-saving percentage, processing time, and the NIST randomness test. It provides a substantial improvement in space-saving percentage from 58.63% to 81.8%, ensuring efficiency. The security analysis confirms that ciphertexts generated by this approach pass all NIST tests, generating a 99% confidence level regarding the randomness of the ciphertext. The proposed hybrid approach offers an effective solution for addressing the challenges of securing sensitive data while taking advantage of the benefits of cloud computing.

introduction

Cloud computing has become an increasingly popular way in the networking and computer science field. It has given small and medium-scale businesses with a cost-saving opportunity to avoid the expense of purchasing hardware resources. It gives us an equal opportunity to shine as it enables users with access to a powerful computing resource without having to invest in expensive hardware or software. Cloud computing operates on the principle of virtualization, wherein a single large machine is utilized by multiple clients with a view that they have their dedicated resources. Due to the significant benefits of managing resources in unlimited storage in the most inexpensive way, business continuity, and scalability, cloud computing has had rapid growth in the IT industry, therefore, this technology has emerged as one of the most powerful innovations that has attracted the interest of technologists globally (Sajay, 2019). Cloud computing services can be classified into three primary categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). SaaS provides software packages, system software, and application-related server storage networks to end users such as Gmail. PaaS is used by application developers to create applications that are hosted in the cloud such as Google App Engine. IaaS deals with hardware services, virtual machines, and network architecture infrastructure such as Microsoft Azure (Mahesh et al., 2023). The deployment models include private cloud, public cloud, community cloud and hybrid cloud. Public clouds are available to everyone while private clouds are used by organizations. Community clouds are shared by multiple organizations and hybrid clouds combine both private and public clouds (El-Booz and Attiya, 2017, Thabit et al., 2021).

Conclusion and futurework

This research utilized a multi-layered security approach with compression to secure and compress text data streams while preserving the original data sequence without any changes. This research focused on developing a secure and efficient way of storing and transferring data streams in the cloud computing environment by incorporating existing encryption and data compression techniques, including symmetric key encryption techniques Rc4, AES, and the substitution cipher Vigenère, while AES is a more advanced encryption standard. Combining these techniques provided a more robust and comprehensive solution for data security while maintaining low storage of text data through LZMA compression. The proposed approach consists of seven stages in the encoding phase (sender Side) Initial Encryption, Decomposition, Substitution, Data size treatment, Compression, Encryption2, and Uploading Encrypted-compressed data in the cloud and the inverse on the (receiver side). Experimental results proved that the proposed approach achieved faster processing time compared to performing the encryption and compression techniques as separate steps. Security analysis demonstrated that the proposed approach for generating ciphertexts passed all NIST tests with a high level of confidence (99 %) in terms of ciphertext randomness. Additionally, compression efficiency analysis demonstrates that the proposed approach produced a significantly higher range of space-saving percentages (58.63 % to 81.8 %) compared to standard techniques while also providing adequate security.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا