2023
DOI: 10.12720/jait.14.1.130-137
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Cloud Data Security Using the Soldier Ant Algorithm

Abstract: Cloud computing is evolving as a firsthand archetype of large-scale distributed computing which adds more power to internet technologies. It is a framework aiming at convenient and on-request network access to an organized and shared pool of resources. Security of data transmitted and stored by a third party happens to be the greatest challenge for organizations embracing the technology. In this work, a proposed hybrid algorithm dubbed the Soldier Ant Algorithm (SAA) a blend of the Diffie-Hellman algorithm and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Despite being a revolutionary algorithm, their execution time depended on the amount of data executed. In the study of [ 29 ], the authors introduced the Soldier Ant Algorithm (SAA), which is a hybrid algorithm. The Diffie-Hellman algorithm and the Newton Forward and Backward Interpolation (Delta Encoding) method were integrated to improve cloud data security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Despite being a revolutionary algorithm, their execution time depended on the amount of data executed. In the study of [ 29 ], the authors introduced the Soldier Ant Algorithm (SAA), which is a hybrid algorithm. The Diffie-Hellman algorithm and the Newton Forward and Backward Interpolation (Delta Encoding) method were integrated to improve cloud data security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…With the innovative development of advanced technologies such as artificial intelligence, big data, cloud computing, and computers, many advanced technologies and methods have shown significant advantages in data collection, analysis, and chart making in literature research. Among them, Cloud computing is developing into a firsthand archetype of large-scale distributed computing, which not only adds more power to internet technology [2], Mapping Knowledge Domain(MKD) combines similarity matrix calculation, clustering analysis, information visualization analysis techniques, etc., using visualized graphs to vividly display the current status, hotspots, and trends of related research. Citespace, as an information visualization software used for measuring and analyzing scientific literature data, displays the development trends of a certain discipline or knowledge field in a specific period of time, analyzes the evolution of cuttingedge fields, generates a systematic visualization knowledge graph, and reveals the development laws.…”
Section: Introductionmentioning
confidence: 99%
“…This research proposes an algorithm to digitally sign sensitive messages, using the ElGamal cryptosystem called Digital signature algorithm based on ElGamal, Diffie-Hellman protocol and the number π (DSAπ). It is mentioned that using the Diffie-Hellman protocol it is possible to construct a common key, both for the sender and the recipient: [1] performed an authentication between communication devices using an identifier based on ElGamal, the elliptic curve and the signature digital, which as a result, reduced computational complexity and facilitates key management; Similarly, [2] proposed a hybrid algorithm integrating Diffie-Hellman algorithm and Delta Encoding technique (Newton Forward and Backward Interpolation); [3] highlights the advantages of key management with Diffie Hellman algorithms, where an image encryption algorithm with seed-generated keys was proposed. Several systems have been developed with different approaches to sign messages in order to verify the authentication of these [4,5].…”
Section: Introductionmentioning
confidence: 99%