72
Views
0
CrossRef citations to date
0
Altmetric
Articles

Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm

, &
Pages 494-503 | Received 19 May 2022, Accepted 20 Jul 2022, Published online: 25 Aug 2022

References

  • Abbas, G., Mehmood, A., Lloret, J., Raza, M. S., & Ibrahim, M. (2020). FIPA-based reference architecture for efficient discovery and selection of appropriate cloud service using cloud ontology. International Journal of Communication Systems, 33(14), e4504. https://doi.org/10.1002/DAC.4504
  • Alkhalil, A., Sahandi, R., & John, D. (2017). An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model. Journal of Cloud Computing, 6(1), 1–20. https://doi.org/10.1186/S13677-016-0072-X
  • Amara, M., & Siad, A. (2011). Elliptic curve cryptography and its applications. In International workshop on systems, signal processing and their applications, WOSSPA (pp. 247–250). IEEE. https://doi.org/10.1109/WOSSPA.2011.5931464
  • Armstrong, D., Djemame, K., & Kavanagh, R. (2017). Towards energy aware cloud computing application construction. Journal of Cloud Computing, 6(1), 1–13.https://doi.org/10.1186/S13677-017-0083-2
  • Awan, I. A., Shiraz, M., Hashmi, M. U., Shaheen, Q., Akhtar, R., & Ditta, A. (2020). Secure framework enhancing AES algorithm in cloud computing. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8863345
  • Banyal, R. K., Jain, P., & Jain, V. K. (2013). Multi-factor authentication framework for cloud computing. In 2013 fifth international conference on computational intelligence, modelling and simulation (pp. 105–110). IEEE. https://doi.org/10.1109/CIMSIM.2013.25
  • Basri, M., Mawengkang, H., & Zamzami, E. M. (2018). Cloud computing security model with combination of data encryption standard algorithm (DES) and least significant bit (LSB). In Journal of physics: Conference series (Vol. 970, No. 1, p. 012027). IOP Publishing. https://doi.org/10.1088/1742-6596/970/1/012027
  • Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., & Sastry, H. (2016). Security algorithms for cloud computing. Procedia Computer Science, 85, 535–542. https://doi.org/10.1016/J.PROCS.2016.05.215
  • Brindha, T., & Shaji, R. S. (2018). A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Computing, 22(3), 1013–1022. https://doi.org/10.1007/S00500-016-2405-6
  • Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2013). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233. https://doi.org/10.1109/INFCOM.2011.5935306
  • Dai, H., Ji, Y., Yang, G., Huang, H., & Yi, X. (2019). A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access, 8, 4895–4907.https://doi.org/10.1109/ACCESS.2019.2963096
  • Dhiman, G., & Kumar, V. (2017). Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications. Advances in Engineering Software, 114, 48–70. https://doi.org/10.1016/j.advengsoft.2017.05.014
  • Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611. https://doi.org/10.1002/wcm.1203
  • Dizdarevic, J., Avdagic, Z., Orucevic, F., & Omanovic, S. (2021). Advanced consistency management of highly-distributed transactional database in a hybrid cloud environment using novel R-TBC/RTA approach. Journal of Cloud Computing, 10(1), 1–31. https://doi.org/10.1186/S13677-021-00230-0
  • Fu, J. S., Liu, Y., Chao, H. C., Bhargava, B. K., & Zhang, Z. J. (2018). Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics, 14(10), 4519–4528. https://doi.org/10.1109/TII.2018.2793350
  • Guo, J., Li, C., Zhang, G., Sun, Y., & Bie, R. (2020). Blockchain-enabled digital rights management for multimedia resources of online education. Multimedia Tools and Applications, 79(15), 9735–9755. https://doi.org/10.1007/S11042-019-08059-1
  • Hsu, I. C., & Cheng, F. Q. (2015). SAaas: A cloud computing service model using semantic-based agent. Expert Systems, 32(1), 77–93. https://doi.org/10.1111/EXSY.12063
  • Jennings, B., & Stadler, R. (2015). Resource management in clouds: Survey and research challenges. Journal of Network and Systems Management, 23(3), 567–619. https://doi.org/10.1007/s10922-014-9307-7
  • Kang, H. S., Son, J. H., & Hong, C. S. (2015). Defense technique against spoofing attacks using reliable ARP table in cloud computing environment. In 2015 17th Asia-Pacific network operations and management symposium (APNOMS) (pp. 592–595). IEEE. https://doi.org/10.1109/APNOMS.2015.7275401
  • Kumar, B. S., Geetha, M. P., Padmapriya, G., & Premkumar, M. (2020a). An approach for improving the labelling in a text corpora using sentiment analysis. Advances in Mathematics: Scientific Journal, 9(10), 8165–8174. https://doi.org/10.37418/AMSJ.9.10.46
  • Kumar, C., Raj, T. D., Premkumar, M., & Raj, T. D. (2020b). A new stochastic slime mould optimization algorithm for the estimation of solar photovoltaic cell parameters. Optik, 223, 165277. https://doi.org/10.1016/j.ijleo.2020.165277
  • Kumar, S., Jangir, P., Tejani, G. G., Premkumar, M., & Alhelou, H. H. (2021). MOPGO: A new physics-based multi-objective plasma generation optimizer for solving structural optimization problems. IEEE Access, 9, 84982–85016. https://doi.org/10.1109/ACCESS.2021.3087739
  • Kumar, S., Kumar-Solanki, V., Choudhary, S. K., Selamat, A., & Gonzalez-Crespo, R. (2020c). Comparative study on ant colony optimization (ACO) and K-means clustering approaches for jobs scheduling and energy optimization model in internet of things (IoT). International Journal of Interactive Multimedia and Artificial Intelligence, 6(1), 107. https://doi.org/10.9781/ijimai.2020.01.003
  • Kushida, T., & Pingali, G. S. (2014). Industry cloud-effective adoption of cloud computing for industry solutions. In 2014 IEEE 7th international conference on cloud computing (pp. 753–760). IEEE. https://doi.org/10.1109/CLOUD.2014.105
  • Li, Z., Gui, Z., Hofer, B., Li, Y., Scheider, S., & Shekhar, S. (2020). Geospatial information processing technologies. In Manual of digital earth (pp. 191–227). Springer. https://doi.org/10.1007/978-981-32-9915-3_6
  • Maha, M. A. (2020). Blockchain adoption opportunities in healthcare sector. International Journal of Engineering Trends and Technology, 68(10), 117–120.https://doi.org/10.14445/22315381/IJETT-V68I10P220
  • Mämmelä, O., Majanen, M., Basmadjian, R., De Meer, H., Giesler, A., & Homberg, W. (2012). Energy-aware job scheduler for high-performance computing. Computer Science – Research and Development, 27(4), 265–275. https://doi.org/10.1007/s00450-011-0189-6
  • Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., & Vasilakos, A. V. (2014). Cloud computing: Survey on energy efficiency. ACM Computing Surveys, 47(2), 1–36. https://doi.org/10.1145/2656204
  • Mohiuddin, I., Almogren, A., Al Qurishi, M., Hassan, M. M., Al Rassan, I., & Fortino, G. (2019). Secure distributed adaptive bin packing algorithm for cloud storage. Future Generation Computer Systems, 90, 307–316. https://doi.org/10.1016/J.FUTURE.2018.08.013
  • Nalajala, S., Akhil, K., Sai, V., Shekhar, D. C., & Tumuluru, P. (2019). Light weight secure data sharing scheme for mobile cloud computing. In 2019 third international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) (pp. 613–617). IEEE. https://doi.org/10.1109/I-SMAC47947.2019.9032618
  • Narayanan, S. J., Soundrapandiyan, R., Perumal, B., & Baby, C. J. (2019). Emphysema medical image classification using fuzzy decision tree with fuzzy particle swarm optimization clustering. In Smart intelligent computing and applications (pp. 305–313). Springer. https://doi.org/10.1007/978-981-13-1921-1_31
  • Nithya, S., & Uthariaraj, V. R. (2020). Identity-based public auditing scheme for cloud storage with strong key-exposure resilience. Security and Communication Networks, 2020, 1–13. https://doi.org/10.1155/2020/4838497
  • Prabu Kanna, G., & Vasudevan, V. (2019). A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Computing, 22(4), 9561–9569.https://doi.org/10.1007/S10586-018-2723-9
  • Premkumar, M., Babu, T. S., Umashankar, S., & Sowmya, R. (2020). A new metaphor-less algorithms for the photovoltaic cell parameter estimation. Optik, 208, 164559. https://doi.org/10.1016/j.ijleo.2020.164559
  • Premkumar, M., Ibrahim, A. M., Kumar, R. M., & Sowmya, R. (2019a). Analysis and simulation of bio-inspired intelligent salp swarm MPPT method for the PV systems under partial shaded conditions. International Journal of Computing and Digital Systems, 8(5), 490–496. https://doi.org/10.12785/ijcds/080506
  • Premkumar, M., Jangir, P., Kumar, B. S., Sowmya, R., Alhelou, H. H., Abualigah, L., Yildiz, A. R., & Mirjalili, S. (2021a). A new arithmetic optimization algorithm for solving real-world multiobjective CEC-2021 constrained optimization problems: Diversity analysis and validations. IEEE Access, 9, 84263–84295. https://doi.org/10.1109/ACCESS.2021.3085529
  • Premkumar, M., Jangir, P., Ramakrishnan, C., Nalinipriya, G., Alhelou, H. H., & Kumar, B. S. (2021b). Identification of solar photovoltaic model parameters using an improved gradient-based optimization algorithm with chaotic drifts. IEEE Access, 9, 62347–62379. https://doi.org/10.1109/ACCESS.2021.3073821
  • Premkumar, M., Jangir, P., & Sowmya, R. (2021c). MOGBO: A new multiobjective gradient-based optimizer for real-world structural optimization problems. Knowledge-Based Systems, 218, 106856. https://doi.org/10.1016/j.knosys.2021.106856
  • Premkumar, M., Jangir, P., Sowmya, R., Elavarasan, R. M., & Kumar, B. S. (2021d). Enhanced chaotic JAYA algorithm for parameter estimation of photovoltaic cell/modules. ISA Transactions, 116, 139–166. https://doi.org/10.1016/j.isatra.2021.01.045
  • Premkumar, M., Kumar, C., Sowmya, R., & Pradeep, J. (2021e). A novel salp swarm assisted hybrid maximum power point tracking algorithm for the solar photovoltaic power generation systems. Automatika: A Magazine for Automation, Measurement, Electronics, Computing and Communications, 62(1), 1–20. https://doi.org/10.1080/00051144.2020.1834062
  • Premkumar, M., & Sowmya, R. (2017a). Design and implementation of context-aware adaptive routing for delay-tolerant mobile networks. International Journal of Electrical Communication Engineering, 3(2), 1–6. https://doi.org/10.37628/IJECE.V3I2.695
  • Premkumar, M., & Sowmya, R. (2017b). Interactive content based image retrieval using multiuser feedback. JOIV: International Journal on Informatics Visualization, 1(4), 165–169. https://doi.org/10.30630/JOIV.1.4.57
  • Premkumar, M., Sowmya, R., Jangir, P., Nisar, K. S., & Aldhaifallah, M. (2021f). A new metaheuristic optimization algorithm for brushless direct current wheel motor design problem. Computers, Materials and Continua, 67(2), 2227–2242. https://doi.org/10.32604/CMC.2021.015565
  • Premkumar, M., Srikanth Babu, V., & Somwya, R. (2019b). Scheduling task to heterogeneous processors by modified ACO algorithm. In Soft computing in data analytics (pp. 565–576). Springer. https://doi.org/10.1007/978-981-13-0514-6_55
  • Premkumar, M., & Sumithira, R. (2018). Humpback whale assisted hybrid maximum power point tracking algorithm for partially shaded solar photovoltaic systems. Journal of Power Electronics, 18(6), 1805–1818. https://doi.org/10.6113/JPE.2018.18.6.1805
  • Rajkumar, S., Dutta, P., & Trivedi, A. (2018). Adaptive infrared images enhancement using fuzzy-based concepts. In Speech and language processing for human-machine communications (pp. 119–128). Springer. https://doi.org/10.1007/978-981-10-6626-9_13
  • Rao, C. C. (2021). Enhanced effective and privacy preserving multi keyword search over encrypted data in cloud storage using blowfish algorithm. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(8), 31–39. https://doi.org/10.17762/TURCOMAT.V12I8.2740
  • Reddy, M., & Babu, M. R. (2019). Implementing self adaptiveness in whale optimization for cluster head section in internet of things. Cluster Computing, 22(1), 1361–1372. https://doi.org/10.1007/s10586-017-1628-3
  • Sundararaj, V. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.https://doi.org/10.1007/S11277-018-6014-9
  • Thabit, F., Alhomdy, S., & Jagtap, S. (2021). A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. International Journal of Intelligent Networks, 2, 18–33. https://doi.org/10.1016/J.IJIN.2021.03.001
  • Wei, X., Fan, J., Lu, Z., & Ding, K. (2013). Application scheduling in mobile cloud computing with load balancing. Journal of Applied Mathematics, 2013. https://doi.org/10.1155/2013/409539
  • Xu, F., Liu, F., Jin, H., & Vasilakos, A. V. (2013). Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions. Proceedings of the IEEE, 102(1), 11–31. https://doi.org/10.1109/JPROC.2013.2287711
  • Zhang, R., Sathishkumar, V. E., & Jackson Samuel, R. D. (2020). Fuzzy efficient energy smart home management system for renewable energy resources. Sustainability, 12(8), 3115. https://doi.org/10.3390/su12083115
  • Zhang, X., Liu, C., Nepal, S., & Chen, J. (2013). An efficient quasi-identifier index-based approach for privacy preservation over incremental data sets on cloud. Journal of Computer and System Sciences, 79(5), 542–555. https://doi.org/10.1016/J.JCSS.2012.11.008
  • Zhou, A., Wang, S., Hsu, C. H., Kim, M. H., & Wong, K. S. (2019). Virtual machine placement with (m, n)-fault tolerance in cloud data center. Cluster Computing, 22(5), 11619–11631. https://doi.org/10.1007/s10586-017-1426-y
  • Zhou, Y., & Ding, G. (2018). Research of a pattern matching algorithm based on threshold and word frequency. In 2018 IEEE international conference on computer and communication engineering technology (CCET) (pp. 320–324). IEEE. https://doi.org/10.1109/CCET.2018.8542220

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.