ACCENTS Transactions on Information Security (TIS) ISSN (Print): XXXX ISSN (Online): 2455-7196 Volume - 9 Issue - 37 October - 2024

  1. Google Scholar
Enhanced data security in cloud environments: integrating AES, RC6 encryption, and support vector machine

MD. Zakir Hussain and Sujeet Gautam

Abstract

The secure management of data in cloud environments is critical due to the sensitive nature of the information involved. This paper discusses an innovative multi-layered approach to strengthen data security by integrating advanced encryption standard (AES), Rivest cipher (RC6) encryption, and support vector machine (SVM) (AES-RC6-SVM). AES provides a robust foundation with its fast and secure symmetric encryption capabilities, ideal for processing large datasets efficiently. RC6, offers flexibility in key length and block size, adding an additional security layer. The integration of SVM enables real-time anomaly detection and enhances overall system security by identifying potential intrusions and unusual patterns. Evaluations on various datasets show that the AES-RC6-SVM model achieved an accuracy of 94%, with precision and recall rates of 95% and 92% respectively, significantly higher than models using AES or RC6 alone. This paper proves that the proposed AES-RC6-SVM framework not only ensures high-level encryption but also employs machine learning techniques to monitor and react to security threats dynamically, offering a comprehensive solution for protecting cloud-stored data.

Keyword

Cloud data security, AES encryption, RC6 encryption, Support vector machine, Data security.

Cite this article

Hussain MZ, Gautam S.Enhanced data security in cloud environments: integrating AES, RC6 encryption, and support vector machine. ACCENTS Transactions on Information Security. 2024;9(37):20-26. DOI:10.19101/TIS.2024.935003

Refference

[1]Soni D, Tiwari V, Kaur B, Kumar M. Cloud computing security analysis based on RC6, AES and RSA algorithms in user-cloud environment. In first international conference on advances in computing and future communication technologies (ICACFCT) 2021 (pp. 269-73). IEEE.

[2]Soni P, Malik R. A comparative study of various traditional and hybrid cryptography algorithm models for data security. In modeling, simulation and optimization: proceedings of CoMSO 2021 (pp. 31-47). Singapore: Springer Nature Singapore.

[3]Helmy M, El-Shafai W, El-Rabaie ES, El-Dokany IM, Abd El-Samie FE. A hybrid encryption framework based on Rubiks cube for cancelable biometric cyber security applications. Optik. 2022; 258:168773.

[4]Gupta N, Kapoor V. Hybrid cryptographic technique to secure data in web application. Journal of Discrete Mathematical Sciences and Cryptography. 2020; 23(1):125-35.

[5]Helmy M, El-Rabaie ES, Eldokany I, Abd El-Samie FE. Proposed hybrid encryption framework for robust 3D image communication over wireless channels. Optik. 2023; 273:170205.

[6]Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. RSA and elliptic curve encryption system: a systematic literature review. International Journal of Information Security and Privacy (IJISP). 2024; 18(1):1-27.

[7]Kumar AA, Kiran S, Reddy DS. Modified hill cipher with invertible key matrix using radix 64 conversion. In futuristic communication and network technologies: select proceedings of VICFCNT 2021, (pp. 175-84). Singapore: Springer Nature Singapore.

[8]Sheik SA, Muniyandi AP. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: a review. Cyber Security and Applications. 2023; 1:100002.

[9]Nithya S, Rekha B. Insights on data security schemes and authentication adopted in safeguarding social network. International Journal of Advanced Computer Science and Applications. 2023;14(4).

[10]Zheng W, Zhou T. Secure and privacy-preserving communications for emotion-aided systems. In IEEE smart world congress (SWC) 2023 (pp. 1-7). IEEE.

[11]Akter RI, Khan MA, Rahman FA, Soheli SJ, Suha NJ. RSA and AES based hybrid encryption technique for enhancing data security in cloud computing. International Journal of Computational and Applied Mathematics & Computer Science. 2023; 3:60-71.

[12]Tiwari CS, Jha VK. Enhancing the cloud security through RC6 and 3DES algorithms while achieving low-cost encryption. International Journal Wireless and Microwave Technologies. (IJWMT). 2023;13(5):48-59.

[13]Reddy P, Adetuwo Y, Jakkani AK. Implementation of machine learning techniques for cloud security in detection of DDOS attacks. International Journal of Computer Engineering and Technology (IJCET). 2024;15(2).

[14]Kanimozhi A, Vimala N. Adaptive weighted support vector machine classification method for privacy preserving in cloud over big data using hadoop framework. Multimedia Tools and Applications. 2024; 83(2):3879-93.

[15]Mary CJ, Mahalakshmi K, Senthilkumar B. Deep dive on various security challenges, threats and attacks over the cloud security. In 9th international conference on advanced computing and communication systems (ICACCS) 2023 (pp. 2089-94). IEEE.

[16]Reddy MV, Charan PS, Devisaran D, Shankar R, Kumar PA. A systematic approach towards security concerns in cloud. In second international conference on electronics and renewable systems (ICEARS) 2023 (pp. 838-43). IEEE.

[17]Gahane S, Verma P. The research study on identification of threats and security techniques in cloud environment. In 1st DMIHER international conference on artificial intelligence in education and industry 4.0 (IDICAIEI) 2023 (pp. 1-6). IEEE.

[18]Kumar H, Gupta H. Cloud security: an innovative technique for the enhancement of cloud security. In 5th international conference on advances in computing, communication control and networking (ICAC3N) 2023 (pp. 411-6). IEEE.

[19]Kanagasabapathi K, Mahajan K, Ahamad S, Soumya E, Barthwal S. AI-enhanced multi-cloud security management: ensuring robust cybersecurity in hybrid cloud environments. In international conference on innovative computing, intelligent communication and smart electrical systems (ICSES) 2023 (pp. 1-6). IEEE.

[20]Vidhyasagar BS, Arvindhan M, Arulprakash A, Kannan BB, Kalimuthu S. The crucial function that clouds access security brokers play in ensuring the safety of cloud computing. In international conference on communication, security and artificial intelligence (ICCSAI) 2023 (pp. 98-102). IEEE.

[21]Dang F, Yan L, Yang Y. Research on intelligent centralized system based on security architecture of computer cloud security protection. In 3rd international conference on electronic technology, communication and information (ICETCI) 2023 (pp. 1281-5). IEEE.

[22]Zou Z. Research on user information security based on cloud computing. In 7th information technology and mechatronics engineering conference (ITOEC) 2023 (pp. 35-9). IEEE.

[23]Kumar ER, Reddy SS, Reddy MB. A multi-stage cloud security for cloud datausing amalgamate data security. In international conference for advancement in technology (ICONAT) 2023 (pp. 1-5). IEEE.

[24]Anithaashri TP. Novel weight-improved particle swarm optimization to enhance data security in cloud. In 7th international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) 2023 (pp. 195-200). IEEE.