Abstract
Cloud Computing, a form of on-demand service offering resources such as platform, infrastructure, software, database etc., Cryptography, the art of altering the user defined plain data into inarticulate form, and that exists as a prime solution to protect the data on network transmission. This research work specifically focused on, an interesting, Encryption-as-a-service application delivery model, with a symmetric key algorithm based on the conventional encryption mode is developed. Key generation for the encryption is a most important phase of every cryptographic process. Multiple keys are involved for encryption of data to strengthen the encryption quality via the ICBC Process. It is tested with various inputs and the quality of the algorithm is investigated. The Motivation behind this application development is to minimize the execution time for the encryption within limited storage capacity. The proposed application model in this research work, avoids unauthorized attacks such as brute-force, chosen plaintext, CCA and CPA and the results are analyzed using the cryptanalysis process. The Performance of the proposed algorithm is analyzed with statistical measures such as frequency analysis. Comparative analysis is done to reveal the enhancement of the algorithm. The homogeneity of the data from the experimental results shows the efficiency of the data of how well it is encrypted. Evaluation reports state that the developed application service relic’s potential for authenticating text files with better satisfaction while out-sourced as an application in cloud computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multinode network for secure transmission. Int. J. Comput. Math. 89(16), 123–214 (2012)
Anupriya, E., Agnihotri, A., Soni, S., Babelay, S.: Encryption using XOR based extended key for information security – a novel approach. Int. J. Comput. Sci. Eng. 3(1), 146–154 (2011)
Pratha, A.K., Kumari, R.C., Kumar, L.P.: Scheme of encryption for block ciphers and multi code generation based on secret key. Int. J. Network Secur. Appl. (IJNSA) 3(6), 141–148 (2011)
Schiestl, C.: Pseudozufallszahlen. Der Kryptographie Klagenfurt Press, Klagenfurt (1999)
Chatterjee, D., Nath, J., Dasgupta, S., Nath, A.: A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. In: International Conference on Communication Systems and Network Technologies. IEEE (2011)
Elashry, I.F., Faragallah, O.S., Abbas, A.M., ElRabaie, S., Fathi, E., El Samie, A.: A new method for encrypting images with few details using Rijndael and RC6 block ciphers in the electronic code book mode. Inf. Secur. J. Global Perspect. Taylor Francis 22(1), 193–205 (2012)
Huang, K., Chiu, J., Shen, S.: A novel structure with dynamic operation mode for symmetric-key block ciphers. Int. J. Network Secur. Appl. (IJNSA) 5(1), 17–36 (2013)
Paul, M., Kumar, J., Mandal, A.: Universal session based bit level symmetric key cryptographic technique to enhance the information security. Int. J. Network Secur. Appl. (IJNSA) 4(4), 123–136 (2012)
Padhmavathi, B., Ray, A., Anjum, A., Bhat, S.: Improvement of CBC encryption technique by using the Merkle-Hellman Knapsack Cryptosystem, Intelligent systems and controls (ISCO). In: 7th International Conference 4–5 January, Coimbatore, Tamilnadu, India, pp. 340–344. IEEE (2013)
Kuppuswamy, P., Al-Khalidi, S.Q.Y.: Hybrid encryption/decryption technique using new public key and symmetric key algorithm. MIS Rev. 9(2), 1–13 (2014)
Das, R., Dutta, S.: An approach of bitwise Private-key Encryption, technique based on Multiple Operators and numbers of 0 and 1 counted from binary representation of Plain Text‘s single character. Int. J. Innovative Technol. and Exploring Eng. 2, 1–6
Sastry, V.U.K., Udaya Kumar, S., Vinaya Babu, A.: A large block cipher using modular arithmetic inverse of a key matrix and mixing of the key matrix and the plaintext. J. Comput. Sci. 2(9), 698–703 (2006)
Shinge, S.R., Patil, R.: An encryption algorithm based on ASCII value of data. Int. J. Comput. Sci. Inf. Technol. 5(6), 7232–7234 (2014)
Roy, S., Maitra, N., Agarwal, S., Nath, J., Nath, A.: Ultra Encryption Standard (UES) Version-III: advanced symmetric key cryptosystem with bit-level Encryption algorithm. Int. J. Modern Educ. Comput. Sci. 7, 50–56 (2012)
Kumar, D.S., Suneetha, C.H., Chandrasekhar, A.: A block cipher using rotation and logical XOR operations. Int. J. Comput. Sci. Issues 8(6), 142–147 (2011)
Srikantaswamy, S.G., Phaneendra, H.D.: Enhanced one time pad cipher with more arithmetic and logical operations with flexible key generation algorithm. Int. J. Network Secur. Appl. (IJNSA). 3(6), 243–248 (2011)
Vaidehi, M., Rabi, B.J.: Design and analysis of AES-CBC mode for high security applications. In: Current Trends in Engineering and Technology 2nd International Conference, pp. 499–502 (2014)
Gupta, V., Singh, G., Gupta, R.: Advanced cryptographic algorithm to improve data security. Int. J. Adv. Res. Comput. Sci. Software Eng. 2(1), 1–6 (2012)
Li, X., Li, W., Shi, D.: Enterprise private cloud file encryption system based on tripartite secret key protocol. In: International Industrial Informatics and Computer Engineering Conference, pp. 166–169. Atlantis Press (2015)
Acknowledgement
The author express deep sense of gratitude to the Alagappa University, Karaikudi, India for the financial assistance through the RUSA Phase 2.0, to carry out this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kuppusamy, K., Mahalakshmi, J. (2020). Multiple Key Encryption (MKE) Technique: An Encryption-as-a-Service Delivery Model in Cloud Computing. In: Xhafa, F., Patnaik, S., Tavana, M. (eds) Advances in Intelligent Systems and Interactive Applications. IISA 2019. Advances in Intelligent Systems and Computing, vol 1084. Springer, Cham. https://doi.org/10.1007/978-3-030-34387-3_66
Download citation
DOI: https://doi.org/10.1007/978-3-030-34387-3_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34386-6
Online ISBN: 978-3-030-34387-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)