(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-9 Issue-37 October-2024
Full-Text PDF
Paper Title : Enhanced data security in cloud environments: integrating AES, RC6 encryption, and support vector machine
Author Name : MD. Zakir Hussain and Sujeet Gautam
Abstract :

The secure management of data in cloud environments is critical due to the sensitive nature of the information involved. This paper discusses an innovative multi-layered approach to strengthen data security by integrating advanced encryption standard (AES), Rivest cipher (RC6) encryption, and support vector machine (SVM) (AES-RC6-SVM). AES provides a robust foundation with its fast and secure symmetric encryption capabilities, ideal for processing large datasets efficiently. RC6, offers flexibility in key length and block size, adding an additional security layer. The integration of SVM enables real-time anomaly detection and enhances overall system security by identifying potential intrusions and unusual patterns. Evaluations on various datasets show that the AES-RC6-SVM model achieved an accuracy of 94%, with precision and recall rates of 95% and 92% respectively, significantly higher than models using AES or RC6 alone. This paper proves that the proposed AES-RC6-SVM framework not only ensures high-level encryption but also employs machine learning techniques to monitor and react to security threats dynamically, offering a comprehensive solution for protecting cloud-stored data.

Keywords : Cloud data security, AES encryption, RC6 encryption, Support vector machine, Data security.
Cite this article : Hussain MZ, Gautam S. Enhanced data security in cloud environments: integrating AES, RC6 encryption, and support vector machine. ACCENTS Transactions on Information Security. 2024; 9(37):20-26. DOI:10.19101/TIS.2024.935003.
References :
[1]Soni D, Tiwari V, Kaur B, Kumar M. Cloud computing security analysis based on RC6, AES and RSA algorithms in user-cloud environment. In first international conference on advances in computing and future communication technologies (ICACFCT) 2021 (pp. 269-73). IEEE.
[Crossref] [Google Scholar]
[2]Soni P, Malik R. A comparative study of various traditional and hybrid cryptography algorithm models for data security. In modeling, simulation and optimization: proceedings of CoMSO 2021 (pp. 31-47). Singapore: Springer Nature Singapore.
[Crossref] [Google Scholar]
[3]Helmy M, El-Shafai W, El-Rabaie ES, El-Dokany IM, Abd El-Samie FE. A hybrid encryption framework based on Rubiks cube for cancelable biometric cyber security applications. Optik. 2022; 258:168773.
[Crossref] [Google Scholar]
[4]Gupta N, Kapoor V. Hybrid cryptographic technique to secure data in web application. Journal of Discrete Mathematical Sciences and Cryptography. 2020; 23(1):125-35.
[Crossref] [Google Scholar]
[5]Helmy M, El-Rabaie ES, Eldokany I, Abd El-Samie FE. Proposed hybrid encryption framework for robust 3D image communication over wireless channels. Optik. 2023; 273:170205.
[Crossref] [Google Scholar]
[6]Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. RSA and elliptic curve encryption system: a systematic literature review. International Journal of Information Security and Privacy (IJISP). 2024; 18(1):1-27.
[Crossref] [Google Scholar]
[7]Kumar AA, Kiran S, Reddy DS. Modified hill cipher with invertible key matrix using radix 64 conversion. In futuristic communication and network technologies: select proceedings of VICFCNT 2021, (pp. 175-84). Singapore: Springer Nature Singapore.
[Crossref] [Google Scholar]
[8]Sheik SA, Muniyandi AP. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: a review. Cyber Security and Applications. 2023; 1:100002.
[Crossref] [Google Scholar]
[9]Nithya S, Rekha B. Insights on data security schemes and authentication adopted in safeguarding social network. International Journal of Advanced Computer Science and Applications. 2023;14(4).
[Crossref] [Google Scholar]
[10]Zheng W, Zhou T. Secure and privacy-preserving communications for emotion-aided systems. In IEEE smart world congress (SWC) 2023 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[11]Akter RI, Khan MA, Rahman FA, Soheli SJ, Suha NJ. RSA and AES based hybrid encryption technique for enhancing data security in cloud computing. International Journal of Computational and Applied Mathematics & Computer Science. 2023; 3:60-71.
[Crossref] [Google Scholar]
[12]Tiwari CS, Jha VK. Enhancing the cloud security through RC6 and 3DES algorithms while achieving low-cost encryption. International Journal Wireless and Microwave Technologies. (IJWMT). 2023;13(5):48-59.
[Crossref] [Google Scholar]
[13]Reddy P, Adetuwo Y, Jakkani AK. Implementation of machine learning techniques for cloud security in detection of DDOS attacks. International Journal of Computer Engineering and Technology (IJCET). 2024;15(2).
[Crossref] [Google Scholar]
[14]Kanimozhi A, Vimala N. Adaptive weighted support vector machine classification method for privacy preserving in cloud over big data using hadoop framework. Multimedia Tools and Applications. 2024; 83(2):3879-93.
[Crossref] [Google Scholar]
[15]Mary CJ, Mahalakshmi K, Senthilkumar B. Deep dive on various security challenges, threats and attacks over the cloud security. In 9th international conference on advanced computing and communication systems (ICACCS) 2023 (pp. 2089-94). IEEE.
[Crossref] [Google Scholar]
[16]Reddy MV, Charan PS, Devisaran D, Shankar R, Kumar PA. A systematic approach towards security concerns in cloud. In second international conference on electronics and renewable systems (ICEARS) 2023 (pp. 838-43). IEEE.
[Crossref] [Google Scholar]
[17]Gahane S, Verma P. The research study on identification of threats and security techniques in cloud environment. In 1st DMIHER international conference on artificial intelligence in education and industry 4.0 (IDICAIEI) 2023 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[18]Kumar H, Gupta H. Cloud security: an innovative technique for the enhancement of cloud security. In 5th international conference on advances in computing, communication control and networking (ICAC3N) 2023 (pp. 411-6). IEEE.
[Crossref] [Google Scholar]
[19]Kanagasabapathi K, Mahajan K, Ahamad S, Soumya E, Barthwal S. AI-enhanced multi-cloud security management: ensuring robust cybersecurity in hybrid cloud environments. In international conference on innovative computing, intelligent communication and smart electrical systems (ICSES) 2023 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[20]Vidhyasagar BS, Arvindhan M, Arulprakash A, Kannan BB, Kalimuthu S. The crucial function that clouds access security brokers play in ensuring the safety of cloud computing. In international conference on communication, security and artificial intelligence (ICCSAI) 2023 (pp. 98-102). IEEE.
[Crossref] [Google Scholar]
[21]Dang F, Yan L, Yang Y. Research on intelligent centralized system based on security architecture of computer cloud security protection. In 3rd international conference on electronic technology, communication and information (ICETCI) 2023 (pp. 1281-5). IEEE.
[Crossref] [Google Scholar]
[22]Zou Z. Research on user information security based on cloud computing. In 7th information technology and mechatronics engineering conference (ITOEC) 2023 (pp. 35-9). IEEE.
[Crossref] [Google Scholar]
[23]Kumar ER, Reddy SS, Reddy MB. A multi-stage cloud security for cloud datausing amalgamate data security. In international conference for advancement in technology (ICONAT) 2023 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[24]Anithaashri TP. Novel weight-improved particle swarm optimization to enhance data security in cloud. In 7th international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) 2023 (pp. 195-200). IEEE.
[Crossref] [Google Scholar]