Memory Based Hybrid Dragonfly Algorithm For Multiple Key Generation Using Cloud Computing
Memory Based Hybrid Dragonfly Algorithm For Multiple Key Generation Using Cloud Computing
net/publication/338913491
Memory based Hybrid Dragonfly Algorithm for Multiple Key Generation using
Cloud Computing
CITATIONS READS
2 101
2 authors:
All content following this page was uploaded by Kaleeswari Chinnakkaruppan on 19 February 2020.
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4442 & Sciences Publication
Memory Based Hybrid Dragonfly Optimization for Multiple Key Generation using Cloud Computing
J.Mahalakshmi and K.Kuppusamy [10] developed a new element of this algorithm swapping the numbers in 256
structural framework for security services offered in cloud iterative process.
using files. Every proposed technique has the advantages and
disadvantages, but the purpose of research work will provide Input
a much better secured approach along with other existing
methods.JyothiVaishnav[4],have been credited for the data
safety & effectiveness estimation in cloud computing using RGB Color Image and Text
CCAF.Mahalakshmi Jeyabalu and Kuppusamy Data for Encryption
Krishnamoorthy[1], taken over the credits on the
hybridization of ICBC and genetic algorithm for optimizing
encryption process in cloud computing. M.Tanooj Secret Key
Generation
Kumar,Dr.M.Baby Reddy[9], proposed the method used to
perform data/signal capturing ,its compression and
encryption at the same time.Sree Ranjini K.S. and
S.Murugan[6],discussed to the new approach MHDA
optimization for solving the numerical optimization
operations.Experimental outcome of this research work is to Sub optimal key Generation
ICBC PRNG of MHDA
provides the exceptional work to compare with DA and PSO.
Naveen Sihag[7],proposed a Novel Adaptive Dragonfly
Mechanism to attend through fast assisting and optimized
global results depend with few parameters. Kawser Wazed
Cloud Storage
Nafi et.al[11], proposed a innovative Authentication scheme
for encrypting the files and sharable Cloud Computing Fig.1. Block Diagram of Proposed methodology
secure Framework.
3.2 IMPROVED CIPHER BLOCK CHAINING ALGORITHM
III. PROPOSED SYSTEM The state of art holds number of application services that
A novel hybrid encryption approach is designed and verified concentrated either for the text and image data. Considering
in this research work. Symmetric key encryption is placed for this into account the developed algorithm is designed as a
designing, for which both the consigner and consignee complete application service that encrypts the text, executable
administer the same key for encryption and its reverse files, Portable format files, documents etc despite of the type.
process. Key generation is the most important and influential Another interesting feature about the constructed application
part that indicates the strength of the algorithm and quality of of M.Jeyabalu and K.Krishnamurthy[1], Hybridization of
encryption. Throughout the implementation process in this ICBC and the proposed methodology MHDA for Optimizing
research work, a consistent design rationale is followed so as Encryption service is its key generation. The size of the key
to maintain uniformity as well as to perform in rapid manner. varies as 64-bit, 128-bit, and 256-bit, whereas in the
This area briefs the newly developed cryptographic algorithm conventional types any one of the key size is utilized. This
and its performance analysis, the optimization results after unique feature of the developed application archetype makes it
the encryption of the text and overview of the algorithm. It better suitable for the encryption of the data. Most strong
also describes the encryption and hiding of the data by using component of this proposed scheme is the sub-optimal key
the Improved cipher Block Chaining (ICBC) Encryption generation that makes the entire process more secure as well
Algorithm and the Memory based Hybrid Dragonfly as increases the speed of execution. The proposed algorithm is
(MHDA) Optimization algorithm. Their performance the hybrid model, which consists of the basic cipher block
parameters are analyzed. Also, the A Novel chaining encryption operation. The design rationale followed
Encryption-As-A-Service is delivers in this research work, throughout the encryption process is depicted. Each and every
with multiple keys encryption methodology. The three data element is converted into its corresponding binary bits
various Key generation includes, PRNG, Sub-optimal keys that pilot to decrease in the execution time. Moreover,
are generated from hybridization of Improved Cipher Block processing as binary bits makes the scheme more complex,
Chaining (ICBC) encryption algorithm and final key is from since a single bit error leads to major destruction.
Memory based Hybrid Dragonfly Optimization (MHDA) 3.3 Memory Based Hybrid Dragonfly Algorithm
Algorithm for text encryption. (MHDA)
Memory based Hybrid Dragonfly optimization is a recent
3.1 PSEUDO RANDOM NUMBER GENERATORS approach for generating the innovative key in this research
PRNG indicates as a mechanism that utilized as mathematical work is to improve the security and privacy to the multimedia
preliminaries to build generation of Random values. It data like text and image. In this paper implements one
concern with cluster of Analytical Assessment. Every bunch objective function for this optimization and implement it in
of sequence has the initial point. So, if the initial point is MATLAB. It provides the outcome of this work is global
established, a lot of odd numbers are generated in the optimal solution.The contributed encryption algorithm works
minimum period of time consumption. The outcome of this well for the file encryption also. The file type includes varied
algorithm generates the values are ultimate and adequate. files namely executable files, portable format files, text files,
In each iteration, the PRNG increasing the parameters value , word documents etc with higher security.
looks up the exchanges the values of the parameters. XOR
operation involves in this key generation to produce the next
byte stream for this process.. Each and every element Each
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4443 & Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-5, January 2020
The working procedure of the file encryption remains as same ICBC encryption operation mode is involved where the
as the text data encryption.The content of the files are blocks are encrypted in clusters.Multiple keys are involved in
converted into binary blocks, despite of its original format and the encryption process to make the algorithm strengthen and
dragged to a text document. This is an additional step taken toughen the keys. When number of keys is increased the
place in this file encryption. encryption code automatically will get
strengthened.Moreover, the key generation is from the input
Start data itself, which makes it complex to retrieve. Additionally, a
sub-optimal key is generated and involved for the encryption
makes the process so difficult, that the intruder cannot hack
Initialization
the data. The authorized receiver, with proper accessibility
through the key will decrypt the file.
DAi = 0 The conversion of data into binary blocks and decreases the
execution time. The optimization technique will appropriately
increase the execution speed as well as the decreases the
Initialize S1, W1, A1, F1, C1, E1 storage space. Since the algorithm is designed for the
application service, to be mounting to the cloud, the space
complexity is a severe issue to be considered. Hence, by
N=0 converting the data as to binary blocks saves more space and
also the computation on this blocks structure will leads a
Evaluate fitness fuction f1(x) of a dragonfly
foremost demolition if any error found. The approximate size
of the block for the proposed model is from 8 X 8; extended
up to 256 X 256 bits and that of the key size varies from 64 to
256 bits.
If
f1(x)<Nm
Update 3.5.1 ALGORITHM FOR ENCRYPTION PROCESS
DA
axx Step 1: Initially,the input data converted into binary data will
be fill in a Eight X Eight matrix format.
Store Step 2: The ICBC encryption Algorithm for encrypting the
PSO = 0 DA in
Matrix
given input Text then generate the key for data security.
Step 3: One more Key matrix is generated via the PRNGs
Evaluate fitness function f2(x) of a swarm Cryptographic Algorithm.
Step 4: The next key generation is the most important key
that is constructed as a Sub-optimal key to obtain the
optimized key for the encryption.
If Update Step 5: The Sub-optimal key is generated from the MHDA
f2(x)<PSO PSO algorithm with the procedure followed.
Step 6: The size of the key values are in three various sizes
either as a 64 – bit, 128 - bits or 256 - bits: If the size of the
key is 64; the block size designed as 8 X 8; if it is 256 then the
Update Velocity(V1) and Position(P1) block size is 16 X 16; where the key size is of 128 the block 8
X 16.
Step 7: The blocks with the binary elements are repeatedly
Return the best solution of PSO + DA tranferred to corresponding ASCII code.
Step 8: Detaching the blocks will yields the encrypted text
data.
Stop
Algorithm for Decryption Process
Fig. 2. Flowchart of MHDA Step 9 : File that contains the encrypted text data is taken as
input
Once the data is converted and moved to the text document, Step 10 : Convert the encrypted data into equivalent binary
the working procedure of the text data encryption process is bits:
taken place automatically. Again, in the decryption process, Step 11 : Fill the matrices of 8 X 8 with the converted
the ciphered data is placed in the text file and the decryption ciphered binary bits yet the end is reached.
takes place. In the case of link files, library files or an image Step 12 : Reverse is the process of encryption; along with the
data the result available as corrupted information for the key generation.
encryption.The combination of logical substitution operations Step 13 : The key is similar since the symmetric key scheme
along with the complex key generation makes the is followed.
cryptographic process, a new hybrid encryption algorithm. Step 14 : The deciphered; original text data is obtained as the
The logical Exclusive Disjunction operator (XOR) is used for result of the key Generation.
the substitution process. It is a self-invertible operator hence it
is employed for this symmetric key encryption method. The
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4444 & Sciences Publication
Memory Based Hybrid Dragonfly Optimization for Multiple Key Generation using Cloud Computing
Key size File Size Input Text Data Encrypted Data Decrypted Data
(in bits) (in bytes)
64- bits 442 bytes on-2015-105009.pdf wJyTwNyXwZyfwVyHw1 on-2015-105009.pdf
Title: A New Cryptosystem y3wRyXwdybwFy38.+78.+ Title: A New Cryptosystem MKE:
MKE: Multiple Key 7wRyzwd+n85+n85yXwZ2 Multiple Key Encryption
Encryption Algorithm with vwZyb8.+78.+7k52Tk.mX Algorithm with Cipher Block
Cipher Block Chaining And kxmXkhmXk9ifkxmnk1+n Chaining And Logical Operator
Logical Operator 85+n85+n85ubkxiHgJmXk
pmXsRyPwZyTwVyL
128-bits 13400 bytes Each manuscript must include 4N+z8Jmbk1mv8J6P4J+z4 Each manuscript must include a
a 200-word abstract. The N6L4J6X816v4V6r896r4N 200-word abstract. The acceptance
acceptance rate of the journal +/4F6D4B+/4B6D4R6r896 rate of the journal is 10%. Articles
is 10%. Articles are accepted Dg16P4R+L-92j--------8d+/ are accepted only in MS-Word
only in MS-Word 8Jyvwx+T8J+Hwtyz8R+L8 format-----------194247248230231
format-----------19424724823 5yvwx+T8V+bwtyz8R+X8 232
0231232 dyvwx+T8V+Twtyz8R+X8 233
233 V
256- bits 344064 ()*&^%$#Alagappa0987654 |*n♥╖©rwb↔◄ᶺ♥6_5♠╣◊ ()*&^%$#Alagappa09876543!@#
bytes 3!@#$%^&* 19424724 ◘◄-♥/♥◙♠▲▐-52/-x2D8d $%^&* 19424724 R%$)*%&$
R%$)*%&$ +/8Jyvw4J6P4F6345 3-319-25207-0_20----------------
3-319-25207-0_20------------- 4B6D4R6r896Dg16P4R+L
--- -92j------------
Table - 2 : Encryption and Decryption of varied Text Files of Various Key Sizes with Time Factor
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4445 & Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-5, January 2020
100%
90% 2.016 3.618
80% 0.578
70% 256-bit
60% 3.907 5.944
50% 0.542 5 128-bit
40% 64-bit
30%
20% 0.661 4.925 6.994
10%
0% 0.068
0.071
DOCX PDF AVI EXE
File Types
Fig.3. Comparative analysis of the proposed Text Cryptosystem
In this section, the RGB Color Image encryption is The Baboon, pueblo bonito is encrypted via 128-bit key size,
depicted various standard image namely the Lena, and Barbara, Brandy.rose images are encrypted using 358-bit
Water,Pueblobonito, Baboom, and Barbara are taken for the key size. The experimental results were shown in the below:
experiment verification. A key size varies between 64-bit,
128-bit and 256-bits. From above-listed images the Lena,
Water images are encrypted using 64-bit key.
Key size Pixel Resolution Input Image Encrypted Image Decrypted Image
64- bits 256 x 256
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4446 & Sciences Publication
Memory Based Hybrid Dragonfly Optimization for Multiple Key Generation using Cloud Computing
The images are taken from the standard sources Standard information source. For a purelyrandom source emitting, the
pixel resolution for the experiment verification is 256×256. entropy should be M. The PSNR expresses the ratio between
Various image types are verified and the results are analyzed. maximum possible values to that of the noise that affects the
The performance factors were experimentally analyzed for quality of an image as in equation 2. In scenario of
different categories of image data like the bitmap, jpeg, Tiff encryption lower the PSNR indicates, better encryption
images. These type of data are encrypted using three key standard.
sizes as 64 bits, 128 bits, and 256 bits. The standard pixel
resolutions for the images are set as 256×256 pixels. The E=∑ [(pi)Xlog2(1/p(mi) ) ] (1)
proposed encryption algorithm remains with better solution PSNR=20log10[MAX/√MSE] (2)
for the images of many types and their quality are analyzed
By calculating the variations betwixt the encrypted image
using different parameters. The main factors considered here
and the given image (original) of pixel values are statistically
are the security analysis parameters PSNR, entropy measure,
evaluated. The two major measurement units of widely used
and statistical analysis, differential attacks measures namely
NPCR(Number of Pixels Change Rate) and UACI (Unified
the NPCR and UACI.
Average Changing Intensity Eq.3, 4) that are utilized for
Entropy is the measure used to verify the encryption
evaluating the slight changes betwixt the given image and
quality that measuring the randomness of the given
the converted image (Encrypted image).
algorithm. The entropy value should possess to the ideal
value of 8 that shows the proposed algorithm is resistant
against various attacks. The measuring unit of entropy is NPCR= (3)
Shannon (Sh) that describes the unit of information between
two images. In the given equation 1 below, P(mi) denotes the
probability of the entropy and the total states of the
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4447 & Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-5, January 2020
.2.2 Entropy
The main aim of the cryptanalysts is to enhance the security
in every possible aspect using available tools. The cryptool is
vastly used simulator tool, to analyze randomness test and
analysis test. This tool consists of inbuilt mechanisms for test
and analysis for the output provided. The following analyses
were done using cryptool. Frequency test basically calculates
the uniform distribution of the values that are generated from
the pseudorandom number generators [20]. It identifies the
deviations taken place from a one-dimensional uniform
distribution. The number of Binary values (0,1) in the
sequence is evaluated called as Mono-bit test, with the
equation, The following analyses were done using cryptool.
Frequency test basically calculates the uniform distribution of
the values that are generated from the pseudorandom number
generators [20]. It identifies the deviations taken place from a
one-dimensional uniform distribution. The number of 0s and
1s in the sequence is evaluated called as Mono-bit test, with
the equation
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4448 & Sciences Publication
Memory Based Hybrid Dragonfly Optimization for Multiple Key Generation using Cloud Computing
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4449 & Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-5, January 2020
V. CONCLUSION ACKNOWLEDGMENT
A novel hybrid algorithm is designed and verified with This research work is financially supported by RUSA 2.0.
various experiments in this Research work that improves the The author of this research work expresses deep sense of
encryption strength. The conventional encryption operation gratitude to Ms. Sree Ranjani Kizhakethil, Homi Bhabha
mode cipher block chaining is considered into account, National Institute, Indra Gandhi Centre for Atomic Research
modified and presented as the ICBC Encryption mechanism, (IGCAR), India for her helpful and constructive suggestions
which in turn combined with the MHDA optimization regarding the MHDA to carry out this research work.
technique for the key generation. One interesting feature of
this proposed algorithm is, the suboptimal key generation REFERENCES
from the MHDA makes the process computationally hard. 1. MahalakshmiJeyabalu,KuppusamyKrishnamoorthy, ”Hybridization of
Throughout the application service, a consistent design ICBC and Genetic Algorithm for Optimizing Encryption Process in
rationale is followed that increases the execution speed. Cloud Computing Application Service”, in FundamentaInformaticae
Specifically, it offers the key sizes in three different strengths 157(2018)79-109,DOI:10.3233/FI-2018-1619.
2. D.Ranjith,J.srinivasan, “Identity Security Using Authentication and
and also allows the privilege to the deployment of a client to Authorization in Cloud Computing” in International Journal of
select the way of encryption and form of data as per their Computer & Organization Trends ,vol:3,Issue:4,ISSN:2249-2593,May
wish. This research work is shows the proposed encryption 2013.
algorithm achieves first objective, minimum time for 3. VarshaD.Mali,PramodPatil, “Authentication and Access Control for
Cloud Computing Using RBDAC Mechanism”, in International journal
execution. In cloud computing, space complexity is of Innovative Research in Computer and Communication
prominent issue; it is almost minimized with the second Engineering,vol:4,
objective storage space reduction by converting the contents
to binary bits. Hence, in cloud computing this hybrid ICBC
technique with Memory based Hybrid Dragonfly Algorithm
encryption security service yield better solution for
encryption services to the users.
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4450 & Sciences Publication
Memory Based Hybrid Dragonfly Optimization for Multiple Key Generation using Cloud Computing
4. Issue:11,DOI:10.15680/IJIRCCE.2016.0411009,Nov 2016.
5. JyothiVaishnav ,“ Data Safety and Effectiveness Estimation in Cloud
Computing using CCAF” in International Journal of Computer Science
and Information Technology,Apr 2018.
6. M.Tanoojkumar,Dr.M.BabuReddy,”Cloud Storage Optimization
Approach Using Compressive Sensing”, in International journal of
Engineering Research and
Development,e-issn:2278-067X,p-issn:2278-800Xvol:14,Issue:2,pp:21
-26,Feb 2018.
7. SreeRanjini and K.S.,S.Murugan,”Memory Based Hybrid Dragonfly
Algorithm for Numerical Optimization Problems”, in Elsevier Expert
Systems with Applications,2017.
8. Naveen Sihag., “A Novel Adaptive Dragonfly Algorithm for Global
Optimization Problems”, in International Journal of Engineering
Research and
Development,e-issn:2278-067X,p-issn:2278-800X,Vol:14,Issue:2,pp:2
7-39,Feb 2018.
9. JyothikaChettiza&Nagendrakumar,”Emerging security issues and
Authentication Mechanism in cloud environment with focus on
Multifactor Authentication “,in IJARCSSE International Journal of
Advanced Research in computer science and software
engineering,Vol.6,Issue 5,May 2016,ISSN:2277 128X.
10. PunamV.Maitri, Arunaverma,”Secure File Storage in Cloud
Computing using Hybrid Cryptography Algorithm”, in IEEE explore
on WisNETconference,Sep
2013,DOI:10.1109/WisPNET.2016.7566416.
11. J.MahalakshmiandK.Kuppusamy,”Security-As-A-Service for files in
Cloud Computing-A Novel Application
Model”,IEEEDigitalexplore,DOI:10.1109/ISCO.2016.7726889,Nov
2016,pp:1-5.
12. Kawserwazed naïf et.al.,”A Newer User Authentication File Encryption
and Distributed Server based Cloud Computing Security Architecture”,
in (IJACSA) International Journal of Advanced Computer Science and
Applications,Vol.3,No.10,2012.
AUTHORS PROFILE
Published By:
Retrieval Number: E7042018520/2020©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.E7042.018520 4451 & Sciences Publication
View publication stats