z-logo
open-access-imgOpen Access
Memory Based Hybrid Dragonfly Optimization for Multiple Key Generation using Cloud Computing
Author(s) -
C. Kaleeswari,
K. Kuppusamy
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.e7042.018520
Subject(s) - computer science , cloud computing , distributed computing , key (lock) , encryption , provisioning , pseudorandom number generator , particle swarm optimization , algorithm , computer network , computer security , operating system
Cloud Computing, as a new technology with enormous computing services, evolved in recent era. It is a most promising computing that gives services on - demand. The Cloud services becomes a noticeable paradigm, by it notable features like, shared pool of resources, Shared infrastructure, dynamic provisioning, network access, handled assessing forward with gassed-up, gullibility, resilience and adoptable. Likewise, it has influence, Cloud Computing has some issues like security of data transferred via the Cloud, availability of resources and its authenticity, remains as a major task of attention. A Novel Optimized Encrytion-As-A-Service is presented in this paper, with multiple keys generation methodology. The three various Key generation includes, Pseudo Random Number Generator (PRNG), Sub-optimal keys are generated from hybridization of Improved Cipher Block Chaining (ICBC) encryption algorithm and final key is from Memory based Hybrid Dragonfly Optimization Algorithm (MHDA). In turn, MHDA is the combination of Dragonfly Optimization Algorithm (DA) and Particle Swarm Optimization Algorithm (PSO) for generating the innovative key for encryption of data. MHDA gives the better performance analysis compared with DA and PSO optimization approaches. The milestone of this optimized hybridization algorithm is to reduce the time complexity and increase the quality of encryption of the data. The experimental analysis is done for Text, image data and performance metrics are evaluated for the proposed research work. Different parameter that explores the main capacity and strength of the algorithm is examined

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here