Al Issa, H A, Al-Jarah, M H, Almomani, A and Al-Nawasrah, A (2022) Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm. International Journal of Cloud Applications and Computing, 12 (1). pp. 1-10. ISSN 2156-1834
67.pdf - Published Version
Download (1MB)
Abstract
Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data and the easily of sharing, and this data can also be accessed from anywhere in the world as long as it is on the Internet, large gaps have emerged around data theft and viewing. Accordingly, researchers have developed algorithms and methods to protect this data, but the attempts to penetrate the data did not stop. In this research, we developed a method that combines XOR and Genetic algorithm to protect the data on the cloud through encryption operations and keep the key from being lost or stolen. The data that is uploaded to cloud computing may be important and we should not allow any party to see it or steal it. Therefore, it became imperative to protect this data and encrypt it. We have developed an algorithm that uses XOR and genetic algorithms in the encryption process.
Affiliation: | Skyline University College |
---|---|
SUC Author(s): | Almomani, A |
All Author(s): | Al Issa, H A, Al-Jarah, M H, Almomani, A and Al-Nawasrah, A |
Item Type: | Article |
Uncontrolled Keywords: | Cloud Computing, Decryption, Encrypting, Genetic Algorithm, XOR |
Subjects: | B Information Technology > BV Cloud Computing |
Divisions: | Skyline University College > School of IT |
Depositing User: | Mr Veeramani Rasu |
Date Deposited: | 21 May 2022 10:28 |
Last Modified: | 21 May 2022 10:28 |
URI: | https://research.skylineuniversity.ac.ae/id/eprint/196 |
Publisher URL: | https://doi.org/10.4018/IJCAC.297101 |
Publisher OA policy: | https://v2.sherpa.ac.uk/id/publication/12705 |
Related URLs: |
Actions (login required)
Statistics for this ePrint Item |