Sustainable Framework for Enhancing Cloud Computing Security Against Data Breaches Inspired by Shannon’s Theory
Main Article Content
Abstract
As the digital landscape evolves with distributed system technologies, cloud computing has emerged as a revolutionary force in the IT sector, offering remote services hosted by third parties for data storage, processing, and management. This shift brings with it significant security challenges, particularly concerning sensitive and confidential data stored in the cloud. While encryption is a prevalent method for data protection, various algorithms—such as RSA, ECDSA, and HMAC—also play a role in ensuring security, integrity, and authorized access. However, these techniques have limitations.
This paper proposes a security mechanism based on Shannon's theory, structured in two layers. The first layer employs Shannon's principles of diffusion and confusion through logical operations (NOR, NAND, and Shift) to divide the original plain text and key into equal parts. The second layer draws inspiration from the central dogma of molecular biology, simulating natural processes for genetic-based cryptography.
The proposed algorithm aims to provide a robust security level that outperforms existing techniques in cloud computing. While cloud service providers implement security controls, users also bear the responsibility of safeguarding their own data. This dual approach enhances overall security in the cloud computing environment.
Objective: The objective of a Sustainable Framework for Enhancing Cloud Computing Security Against Data Breaches Inspired by Shannon’s Theory would be to develop a security framework that integrates the principles of Claude Shannon's information theory to address data breaches in cloud computing environments. This framework would focus on creating more secure, efficient, and reliable systems for protecting sensitive data stored and processed in the cloud.
The objective of this framework is to combine the theoretical foundation provided by Shannon's information theory with practical, sustainable solutions for improving cloud computing security. It would focus on data confidentiality, integrity, authentication, resilience to attacks, and scalability, while promoting energy efficiency and sustainability in cloud security measures.
Methods:
Process of the Proposed Framework:
- Key Generation: The initial step involves generating the necessary cryptographic keys for encryption and decryption.
- Conversion of Plaintext to Ciphertext
- First Layer: This layer uses logical operations like NOR, XNOR, and bit shifting to transform the plaintext into ciphertext.
- Second Layer: Drawing inspiration from the Central Dogma of Molecular Biology (CDMB), this layer adds an additional level of complexity to the encryption, further strengthening the security process.
- Key Generation (Continued):
- Two specific sequences, such as AUGC and UCGA, are chosen to assist in the encryption process.
- The process of security key generation is then carried out as per the framework's design, ensuring robust cryptographic protection for the data.
Results: The proposed framework, which leverages a genetic algorithm-based approach for cloud computing, demonstrates superior resistance to data breaches when compared to traditional symmetric encryption methods such as AES, DES, and Blowfish. The evaluation is conducted based on several factors, including encryption time, encryption throughput, and the size of the encrypted ciphertext, all of which are measured relative to the size of the plaintext and the time required for converting between plaintext and ciphertext.
Conclusion: The proposed technique utilizes logical-mathematical functions and genetic algorithms inspired by ribonucleic acid (RNA) to strengthen data breach confidentiality. The process begins by applying logical operations such as NOR, XNOR, and bit shifting, which divide the original plaintext and key into equal segments, introducing diffusion and confusion within the cipher. This forms the first layer of encryption, ensuring a basic level of secrecy. To further bolster privacy, the second layer incorporates concepts from the Central Dogma of Molecular Biology (CDMB), enhancing the cryptographic process and providing an added layer of security.
Discussion: A Sustainable Framework for Enhancing Cloud Computing Security Against Data Breaches, inspired by Shannon’s information theory, provides a structured approach to addressing the complex challenges of securing cloud data. Shannon’s work, particularly his concepts of confidentiality, integrity, and authentication, lays the foundation for robust encryption and security measures in cloud environments.