Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Secure Cloud Computing By A dual-Layer Encryption Mechanism

Version 1 : Received: 7 December 2023 / Approved: 8 December 2023 / Online: 8 December 2023 (13:15:30 CET)

How to cite: Jabber, S.A.; Hashem, S.; Jafer, S. Secure Cloud Computing By A dual-Layer Encryption Mechanism. Preprints 2023, 2023120615. https://doi.org/10.20944/preprints202312.0615.v1 Jabber, S.A.; Hashem, S.; Jafer, S. Secure Cloud Computing By A dual-Layer Encryption Mechanism. Preprints 2023, 2023120615. https://doi.org/10.20944/preprints202312.0615.v1

Abstract

: In today’s rapidly expanding era of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT), the emphasis on robust data security and insightful data interpreta- tion is more pronounced than ever. This research introduces a comprehensive approach to both data protection and predictive analytics, leveraging the diverse dataset TON IoT.csv, sourced from a myriad of IoT and IIoT environments. For data security, a dual-encryption technique incorporating both AES and RSA algorithms is established. Its efficacy is evidenced by a perfect match between the original and decrypted datasets, underscoring the integrity of our encryption process. Concurrently, the study ventures into predictive modeling using a modified Snake Optimization Algorithm (SOA) to streamline hyperparameter selection. This subsequently aids in the development and fine-tuning of an LSTM network, which exhibits remarkable predictive accuracy. Additionally, the paper provides an in-depth examination of various encryption methodologies like elliptic curve cryptography (ECC), Lightweight Cryptography for Cloud computing, and homomorphic encryption, while also emphasizing the nuances of encryption in cloud setups, particularly contrasting server-side with client-side encryption and efficient key management. The insights presented serve as a cornerstone for ensuing research, promising a bright future for advancements in IoT and IIoT data protection and analysis

Keywords

cloud; storage; secure; SOA; AES; RSA; LSTM

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.