You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

13 May 2024

Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks

,
,
,
,
,
and
1
Department of Computer Science, National University of Technology, Islamabad 44000, Pakistan
2
Department of Computer Science, University of Science and Technology Beijing, Beijing 100083, China
3
Department of Computing, NASTP Institute of Information Technology, Lahore 58810, Pakistan
4
Department of Computing, Riphah International University, Lahore 54660, Pakistan
This article belongs to the Section Computer

Abstract

Researchers have created cryptography algorithms that encrypt data using a public or private key to secure it from intruders. It is insufficient to protect the data by using such a key. No research article has identified an algorithm capable of protecting both the data and the associated key, nor has any mechanism been developed to determine whether access to the data is permissible or impermissible based on the authentication of the key. This paper presents a WEDEx-Kerberotic Framework for data protection, in which a user-defined key is firstly converted to a cipher key using the “Secure Words on Joining Key (SWJK)” algorithm. Subsequently, a WEDEx-Kerberotic encryption mechanism is created to protect the data by encrypting it with the cipher key. The first reason for making the WEDEx-Kerberotic Framework is to convert the user-defined key into a key that has nothing to do with the original key, and the length of the cipher key is much shorter than the original key. The second reason is that each ciphertext and key value are interlinked. When an intruder utilizes the snatching mechanism to obtain data, the attacker obtains data or a key unrelated to the original data. No matter how efficient the algorithm is, an attacker cannot access the data when these methods and algorithms are used to protect it. Finally, the proposed algorithm is compared to the previous approaches to determine the uniqueness of the algorithm and assess its superiority to the previous algorithms.

1. Introduction

Nowadays, attackers use sneaky methods to get into cloud networks, in which attackers always identify weaknesses in the infrastructure of the cloud or faults that people make when using the online service []. Cloud providers or users may occasionally commit errors in configuring their systems, exposing them to potential vulnerabilities []. Attackers do everything possible to gain access to users’ data, including sending fake emails to users that look like real emails and asking for usernames and passwords []. When someone falls for this trick and enters their information, an attacker can use it to sneak into a cloud account. Different attacks target the data stored in a cloud network and aim to retrieve, change, or destroy it []. One typical attack is a “data breach,” in which attackers get access to confidential data saved in a cloud server []. Attackers may employ numerous techniques to infiltrate a cloud network [], including trying to decipher passwords or focusing on vulnerabilities in cloud services. Once attackers access the network, they may acquire any desired information, which can be used for different purposes, such as identity theft, economic deception, or other unlawful endeavors [].
Cloud attacks on enterprises’ networks have become problematic in the digital world []. Cybercriminals are constantly developing innovative methods to exploit weaknesses in cloud settings []. When enterprises accidentally expose their data and resources to the public Internet, misconfiguration of cloud services is one typical attack vector that opens doors for attackers []. Every time a hacker attempts to access data, their initial effort is to get the original data, for which they make every effort and perform malicious attacks on the encrypted data. Malicious attacks utilize advanced techniques to break encryption and get unauthorized access to encrypted data. Malicious attacks include advanced cryptanalysis, brute force attacks, and fault injection attacks. After obtaining access to the data, the intruder’s next phase is to transmit the recipient’s destructive data rather than the original data to carry out unlawful actions across the entire network [], as illustrated in Figure 1. Organizations must implement robust security measures and train personnel on best practices to protect against these constantly developing cloud-based risks as cloud usage rises [].
Figure 1. Data snatching mechanism.

1.1. Cryptography

Cryptography is used to secure communication and protect information from unauthorized access or malicious attacks []. It entails encrypting data (plaintext) so that only authorized users may decode it using a specific key or algorithm. The two main types of cryptographic techniques are symmetric and asymmetric key cryptography []. Symmetric cryptography encrypts data using a similar key [], whereas asymmetric cryptography uses two separate keys to encrypt and decrypt data []. This paper will develop a framework in which data are encrypted with a dynamic key while data are decrypted with a static key called a cipher key. Each encrypted ciphertext key will only work on the text from which the key is derived.

1.2. Problem Formulation

Researchers have developed several techniques and machine learning algorithms to prevent data misuse by attackers. For encoding data, multiple researchers created static keys with cryptographic methods. Data that have been broadcast over the network and encrypted by researchers may be retrieved with the use of a static key. Data can be encapsulated through all these techniques, but such mechanisms are unreliable for cloud networks. If an attacker uses cryptanalysis, the key can be easily obtained, which is a data security problem. Malware can be detected with machine learning algorithms, but the data cannot be saved. These issues of cloud networks have yet to be solved entirely in any paper, and no reliable mechanism has been developed for cloud networks.

1.3. Proposed Framework

This paper developed a WEDEx-Kerberotic framework to secure data, and various algorithms are used to secure data and keys. The WEDEx-Kerberotic system is made up of two different methods, in which the first method is designed for data encryption and decryption, which is named “WEDEx”. “WEDEx” is made up of different words. The purpose of creating the WEDEx” algorithm is to provide key-based security for exchanging and encrypting large-scale data, which is why “WEDEx” is made up of various words whose full form is “Widely Encrypted Data Exchange”. Another technique is “Kerberotic”, which is a data security mechanism built from “Kerberos Authentication System”. The aim of the Kerberotic system is to provide a complete encryption and key authentication framework. The WEDEx-Kerberotic system aims to develop a framework that thoroughly performs data encryption, decryption, key generation, and verification phases. Along with encrypting and decrypting the data, it is also essential to encrypt the key used on the data. Verification of this key is also necessary when any authentic or inauthentic key is used on encrypted data. When all processes are carried out in parallel, a framework for the cloud can be efficient.
Firstly, a user-defined key K[x] will be taken, and then a key K[j] will be obtained by implementing the SWJK (secure words on joining key) algorithm on the key K[x]. K[x] is the original key (user-defined key), while K[j] is the key obtained from the SWJK algorithm. A user-defined key will decrease its length by two times when the SWJK algorithm is applied to it. The most significant advantage of the SWJK key is that the SWJK key will be utterly different from the user-defined key. When cryptanalysis is carried out, no value will be the same, making the cryptanalysis impossible. Applying the SWJK algorithm’s key to the WEDEx-Kerberotic method will produce a ciphertext. Each text’s value in the WEDEx-Kerberotic system will be connected to the one after it. If the attacker changes even one value, all values will be automatically changed, and the attacker will get data that cannot be easily deciphered and has no relation to the authentic data. The key generated through the SWJK technique will be saved in the Kerberos system. The Kerberos system will act as a database authentication system. The user will first send the key they got from the SWJK method to the Kerberos system in order to decode the data. The Kerberos system will verify the validity of the SWJK key via the KSS method. After verification of the key’s validity, the data decryption will automatically use the same key, yielding the plaintext. The peculiarity of this work is that when such methods and algorithms are employed for data security, data leakage or breakage will become impossible if the attacker applies any technique or algorithm to the suggested algorithm.
The remaining paper will be distributed in this manner. In Section 2, the proposed work will be discussed. The suggested algorithm will be detailed in Section 3. The suggested work will be appraised in Section 4. In Section 5, we will compare the suggested work with existing work to see how much better it is. Conclusions and suggestions for further study are included in Section 6.

3. Proposed Algorithm

Three procedures will be devised to preserve and encrypt data from potential intruders. The first is to develop a customized ASCII table that aims to shift each ASCII value to different indexes. When the attacker attempts to access the data from the cloud, their first approach is to employ the Standard ASCII table in their grabbing methods. Using a customized ASCII table rather than the Standard ASCII table makes it challenging for an attacker to get ASCII indexation. When the attacker attempts to decode the data using any method on the cipher data, the attacker will obtain data utterly unrelated to the original data. A Kerberos system will be developed to implement the customized table and store the data, which will be discussed in Section 3.2. To protect the cloud data, it is vital to protect the key associated with it. It does not matter how many secure algorithms are developed for cloud data. Each algorithm works with a key. Once an attacker has access to the key, it will be easy for the attacker to gain access to the data, which is a problem. To solve this problem, the SWJK algorithm will be developed in this paper, which aims to protect user-defined keys by using the SWJK algorithm, and the key has to be encrypted with a key of various symbols, numbers, and characters. When such a key is used to protect data, it will be challenging for an attacker to guess the key or implement cryptanalysis. The discussion on the SWJK algorithm will be carried out in detail in Section 3.2. Table 1 displays many mathematical notations and their respective meanings.
Table 1. Mathematical Notations.

3.1. Customized ASCII Table

The most crucial components for data security against hackers or cryptanalysis assaults are ASCII values. When attempting to steal data, an attacker always employs predefined ASCII tables that are advantageous to the attacker. Data security may be considerably increased when employing a customized ASCII table to store data instead of an ordinary ASCII table. The data for this research have been stored in a modified ASCII table. Characters, numbers, and alphanumeric letters are arranged in a randomly generated fashion in a customized ASCII table. When the values of the provided ASCII table and the customized ASCII table are in separate indexes, it will be challenging for the attacker to obtain the customized ASCII table index data. Figure 2 displays a whole ASCII table.
Figure 2. Customized ASCII table.

3.2. Kerberotic System

Figure 3 depicts the database system (DS) and authentication system (AS) that comprise the key distribution system known as the Kerberos system. Whenever a user encrypts data, all the keys generated by the SWJK algorithm will be automatically saved in the key database system. All varieties of SWJK keys will be kept in the key database system, which is a centralized database system. All keys used in data encryption will be checked within the framework of the authentication system, which is called the key verification system. If the key is valid, then text decryption will be possible. If the arriving key does not match an existing key, the data decryption process will not be possible. Data decryption is possible only when the arriving key matches any one of the keys that are already stored in the database of the Kerberos system, and the data decryption will be carried out automatically on the same key that has already been used, whether the arriving key will match with encrypted text or not. To implement the data decryption process, the key must match the stored key of the database system. When the key does not match the database, the data decryption process will not be possible.
Figure 3. Key distribution system.
When an arriving key is matched with a key stored in the database system, data decryption is possible whether the key is authentic or inauthentic. However, by not using the original key, the attacker will get data that is not authentic and will have no relation to the original data. The main advantage of using such an algorithm would be that the attacker would not have to match the key repeatedly and could not decipher the decrypted data. The original key obtained from the SWJK algorithm must be implemented on the cipher data to get the original data. Otherwise, data decryption will not be possible.
Various researchers used different algorithms to protect data from attackers. Some researchers used user-defined symmetric keys to secure the data. Some researchers have worked on public and private user-defined keys to protect cloud data. Different symmetric and asymmetric user-defined keys are not the best solution to protect the data entirely from attackers. Each user uses a key to protect the data, but by guessing this key, an attacker can access the cloud data. When the proposed SWJK algorithm is implemented on the user-defined key, a new key (cipher key) containing various symbols, numbers, and characters is obtained. Then, when the data are encrypted with that key, it will be impossible for an attacker to get or access it. The length of the key obtained from the SWJK algorithm will be much less than the original key, and no snatching, guessing, or cryptanalysis mechanism can be used on such a key. Various researchers have used symmetric or asymmetric keys to secure data. If any algorithm has been developed to protect the key, then the length of the key has not been reduced with the help of any algorithm. When the cipher key length is half the user-defined key, no matter how efficiently the algorithm is developed for key generation, the key cannot be accessible.
When the SWJK algorithm is applied on a user-defined key K[x], a secure key “K[j]” will be produced. After obtaining the key K[j], the key will be implemented on plaintext data, and a ciphertext will be obtained. The key “K[j]” will be stored on the KSS of the Kerberos system, as illustrated in Figure 4. To establish whether the key submitted on the Kerberos system is legitimate or invalid before attempting to decrypt the data, the user’s key must first be authenticated. The purpose of an authentication system (AS) is to check the authenticity of the key. When the user uses the key K[j] for data decryption, the key will first be transmitted to the encryption system, where the key-matching process will be carried out with the help of KSS. Data decryption is possible if the arriving key matches the KSS key. If the arriving key matches the KSS key, but some other data are encrypted with that KSS key, and when the arriving key is applied to the encrypted data, the user will get data that has no relation to the original data. The attacker consistently attempts to get the key, which is why this technique is used. Even after decrypting the encrypted data using a key obtained through the key-matching mechanism, the attacker cannot access the original data because that data have no relation to the original data. The advantage of this will be that the encrypted data will not be attacked and searched repeatedly, which is a better form of data security.
Figure 4. Framework of WEDEx Kerberotic system.
Data decryption will be feasible if K[j] meets KSS. The original data will be decrypted if the incoming key is equal to the one used to encrypt the data. The data will be decrypted but will only be authentic if the key is genuine and matches the encrypted data.

SWJK Key Generator Algorithm

The SWJK key generator is an excellent technique for protecting data from intruders. In this technique, the cipher key is generated using a user-defined key, and then the ciphertext is obtained by applying the cipher key to plaintext. It is relatively easy for an attacker to figure out a username-base key, numeric key, or alphabetic key pattern. A typical example of this is cryptanalysis data mining. However, obtaining that key will be complicated when data are encrypted with a cipher key.
The SWJK technique is created to address this issue, which will firstly generate a user-defined key K[x], as illustrated in Figure 5. “x” refers to the key’s length, which is maintained constant in the proposed technique K[7]. Following acquiring the key, K[7] will be indexed using Equation (1).
[K] = [K0] [K1] [K2] …… [Kp]
Figure 5. SWJK key generator.
As illustrated in Equation (2), the equivalent ASCII value K[n] of each key value will be determined after indexing the key [K].
K[n] = (AS0[K0]) (AS1[K1) ……. (ASn[Kn])
(AS0[K0]) indicates that the ASCII of Index [K0] is [AS0]. Similarly, (AS1[K01]) indicates that the ASCII of Index [K1] is ASCII [AS1]. After obtaining the key K[n] index ASCII values, the index values will be divided into two sections, the first of which will be odd indexation 1] as illustrated in Equation (2a), and the second, even indexation 2] is illustrated in Equation (2b).
Odd Indexes [δ1] = (AS1[K1]) (AS3[K3]) …. (ASx[Kx])
Odd indexation 1] will have all the odd values of K[n], which start with [n1] and end will be on [nx].
Even Indexes [δ2] = (AS0[K0]) (AS2[K2]) …. (ASyx[Ky])
Even indexation 2] will contain all even values. Even values start from Index [n0] and end on [ny]. The SWJK algorithm will be applied to the odd index values 1]. In the SWJK algorithm, odd indexation [δ1] values will be obtained, and Equation (3) will be applied to the values.
[m n] (s) = σ* mod [x]
In eq (ii), “σi[1] and i[3] are the values on which testing will be applied. “i” represents the index number. “∮” is the result of Equation 3. Index [m] will contain the values of the test-related indexes i[1] and i[3]. First, the first value will be obtained from Index i[1] and utilized for testing. A second value will be obtained from Index i[3] for testing. The value of Index [n] will be the Index [5] value used in mod [x].
After getting the two values from Indexes i[1][3] and I [3][5], all values will be transformed using Equation (4) into 1x2-matrix form.
[ n ] [ m ] = 1 5 3 5
After getting the values from Equation (4) index, all values of even indexation [δ2] will be converted into the 2x2-matrix form[δ[2x2]] with the help of Equation (5).
δ [ 2 x 2 ] = [ i ] [ j ] [ k ] [ l ]
In Equation (5), two rows and two columns are denoted by [2x2], while the indexes represent the values that result from [δ2] [i][j][k][l]. The result of Equation (5) can also be expressed as in Equation (6).
δ [ 2 x 2 ] =   [ q ] [ p ]
In Equation (6), [p] denotes the length of rows and [q] the length of columns. All values will be added together, as illustrated in Equation (7), once the results of odd indexation Equation (4) and even indexes Equation (6) have been obtained.
γ [ r ] =   [ q ] [ p ] + [ n ] [ m ]
By rules, we know that the values of γ [ r ] belong to   [ q ] [ p ] and [ n ] [ m ] . So, mathematically for Equation (8), the following can be said:
γ [ r ]     [ q ] [ p ] [ n ] [ m ]
[ γ [ r ] ] is the key generated by the SWJK algorithm. After obtaining the values from [ γ [ r ] ] , convert the values of [ γ [ r ] ] to 1x4-matrix form. After that, a key K[j] will be obtained. After generating the key K[j] from the SWJK algorithm, we can say that the SWJK algorithm can reduce the length of K[x]. If this algorithm is used to generate the key, no one attacker can guess the key and no one can perform the cryptanalysis attack on the [ γ [ r ] ] key. The length of the original key is K[7], while the length of the text obtained by the SWJK algorithm is K[4], which means that the length of the SWJK key is twice that of the original key. The key values generated by the SWJK algorithm [ γ [ r ] ] will be different from the original key K[x].
So, mathematically, for Equation (9), the following can be said:
[ γ [ r ] ]   K [ x ]
The length and values of [ γ [ r ] ] will be determined by K[x] but the values obtained from [ γ [ r ] ] will be different from K[x]. When the key length of K[x] is longer, then the length of [ γ [ r ] ] will be two times less than the actual key, which makes the SWJK algorithm innovative.
Various algorithms (Algorithms 1–5) have been developed to convert plaintext to ciphertext, as shown in Figure 6. These algorithms aim to derive a cipher key from a user-defined key and then use this cipher key on plaintext to encrypt the data. After that, the data are to be decrypted using the same cipher key. In Algorithm 1, the SWJK key generator algorithm was developed to convert a user-defined key into a cipher key. SWJK will convert the user-defined key into a key with a combination of different numbers, characters, and symbols, and the length of the cipher key will be significantly reduced to the original key length. Algorithm 2 was used to find the mid-point from plaintext using a randomized mid-point algorithm. The reason for finding the mid-point is to interlink the plaintext bits values with each other. A secure data encryption algorithmwass developed in Algorithm 3 to obtain ciphertext from plaintext, cipher key, and mid-point value. In Algorithm 4, text decryption was performed using a cipher key and ciphertext. The key generated by the SWJK algorithm (Algorithm 1) is used to decrypt the ciphertext. After that, the novelty of the key obtained from the SWJK algorithm is determined, for which cryptanalysis (Kasiski test algorithm) is used on cipher keys in Algorithm 5.
Algorithm 1: SWJK Key Generator
Input: User-Defined Key K[x]
Output: SWJK Key K[j]
  • Input a key K[x] length of 7.
  • Divide the key K[x] into index form.
    [K] = [K0] [K1] [K2] …… [Kp]
  • Convert each index value of [K] into ASCII form.
K[n] = (AS0[K0]) (AS1[K1) ……. (ASn[Kn])
4.
Split K[n] indexes into odd [δ1] index and even [δ2] index form.
5.
Apply the SWJK algorithm on [δ1] for the values of Index [m] and Index [n].
(a)
[m n] (s) = σ* mod [x] on [δ1] values and obtained the values of Index [m] and Index [n].
(b)
Convert ∮[m n] values into 1x2-matrix form by using the equation [ n ] [ m ] = m 1 n m 2 n
6.
Convert Step-4 [δ2] ven-indexes into 2x2-matrix form. δ [ 2 x 2 ] = [ i ] [ j ] [ k ] [ l ]
7.
Sum the values of Step-5(a) with Step-6 by using an equation   [ γ [ r ] ] =   [ q ] [ p ] + [ n ] [ m ] .
8.
Convert step-7   [ γ [ r ] ] results in 1x4-matrix form.
9.
A key K[j] will be obtained.
Figure 6. Algorithm flow of WEDEx-Kerberotic encryption and decryption system.

3.3. WEDEx-Kerberotic Data Encryption System

A system for network authentication called Kerberos is often used to provide trustworthy authorization for users and services across unsafe connections, like the Internet. Kerberos’ primary objective is to provide reliable authentication in a networked context so that users can securely authenticate their identities to one another without sending sensitive information over the Internet. It uses the key distribution centre (KDC), a dependable third-party service, and symmetric key cryptography.
The WEDEx-Kerberotic encryption system is created to protect both the data and the key concurrently since it is not sufficient to secure either the key or the method for protecting the data. To begin, a key K[x] with a length of K[7] will encrypt the data. After that, the key K[x] will be subjected to the SWJK algorithm to produce the key K[j], whose length will be K[4], which is two times less than K[x]. After getting the key K[j], the ASCII of plaintext P[n] and key K[j] will be determined, and both will be converted to Bit [P]. After converting K[j] and P[n] to Bits [P], both will be XORed with each other with the help of Equation (10).
E = P ⊙ K
After XORing the values, the binary values [E] will be obtained, and then the randomized seed mechanism will be implemented on these binary values [E]. The original key K[x] will be taken for the randomized seed mechanism, and the mid-point of the key will be determined with the help of the randomized seed mid-point algorithm.
Algorithm 2: Randomized Mid-Point
Input: Key K[x]
Output: Mid-Point
  • Count the key K[x] length.
  • Calculate the total number of key K[x] indexes.
       K[x] = K[0] K[1] K[2] …… K[6]
  • Calculate the mid-point value by using the equation
           [m] = (K[x] + 1)/2
  • IF [m] == [EVEN_INTEGER], THEN
    GOTO Step-5
    ELSE IF [m]== [ODD_INTEGER], THEN
       Apply [m]+=[m]
  • A mid-point value will be obtained.
After finding the randomized seed mid-point [m], [m] will be converted to an 8-bit binary, and then 4-bit splitting will be carried out to obtain “α” and “β” values. After obtaining the “α” and “β” values, with the help of Equation (11), secure encrypted text will be produced in binary form.
L = α ┼ E ┼ β
A bit-appending mechanism will be applied to all binary values obtained from Equation (11). In the bit-appending mechanism, the 4 bits of “α” will be merged with the beginning of 4 bits of the XORed Text [E] to get an 8-bit binary result, as illustrated in Figure 7. Similarly, 4 bits from the previous text and 4 bits from the next text will be combined to form an 8-bit pair, resulting in a secure 8-bit binary text. When bits are concatenated, each bit depends on another bit. The entire ciphertext will be affected if a single value is changed. The unique aspect is that it will change and impact the whole text. When each value of the text is linked, and the length of the encrypted text is greater than the original text, the attacker will consider each value as an encrypted value and try to decrypt the value even though the length of the encrypted text is not the actual length the original text.
Figure 7. WEDEx-Kerberotic encryption mechanism.
After implementing the bit appending mechanism, the bit appending results will be converted to decimal [D]. ASCII values will be obtained using the formula Y = D + 3 on the decimal [D] result. When this formula is applied, the resulting values [L] will be shifted to the next 3-values to the original values. When the attacker implements the attacking mechanism on the data, the attacker will consider the shifted values as the original values and try to decrypt the data, which will not be the original values. After getting its different values, all the values will be merged, and a text called ciphertext will be obtained. The key snatching technique cannot be implemented, nor can it be used to compromise the security of the data when the WEDEx-Kerberotic algorithm is used for data security. The key and the data are protected simultaneously with the aid of the suggested method, increasing key and data security.
Algorithm 3: Encryption
Input: Plaintext P[n]
Output: Ciphertext
  • Plaintext P[n] and SWJK key K[j].
  • Convert P[n] and SWJK key K[j] into ASCII form.
  • Convert each value of P[n] and K[j] into an 8-binary value form.
  • Find the random seed [α, β] values using a randomized mid-point Algorithm.
  • Apply bit appending mechanism on “L = α ┼ E ┼ β.”
  • Convert each bit appending value into decimal [D] form.
  • Apply the value shifting formula “Y = D + 3” in Step 6.
  • Find the ASCII value of [Y].
  • A ciphertext will be obtained.

3.4. WEDEx-Kerberotic Data Decryption System

The WEDEx-Kerberotic technique encrypts the data, which will first be decrypted using a ciphertext [C]. Each character in ciphertext [C] will be changed into its corresponding ASCII [D] character. After obtaining the various ASCII values, the bit-reversing process will be used for each ASCII value, for which the formula Y = D − 3 will be utilized. Each value will be transformed to an 8-bit binary after being obtained through the bit reversing mechanism, as illustrated in Figure 8.
Figure 8. WEDEx-Kerberotic decryption mechanism.
All decimal numbers will be transformed into binary [B] form after being obtained. After that, a bit’s elimination mechanism will be applied to these bits. The first 4-bit “α” of the start and 4-bit “β” of the end will be removed with the help of Equation (12).
G = αEβ
After that, SWJK key K[j] will be taken and converted to ASCII. The binary values [G] and [J] will then be obtained. [G] is the value that will be obtained from the ciphertext [C] mechanism, while [J] will be obtained from the SWJK key.
Equation (13) will help implement the XORed mechanism on binary values [B] and [J], and the results [Q] will be obtained in binary form.
Q = [G] ⊙ [J]
The binary outcome of the XOR will be implemented using a bits pairing technique. To acquire equal ASCII values, each value derived from binary pairings will be transformed into decimals. The result obtained from the equivalent values will be considered plaintext P[n]. Figure 8 illustrates a complete decryption mechanism.
Algorithm 4: Decryption
Input: Ciphertext
Output: Plaintext
  • Ciphertext [C]
  • Transform each cipher (C) text value into ASCII (D) format.
  • Apply the bit reversing mechanismY = [D] − 3” in Step 2.
  • Convert each value of step-3 [Y] into 8-bit binary form.
  • Apply the bit-elimination mechanism in Step 4.
  • Eliminate the values of “α” and “β” using a randomized seed mechanism.
  • Binary values [G] and [J] will be obtained from Step 6.
  • XOR mechanism “Q = [B] ⊙ [J]” will be applied to binary values.
  • Apply the bit pairing mechanism in Step 8 and obtain Decimal [E] values.
  • Change each decimal [E] value to its corresponding ASCII character.
  • Plaintext P[n].
Algorithm 5: Kasiski Test
Input: Ciphertext
Output: Key Prediction
  • Ciphertext
  • Determine the values of the repeated ciphertext
  • Determine indexes of repeated numbers
  • Calculate the length employing the Kasiski length method
Apply the “Y = Y1 − Yn” formula to calculate the distance between the first and xth values
Determine the greatest common division among all distances
5.
Calculate the length of the key using Step 4
6.
IF CIPHER_TEXT_LENGTH = = KEY_LENGTH, then go to next step
ELSE (FIND_KEY) and go to step 9
7.
Implement the index of coincidence
Jc (Y) = (Favorable cases/Total Possible cases)
Jc (Y) = (Hi/ Tc)
8.
Kasiski K
9.
key
10.
Exit

4. Testing

The derived key of the SWJK method is initially checked to determine the security of the data and the key. After that, a ciphertext will be produced by applying the key from the SWJK algorithm to the plaintext.

4.1. SWJK Key Testing

Step 1: First, a key K[x] is taken, illustrated in Figure 9, whose length is K[7].
Figure 9. Plaintext.
Step 2: Each K[x] value is converted into index form, as illustrated in Figure 10.
Figure 10. Plaintext indexes.
Step 3: After obtaining the index values of the plaintext, the customized ASCII value of each index value is obtained, as illustrated in Figure 11.
Figure 11. ASCII values.
Step 4: After getting the ASCII values, all indexes are transformed into even indexes and odd indexes, as illustrated in Figure 12.
Figure 12. Split odd and even index values.
After splitting the values into odd and even indexes, both index values have to be concatenated separately.
Odd Indexes [δ1] = [1] [3] [5]
Even Indexes [δ2] = [0] [2] [4] [6]
Step 5: After splitting the values into odd and even indexes, the SWJK algorithm is implemented on odd indexes [δ1].
Step 5.1: All values of odd indexes are first converted to the index character to identify parallel values of indexes, and then the equivalent of each value is determined, as illustrated in Figure 13.
Figure 13. Indexes parallel values.
Step 5.2: After obtaining the parallel values, Equation (14) will be implemented in step 5.1.
[m n] (s) = σ* mod [x]
Where [m] is the ASCII value of Index [1] and Index [3]. Firstly, the Index [1] ASCII value will be used in the equation to get the result-1. After that, Index [3] ASCII value will be used in testing 2 by the equation and get the result-2. Index [m] value will be placed in “σ.” [n] is the static value that will be the same for Index [m] testing. Index [n] will be placed in “mod[x].” “s” represents several time tests.
Step 5.2.1: First, Index [1] and Index [5] will be tested and will get the first result value.
[1 5] (1) = (227)* mod [6]
= 3…result (i)
Step 5.2.2: After testing the Index [1] and Index [5], Index [3] and Index [5] will be tested by using Equation (15), and a second result will be obtained.
[3 5] (2) = (2)* mod [6]
= 4
Step 5.2.2: After getting the two values from Index [1][5] and Index [3][5], both results values will be converted into 1x2 matrix form.
[ n ] [ m ] = 1 5 3 5 ( 1 ) ( 2 ) = 3 4
Step 6: After obtaining the results from odd indexes [δ1], even indexes will be converted to 2x2-matrix form.
δ [ 2 x 2 ] = [ i ] [ j ] [ k ] [ l ] = [ 0 ] [ 2 ] [ 4 ] [ 6 ] = [ 85 ] [ 132 ] [ 102 ] [ 67 ]
After obtaining the 2x2-matrix values, Matrix δ [ 2 x 2 ] .   It can also be represented as the following:
δ [ 2 x 2 ] =   [ q ] [ p ]   [ q ] [ p ] =   [ 2 ] [ 2 ]
Step 7: The values of Step 6   [ q ] [ p ] are summed with step-5.2.2 results [ n ] [ m ] by using Equation (16).
γ [ r ] =   [ q ] [ p ] + [ n ] [ m ] γ [ r ] = [ 85 ] [ 132 ] [ 102 ] [ 67 ] + 3 4 γ [ r ] = [ 88 ] [ 136 ] [ 105 ] [ 71 ]
Step 8: Step-7 results γ [ r ] are converted into 1x4-matrix form.
γ [ r ] = [ 88   136   105   71 ]
Step 9: Each value will be converted to its corresponding ASCII after being transformed into a 1x4-matrix form, and a key K[j] will be obtained in cipher form, as shown in Equation (17).
γ [ r ] = [ ê   ï   û   u ]
Key   K [ j ] = ê   ï   û   u

4.2. WEDEx-Kerberotic Encryption Algorithm Testing

Step 1: To encrypt the data, a dynamic key K[x] will be taken from the user and converted into cipher form using the WEDEx-Kerberotic algorithm.
Key K[x] = W@j!h@5
Cipher   Key   K j = ê   ï   û   u
Step 2: After getting the key K[x] into cipher form from the SWJK algorithm, named cipher key K[j], a simple text P[n] has then been taken.
Plaintext P[n] = N@DeEm_78
Step 3: After obtaining the plaintext P[n] and cipher key K[j], as seen in Figure 14, each character of P[n] and K[j] is changed to its corresponding ASCII character.
Figure 14. ASCII of plaintext and key.
Step 4: Each value is transformed to an 8-bit binary after being given the ASCII values for the plaintext P[n] and key K[j], as illustrated in Figure 15.
Figure 15. Binary values of plaintext and SWJK key.
Step 5: After obtaining the binary values, the plaintext P[n] and the SWJK key K[j] are XORed with each other using an equation “E = P ⊙ K” to increase the data security, as illustrated in Figure 16.
Figure 16. XOR results.
Step 6: After obtaining the XORed results, the random key values (α, β) have been obtained from the randomized key mechanism, for which the indexes of the key taken from the user are determined first.
K[x] = [K0] [K1] [K2] [K3] [K4] [K5] [K6]
= [0] [1] [2] [3] [4] [5] [6]
There is a total of seven indexes K[x]= 7 from [K0] to [K6]. After finding the indexes, the mid-point value is determined using Equation (18).
[m] = ((K[x] + 1)/2)
= 4
So, the mid-point Index [m] = 4, and the value of Index [4] is “!”. After finding the mid-point value [m] of user-defined key K[x], the ASCII value of “!” is determined using a customized ASCII table, which is [2].
[!] = [2]
After finding the ASCII value, an 8-bit binary of ASCII value of “2” is determined.
Binary of 2 = [00000010]
After obtaining the 8-bit binary, it is split into two parts. The first four bits are equated to “α,” while the last four bits are equated to “β.”
α = 0000
β = 0010
Step 7: After getting the random seed (α, β) values, random seed “α” is concatenated to the beginning of the XORed result [X], while Random Seed “β” is concatenated to the end of the XORed result [X], as illustrated in Figure 17.
Figure 17. Random seed concatenation results.
Step 8: After concatenating the random seed values, the bit appending mechanism is implemented in step 7. In the bit appending mechanism, the 4 bits of the random seed “ α “ have been concatenated with the following 4 bits to form a pair of 8 bits. Similarly, an 8-bit pair is made by merging the previous four binary bits and the following 4. Each value will be linked using the bit-appending mechanism, as illustrated in Figure 18. If an attacker tampers with the values, then due to changing the values, the original text will be changed into a text that is entirely different from the original text.
Figure 18. Bit appending results.
Due to the random seed technique, the amount of encrypted text produced will be more than the original text, and each value will be linked to the others. The attacker will attempt to use the encryption technique on each cipher value while attempting to decode the data, but the characters of the cipher values will not have any link with the plaintext character.
Step 9: The 8-bit values obtained by the bit appending mechanism are transformed to decimal form, as illustrated in Figure 19.
Figure 19. Decimal values.
Step 10: As demonstrated in Figure 20, after the different decimal values are collected, all values are swapped out for the following three values to separate the encrypted data from the original data, which is carried out using the formula D = D + 3 to the step-9 decimal values.
Figure 20. Shifted value result.
Step 11: As seen in Figure 21, all decimal values are changed to identical ASCII.
Figure 21. ASCII value of each decimal.
Step 12: After acquiring various ASCII values, all values are concatenated to create encrypted text.
Ciphertext [C] = ┐₤EUR EUR ? Bn¯Ne]

4.3. WEDEx-Kerberotic Decryption Algorithm Testing

The data are decrypted using various procedures and methods, converting the Ciphertext to plaintext.
Step 1: A ciphertext [C] is taken to decrypt the data.
Ciphertext [C] = ┐₤Ä? Bn¯Ne]
Step 2: Following the ciphertext [C] collection, each character is converted into corresponding ASCII using a customized ASCII table, as illustrated in Figure 22.
Figure 22. ASCII of each ciphertext.
Step 3: After acquiring the different ASCII values, the actual values are produced by applying a bit-shifting method [Y] to them.
Y = D − 3
Decimal values are replaced by previous third index values with the help of [Y], as illustrated in Figure 23.
Figure 23. Values shifting.
Step 4: Each value acquired by the values shifting technique is transformed to an 8-bit binary, as demonstrated in Figure 24.
Figure 24. Binary of each decimal.
Step 5: After obtaining the 8-bit binary values, a bit-elimination mechanism [G] is applied to eliminate the random seed [G] values, as illustrated in Figure 25.
G = α ┬ E ┬ β
Figure 25. Random seed elimination.
Step 6: After eliminating the random seed values, the SWJK key K[j] is taken, which is converted to ASCII and converted to binary form, as illustrated in Figure 26.
Figure 26. Binary values of SWJK key.
Step 7: Following acquiring the binary values, key K[j] and text [G] are XORed to produce a binary form text, as illustrated in Figure 27.
Figure 27. XOR results of key and text.
Step 8: Different decimal values [E] are obtained by creating 8-bit pairs of the bit values obtained from the XORed result, as illustrated in Figure 28.
Figure 28. A decimal value of each binary pair.
Step 9: After getting the various decimal [E] values, all the values are concatenated, and a plaintext [E] is obtained.
P l a i n   T e x t   [ E ] = N @ D e E m _ 78

4.4. Text Encryption Testing

A tool has been created to evaluate the algorithm’s effectiveness. User authenticity is verified before the data may be encrypted, for which a user login mechanism is established. Data encryption will be available upon user authentication, as illustrated in Figure 29.
Figure 29. Tool encryption result.
After the user authentication, the data are encrypted using the WEDEx-Kerberotic system, which first inserts the user-defined key before inserting the plaintext, as illustrated in Figure 29. A secure ciphertext and a SWJK key are acquired once the plaintext and user-defined key have been provided, and they will be used to decode the data. The data are encrypted using a separate key and will be decrypted using a different key.

4.5. Text Decryption Testing

The data must be decrypted using a WEDEx-Kerberotic decryption tool, which requires the encryption key. Data may be decrypted only if the incoming key matches the Kerberos database system key. If the key matches, the ciphertext will be entered, and the arriving key will be applied to the ciphertext regardless of whether the ciphertext is linked to the key. As illustrated by Figure 30, legal information may be acquired by linking the ciphertext and the key.
Figure 30. Authentic key implementation result.
If the existing key matches the database key, but the input ciphertext does not match the ciphertext key, then a plaintext will be obtained that is neither original nor authentic, as illustrated in Figure 31.
Figure 31. Inauthentic key implementation result.
Data security will be divided into two phases when an algorithm like this is utilized. The first phase is based on key matching, while the second is based on cryptographic algorithms. Data stored in the cloud may be protected against any number of threats using such an algorithm.

4.6. Testing Results

Table 2 displays different results obtained after the development of the tool. Firstly, various simple texts are taken that are represented with [P], and the length of the plaintext is determined. Plaintext length is represented with P[n]. After obtaining the plaintext, various user-defined keys are obtained, represented by [K], and then the length of the user-defined key K[x] is determined. The reason for finding the key length used on different plaintexts is to compare the lengths when the plaintext and key are applied to the algorithm and to find out how much difference there is between the original length and the length obtained from the algorithm. When a user-defined key [K] is applied to the SWJK algorithm, cipher keys of different lengths are obtained, denoted by length K[j]. The length of the cipher key is much less than the length of the user-defined key, up to 40%. This means that when the user-defined key is applied to the SWJK algorithm. The SWJK algorithm will reduce the length of the user-defined key [K]. When the user gets a key, it cannot be guessed or retrieved using snatching mechanisms like cryptanalysis. After obtaining the different cipher keys, the key is applied to the plaintext [P], and the different ciphertext is obtained. The length of plaintext [P] is less than that of ciphertext [N]. This means that when we implement plaintext in the proposed algorithm, the length obtained by the proposed algorithm will also change, and the original length will be different from the ciphertext length. When the length of the plaintext is different from the ciphertext and the length of the user-defined key is also different from the cipher key, it means that it is a better innovation, and this framework can be used to protect data.
Table 2. All testing results.
When the proposed algorithm is used for data security, it will have two significant advantages. The first advantage is that the length of the plaintext will differ from that of the ciphertext. When any snatching algorithm is applied to the ciphertext, a value parallel to each cipher value will be completely irrelevant. The second advantage is that the proposed algorithm will significantly reduce the length of the original key, and the resulting cipher key will be completely unrelated to the original key. When key snatching or guessing is carried out using snatching techniques like cryptanalysis, the attacker gets keys that have no relation to the proposed algorithm key. When the proposed paper algorithm is used for cloud data security, no matter how efficiently the attacker develops the algorithm, it will be impossible to decrypt the data and the key.

4.7. Cryptanalysis

A cryptanalysis method has been used to determine the novelty of the proposed algorithm, which first used “Cryptanalysis by Plaintext and Ciphertext” and then “Key Cryptanalysis”.

4.7.1. Plaintext and Ciphertext Cryptanalysis

The efficacy of the proposed method is evaluated by cryptanalysis of plaintext and ciphertext, where the lengths of plaintext P[n] and ciphertext [C] are first ascertained. The key is accessible using the cryptanalysis approach when the plaintext and ciphertext have the same length. If the sizes of both are not the same, it is impossible to implement any cryptanalysis method, and the key cannot be anticipated. If both lengths are the same, it is easy to estimate the key accurately.
The suggested technique has been applied to these values, as illustrated in Figure 32, and various key results have been achieved, as illustrated in Table 3. The cryptanalysis of plaintext and ciphertext uses distinct plaintext values.
Figure 32. Plaintext and ciphertext cryptanalysis.
Table 3. Results of plaintext and ciphertext cryptanalysis.
The length of the ciphertext [C] and plaintext P[n] have been determined after obtaining different results. The length of the plaintext and the ciphertext cannot be identical since the size of the ciphertext exceeds the length of the plaintext owing to the implementation of the suggested method. If the sizes differ, neither the key prediction nor the cryptanalysis procedure may be used. The length of the plaintext and the encrypted text must match to forecast the key.

4.7.2. Key Cryptanalysis

A cryptanalysis algorithm called the Kasiski test is implemented to generate the key from the data. The Kasiski test, as shown in Figure 33, may assist in obtaining the Kky, and the snatching algorithm is employed.
Figure 33. Ciphertext cryptanalysis.
A cipher key K[j] and user-defined key K[x] are first taken to get the key from the Kasiski test, and then all the values in the ciphertext used repeatedly in the ciphertext are found. After determining the repeatable values, the index of each repeatable value is indexed. Table 4 shows the results of applying the Kasiski length method to the indexation of the repeated value, by which the distance from the first value to the xth value is determined. Distance is represented by “y.” After finding the distance, GCD (greatest common division) is implemented on “y.” The value obtained from GCD is considered the key length. As per cryptanalysis, key length can be possible when the cipher and original key lengths are the same. According to the SWJK algorithm, the length of the cipher and original keys is different.
Table 4. Cryptanalysis of ciphertext.
An index of coincidence can be implemented if the key length and ciphertext length are equal. Key identification is impossible if the key and ciphertext lengths are unequal. Favorable cases and possible cases are identified in the index of coincidence. Favorable cases mean the prediction of equal random numbers, whereas total cases refer to the number of feasible key length calculations. The ciphertexts generated by the proposed approach are all entirely distinct from the input. Because a technique was used to obtain the ciphertext, replacing the original values with other values and linking all the words together, if a value is repeated repeatedly, it does not mean that the key prediction is possible. The key can only be derived from the ciphertext when each value is replaced with an ASCII value. The originality of the technique provided in this paper is that it is impossible to exploit when the values are modified, no matter how proficiently the attacker creates a cryptanalysis program.

4.8. Comparative Cost Analysis

A WEDEx-Kerberotic system has been developed to secure data from attackers. The novelty of the proposed algorithm is that the key and data are encrypted simultaneously. The cipher key is obtained using the SWJK algorithm. Each encrypted ciphertext value obtained from the proposed algorithm is interconnected. Tampering with any single value can affect the structure of the entire ciphertext. The key obtained from each text is unique, but its use is limited and can only be used on that text. Despite using techniques like cryptanalysis, decrypting the ciphertext obtained from the proposed algorithm will not be easy.
The proposed tool has been implemented on multiple servers to evaluate the algorithm’s efficacy, as illustrated in Table 5. Testing is performed across various operating systems (OS) on each server. The initial stage involved finding the lengths of the plaintext, key, and ciphertext. After this, the memory allocation of plain and encrypted text is determined. After determining memory allocation, the next step involves calculating the time allocation required for the encryption and decryption of the data.
Table 5. Cost analysis.

5. Comparative Analysis

Various academics have devised unique algorithms to keep sensitive information safe. Researchers reviewed the literature and debated the most effective methods. A hybrid algorithm was created by academics who tweaked existing algorithms.
M. A. Al-Shabi [] reviewed cryptographic algorithms, compared their methodologies, and found that symmetric algorithms are more secure and reliable than asymmetric ones. This research compared the algorithms, and the best strategies were presented. However, instead of using the best techniques for cloud data security, a safe algorithm was not constructed.
Musa et al. [] devised a Hill cipher technique to secure data against man-in-the-middle attacks that transformed plaintext to ciphertext using a standard ASCII table. This paper’s issue is data decryption employing the user-defined key and Hill cipher method.
Hossaim et al. [] used three data security techniques to create a ciphertext using three static keys. This paper’s issue is that each key must use the same technique to decrypt data. Key use is hard to memorize. Instead of three keys, one safe key may protect data.
In Paper [], the attacker may easily access data after cryptanalyzing the key. The researchers secured the data using a static key on plaintext. Instead of using a key, researchers should build a key-securing method and apply it to the Vigenère cipher technique to get a ciphertext.
In [], the researchers made alterations to a Hill cipher algorithm and created a modified Hill cipher chain method. The main objective of this modification was to encode only the main key. The problem of this paper is that the security of the primary key alone is not enough unless the key is protected as well as the data.
Tan et al. [] examined Ceaser and Vigenère encryption algorithms to protect data and created a hybrid algorithm by combining the best methods. To protect the data, a static key was applied to the Ceaser cipher algorithm to get a cipher result, which was then applied to the Vigenère cipher using the same key to get a ciphertext. Instead of applying multiple algorithms’ outputs on each other, an efficient and trustworthy method might boost data security, which is this paper’s challenge.

The Novelty of Proposed Work

The proposed paper algorithm can be used to protect data from attackers and can also help users to keep data safe. In papers [,,,,], the researchers developed several security algorithms in which the data were encrypted and decrypted using a single key, as shown in Table 6, and whether the key was static or dynamic. No article has developed such an algorithm to simultaneously protect key and text data. The data are encrypted and decrypted in the proposed work using a cipher key. Each user-defined key generates a cipher key that can only be used for that text. When the key is additionally protected, data security can be further increased. When data security is performed using a customized ASCII table instead of a standard ASCII table, which is only done in the proposed work, it will be difficult for an attacker to discover the parallel indexes of each ciphertext. It is not enough to create a new algorithm using best practices from several publications to protect data. Cloud data cannot be secured unless a method is devised to encrypt both the ciphertext and the key simultaneously. Just as the ciphertext algorithm must be secure to protect the data, the key used on the ciphertext is also essential to be secure. Once an attacker has access to a user-defined key, the attacker attempts to spoof that key on any connected data. When the key used in each data is different and is a combination of different characters, key accessibility will be impossible, nor can one key be used on another data, which can be a complete and reliable security mechanism for cloud security.
Table 6. Comparative analysis.
When an attacker attempts to steal data, the attacker’s initial step is to get the key, for which the attacker uses snatching methods like cryptanalysis. In this article, the key has been secured with the help of the SWJK method, the objective of which is to obtain a key that had no connection to the original key and to reduce the length of the cipher key by two times from the length of the original key. After securing the key, the data are encrypted, for which the WEDEx-Kerberotic system is developed. The purpose of that is to provide authenticity to the cipher data. When an attacker receives the cipher data, the attacker tries to perform pattern-matching attacks on the data. Data security can be increased if the validity of the key is checked before applying the keys to the ciphertext because the keys can be applied to the encrypted data only when the key is valid. When the incoming key is the same as the KSS key, the key is automatically applied to the ciphertext, whether the incoming key is valid for that ciphertext or not. Data may be confidential when such a technique is used for cloud data; no matter how efficient the algorithm is, the security of the data cannot be broken, which is the novelty of the proposed algorithm.

6. Conclusions

After developing the WEDEx-Kerberotic framework, it is determined that when the proposed framework is used to secure cloud data, all user-defined keys and data can be secured simultaneously. The length of the ciphertext obtained by the algorithm is less than that of the original plaintext, which is more than 10%. The user-defined key is secured by applying the SWJK algorithm to it. The length of the key obtained by the SWJK algorithm is less than 40% of the original key and is a combination of different letters, symbols, and numbers. When the cipher key is much shorter than the original key and the cipher key is composed of a combination of different characters, it will be impossible for an attacker to access it. Cryptanalysis is applied to different cipher keys to determine the key’s authenticity. It is determined that no snatching techniques, such as cryptanalysis, can be implemented on the key obtained from the proposed algorithm, nor can accessing the key be possible. When the proposed algorithm is used to secure the cloud data, the key can be secured along with the data. When an attacker tries to attack the data, they can neither access the key nor retrieve the data in its original form, which can be a secure algorithm for cloud data.
In the future, a semi-supervised clustering algorithm will be developed to secure the data. This algorithm will be used to assess the authenticity of the users. It will transmit the incoming user packets to label and unlabeled clustering based on authenticity and apply a security mechanism. After that, we will also work on game theory for more robust analysis and security probabilistic testing.

Author Contributions

S.W.Z., conceptualization; M.N., methodology; A.A. (Ali Arshad), investigation and supervision; S.R., review; W.A., editing; M.A.B., software; A.A. (Amerah Alabrah), funding and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Researchers Supporting Project number (RSP2024R476), King Saud University, Riyadh, Saudi Arabia.

Data Availability Statement

Data are contained within the article.

Acknowledgments

This research was supported by the NASTP Institute of Information Technology, National University of Technology and King Saud University.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Gundu, S.R.; Panem, C.; Vijaylaxmi, J. A Glance View on Cloud Infrastructures Security and Solutions. Conversational Artificial Intelligence; Wiley: Hoboken, NJ, USA, 2024; pp. 1–15. [Google Scholar] [CrossRef]
  2. Pratyush, K.; Prasad, V.K.; Mehta, R.; Bhavsar, M. A Secure Mechanism for Safeguarding Cloud Infrastructure. In Proceedings of the International Conference on Advancements in Smart Computing and Information Security, Rajkot, India, 1–2 December 2023; Springer Nature: Cham, Switzerland, 2022; pp. 144–158. [Google Scholar]
  3. Alazaidah, R.; Al-Shaikh, A.; Al-Mousa, M.R.; Khafajah, H.; Samara, G.; Alzyoud, M.; Al-Shanableh, N.; Almatarneh, S. Website phishing detection using machine learning techniques. J. Stat. Appl. Probab. 2024, 13, 119–129. [Google Scholar]
  4. Jangjou, M.; Sohrabi, M.K. A comprehensive survey on security challenges in different network layers in cloud computing. Arch. Comput. Methods Eng. 2022, 29, 3587–3608. [Google Scholar] [CrossRef]
  5. Arunkumar, M.; Ashokkumar, K. A review on cloud computing security challenges, attacks and its countermeasures. AIP Conf. Proc. 2024, 3037, 020047. [Google Scholar]
  6. Jimmy, F.N.U. Cyber security Vulnerabilities and Remediation Through Cloud Security Tools. J. Artif. Intell. Gen. Sci. (JAIGS) ISSN 2024, 3006, 196–233. [Google Scholar]
  7. Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2046–2069. [Google Scholar] [CrossRef]
  8. Gu, Y.; Li, K.; Guo, Z.; Wang, Y. Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access 2019, 7, 64351–64365. [Google Scholar] [CrossRef]
  9. Abdulhamid, S.M.; Shuaib, M.; Osho, O. Comparative Analysis of Classification Algorithms for Email Spam Detection. Int. J. Comput. Netw. Inf. Secur. 2018, 1, 60–67. [Google Scholar] [CrossRef]
  10. Mohammed, C.M.; Zeebaree, S.R. Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. Int. J. Sci. Bus. 2021, 5, 17–30. [Google Scholar]
  11. Ali, M.; Jung, L.T.; Sodhro, A.H.; Laghari, A.A.; Belhaouari, S.B.; Gillani, Z. A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security. Alex. Eng. J. 2023, 64, 749–760. [Google Scholar] [CrossRef]
  12. Butt, U.A.; Amin, R.; Mehmood, M.; Aldabbas, H.; Alharbi, M.T.; Albaqami, N. Cloud Security Threats and Solutions: A Survey. Wirel. Pers. Commun. 2023, 128, 387–413. [Google Scholar] [CrossRef]
  13. Aoudni, Y.; Donald, C.; Farouk, A.; Sahay, K.B.; Babu, D.V.; Tripathi, V.; Dhabliya, D. Cloud security based attack detection using transductive learning integrated with Hidden Markov Model. Pattern Recognit. Lett. 2022, 157, 16–26. [Google Scholar] [CrossRef]
  14. Palanisamy, C.; Kumaresan, T.; Varalakshmi, S. Combined techniques for detecting email spam using negative selection and particle swarm optimization. Int. J. Adv. Res. Trends Eng. Technol. 2016, 3, 1102. [Google Scholar]
  15. Upadhyay, D.; Zaman, M.; Joshi, R.; Sampalli, S. An efficient key management and multi-layered security framework for SCADA systems. IEEE Trans. Netw. Serv. Manag. 2021, 19, 642–660. [Google Scholar] [CrossRef]
  16. Newman, S. Under the radar: The danger of stealthy DDoS attacks. Netw. Secur. 2019, 2, 18–19. [Google Scholar] [CrossRef]
  17. Al-Shabi, M.A. A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security. Int. J. Sci. Res. Publ. (IJSRP) 2019, 9, 576–589. [Google Scholar] [CrossRef]
  18. Musa, A.; Mahmood, A. Client-side cryptography based security for cloud computing system. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 25–27 March 2021; pp. 594–600. [Google Scholar]
  19. Hossain, M.E. Enhancing the security of caesar cipher algorithm by designing a hybrid cryptography system. Int. J. Comput. Appl. 2021, 183, 55–57. [Google Scholar] [CrossRef]
  20. Akanksha, D.; Samreen, R.; Niharika, G.S.; Shruthi, A.; Kiran, M.J.; Venkatramulu, S. A hybrid cryptosystem based on modified vigenere cipher and polybius cipher. EPRA Int. J. Res. Dev. 2022, 7, 2455–7838. [Google Scholar]
  21. Sun, H.; Grishman, R. Lexicalized dependency paths based supervised learning for relation extraction. Comput. Syst. Sci. Eng. 2022, 43, 861–870. [Google Scholar] [CrossRef]
  22. Tan, C.M.S.; Arada, G.P.; Abad, A.C.; Magsino, E.R. A hybrid encryption and decryption algorithm using caesar and vigenere cipher. J. Phys. Conf. Ser. 2021, 1997, 012021. [Google Scholar] [CrossRef]
  23. Arshad, A.; Nadeem, M.; Riaz, S.; Zahra, S.; Dutta, A.; Alzaid, Z.; Alabdan, R.; Almutairi, B.; Alaybani, S. Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality. Comput. Mater. Contin. 2023, 75, 3065–3089. [Google Scholar] [CrossRef]
  24. Singh, V.; Pandey, S.K. Revisiting cloud security threats: Replay attack. In Proceedings of the 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 14–15 December 2018; pp. 1–6. [Google Scholar]
  25. Tadapaneni, N.R. Cloud computing security challenges. Int. J. Innov. Eng. Res. Technol. 2020, 7, 1–6. [Google Scholar]
  26. Zaman, A.; Safarinejadian, B.; Birk, W. Security Analysis and Fault Detection Against Stealthy Replay Attacks. Int. J. Control 2022, 95, 1562–1575. [Google Scholar] [CrossRef]
  27. Thirumavalavasethurayar, P.; Ravi, T. Implementation of Replay Attack in Controller Area Network Bus using Universal Verification Methodology. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 25–27 March 2021; pp. 1142–1146. [Google Scholar] [CrossRef]
  28. Nadeem, M.; Arshad, A.; Riaz, S.; Band, S.S.; Mosavi, A. Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access 2021, 9, 152300–152309. [Google Scholar] [CrossRef]
  29. Bentil, F.; Lartey, I. Cloud Cryptography—A Security Aspect. Int. J. Eng. Res. Technol. (IJERT) 2021, 10, 2278-0181. [Google Scholar]
  30. Supiyanto; Mandowen, S. Advanced hill cipher algorithm for security image data with the involutory key matrix. J. Phys. Conf. Ser. 2021, 1899, 012116. [Google Scholar] [CrossRef]
  31. Elsaeidy, A.; Jamalipour, A.; Munasinghe, K. A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City. IEEE Access 2021, 9, 154864–154875. [Google Scholar] [CrossRef]
  32. Nadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.; Dutta, A.; Almotairi, S. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission. Appl. Sci. 2022, 12, 8143. [Google Scholar] [CrossRef]
  33. Bharath, K.P.; Kumar, M.R. New Replay Attack Detection Using Iterative Adaptive Inverse Filtering and High Frequency Band. Expert Syst. Appl. 2022, 195, 116597. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.