location:Home > 2024 Vol.7 Aug.N04 > Research and Optimization of Encryption Technology for Data Transmission in Cloud Computing Environment

2024 Vol.7 Aug.N04

  • Title: Research and Optimization of Encryption Technology for Data Transmission in Cloud Computing Environment
  • Name: HuiRu Wei
  • Company: Zhengzhou Business University,ZhengZhou,451200,China
  • Abstract:

     Influenced by the complexity of network information data structure, the lack of flexible expansion of the key usually leads to poor encryption security in the process of encrypting its transmission. In this regard, the research and optimization of data transmission encryption technology in cloud computing environment is proposed. Combined with the weighted Fourier transform method, the data is further selected in the highest bit plane by a certain size of the chain as a unit, and only the black and white chain of the highest bit plane is filtered as the encryption chain, so as to realize the data frame replacement operation. The original key is extended to 11×128bit extended key and S-box byte substitution processing is implemented for each byte and combined with AES algorithm to perform row shift operation as well as encryption key rotation and change processing operation so as to realize the data encryption, and finally, the key is updated and combined with random numbers to authenticate the identity information of both parties in the encrypted transmission process. In the experiment, the proposed method is verified for encryption security. Finally, the experimental comparison results can prove that when the proposed method is used for data encryption, the amount of network information data that the method is attacked is lower, and it has more ideal encryption security.


  • Keyword: cloud computing; network data; encrypted transmission; AES algorithm; Fourier transform;
  • DOI: 10.12250/jpciams2024090816
  • Citation form: HuiRu Wei.Research and Optimization of Encryption Technology for Data Transmission in Cloud Computing Environment[J]. Computer Informatization and Mechanical System,2024,Vol.7,pp. 67-71
Reference:

[1] Rajasekar A , Karunakaran A , Sivakumaran C ,et al. An original data encryption technique for communication networks[J].International journal of electronic security and digital forensics: IJESDF, 2024, 16(1):73-83.

[2] Patil A R , Borkar G M .Multimedia Data Transmission in MANETs Using the ACO-GWO Based AOMDV Protocol[J].Ad-hoc & sensor wireless networks, 2023,. 57(3/4):227-255.

[3] Kanani P , Vartak P , Dabre K ,et al. Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context[J]. Combinatorial Optimization, 2023, 45(2):1-27.

[4] Bhattacharjee S , Sharma H , Choudhury T ,et al. Publisher Correction to: leveraging chaos for enhancing encryption and compression in large cloud data transfers[J].The Journal of Supercomputing, 2024, 80(9):13493-13494.

[5] Srinivasu L N , Veeramani V .Steganography using wavelet transform for secured data transmission[J].Journal of ambient intelligence and humanized computing, 2023, 14(7 Pt.2):9509-9527.

[6] Sammeta N , Parthiban L .An optimal elliptic curve cryptography based encryption algorithm for blockchain-enabled medical image transmission[J]. Journal of Intelligent & Fuzzy Systems: applications in Engineering and Technology, 2022, 43(6):8275-8287.

[7] Ren J , Liu B ,Wan, YibinZhu, XiaorongUllah, RahatMa, YimingWu, XiangyuMao, YayaSun, TingtingZhang, ChenfangShen, ShikuiWang, ZelinWang, Guangquan.Mode division multiplexing chaotic encryption scheme based on key intertwining and accompanying transmission[J].optics express, 2022,. 30(26):47896-47908.

[8] Jiang L , Liu B ,Wu, XiangyuRen, JianxinUllah, RahatMao, YayaChen, ShuaidongXia, WenchaoZhao, LilongTian, Feng.High-security optical transmission system with multi-dimensional multiplexing based on quaternion chaotic encryption[J].optics express, 2023, 31(17):27711-27722.

[9] Reddy M I , Reddy M P , Reddy R O ,et al. Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission[J].Wireless Networks, 2024, 30(3):1151-1164.

[10] Karthikeyan S , Poongodi T .Secure Data Transmission in Smart Cities Using DNA Cryptography with LZW Compression Algorithm[J]. Instrumentation and Data Processing, 2024, 60(1):156-167.

[11] Ebinazer S E , Savarimuthu N , Bhanu S M .A hybrid encryption for secure data deduplication the cloud[J].Int. J. Cloud Comput. 2023, 12:295-307.

[12] Sun Y , Chatterjee P , Chen Y Z Y .Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things[J].IEEE internet of things journal, 2022, 9(4):2734-2743.

[13] Jia R , Xin Y , Liu B ,et al. Dynamic Encryption and Secure Transmission of Terminal Data Files[J].Computers, materials & continua, 2022, 71(1 Pt.2):1221-1232.

[14] Zhao C , Zhang Y , Xue Y ,et al. Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis[J ].Mobile Networks and Applications, 2022, 27(4):1386-1396.

[15] Cao H , Srivastava G .An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of "Traffic Engineering"[J].Mobile Networks and Applications, 2023, 28(3):1007-1018.

 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16