Abstract
Cloud computing has become a pivotal component of all digital organizations and its adoption poses many security concerns for organizations’ data and stakeholders. Data integrity and privacy is prominent security threats that demand the development of efficient security models based on exact algorithms, heuristics, and meta-heuristic algorithms. This paper proposes a genetic algorithm-based block cipher, XECryptoGA, to generate the 128-bit random keys to maximizing Shannon's entropy. The XECryptoGA employs the shift cipher, XOR-operation, the concept of elitism, and the roulette wheel selection method. In XECryptoGA, the shift cipher, XOR operation, GA, and application of crossover and mutation are used for the encryption and decryption process. The shift cipher, GA, and XOR operation create confusion, while the application of crossover and mutation is used to generate the diffusion in the model. The proposed XECryptoGA has been tested using several small and large datasets on various security parameters: Key generation time, brute-force attacks, avalanche effects, and encryption and decryption throughputs. The simulation study confirms that the proposed XECryptoGA has achieved security goals: confidentiality, integrity, and privacy. The experiment results show that the proposed model performs better than CryptoGA regarding Key generation time, Brute force attacks, avalanche effect, and security providence. While better than the state-of-art algorithms AES, DES, 3DES, and BLOWFISH in terms of encryption throughput and decryption throughput.
Similar content being viewed by others
Data availability statement
Data can be provided only on request.
References
Abduljabbar R (2017) Fast approach for arabic text encryption using genetic algorithm. Eur J Sci Res 144(4):342–348
Ahsan MM, Gupta KD, Nag AK, Poudyal S, Kouzani AZ, Mahmud MAP (2020) Applications and evaluations of bio-inspired approaches in cloud security: a review. IEEE Access 8:180799–180814. https://doi.org/10.1109/ACCESS.2020.3027841
Alhussain AH (2015) A literature survey on the usage of genetic algorithms in creating new encryption algorithm. In: The Strategies of Modern Science Development: Proceedings of the VIII International Scientific-Practical Conference, pp 15–18
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci (NY) 305:357–383. https://doi.org/10.1016/j.ins.2015.01.025
Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M (2021) A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9:57792–57807. https://doi.org/10.1109/ACCESS.2021.3073203
Amin ST, Saeb M, El-Gindi S (2006) A DNA-based implementation of YAEA encryption algorithm
Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security algorithms for cloud computing. Procedia Comput Sci 85:535–542. https://doi.org/10.1016/j.procs.2016.05.215
Boussaid I, Lepagnot J, Siarry P (2013) A survey on optimization metaheuristics. Inf Sci 237:82–117. https://doi.org/10.1016/j.ins.2013.02.041
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur Gener Comput Syst 25(6):599–616. https://doi.org/10.1016/j.future.2008.12.001
Cai F, Zhu N, He J, Mu P, Li W, Yu Y (2018) Survey of access control models and technologies for cloud computing. Clust Comput 22:1–12
Chowdhary SR, Ghosh A, Paul S (2019) Design and implementation of a novel cryptographic technique for network security using genetic algorithms (gas). Int J Comput Appl 7:119–129
Chunka C, Goswami RS, Banerjee S (2018) A novel approach to generate symmetric key in cryptography using genetic algorithm (GA). Adv Intell Syst Comput
Dalimunthe AR (2018) Modifikasi vernam cipher dengan pengoptimalan kunci menggunakan genetic algorithm
Dixit P, Gupta AK, Trivedi MC, Yadav VK (2018) Traditional and hybrid encryption techniques: a survey. Networking communication and data knowledge engineering. Springer, Singapore, pp 239–248
Jawed MS, Sajid M (2022) A comprehensive survey on cloud computing: architecture, tools, technologies, and open issues. International Journal of Cloud Application and Computing (IJCAC), 12(1), 1-33. https://doi.org/10.4018/IJCAC.308277
Jhingran R, Thada V, Dhaka S (2015) Article: a study on cryptography using genetic algorithm. Int J Comput Appl 118(20):10–14
Kalaivani A, Ananthi B, Sangeetha S (2018) Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. Clust Comput 22:3783–3790
Kalsi S, Kaur H, Chang V (2017) DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation. J Med Syst 42(1):17. https://doi.org/10.1007/s10916-017-0851-z
Knežević K (2017) Combinatorial optimization in cryptography. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1324–1330. https://doi.org/10.23919/MIPRO.2017.7973628
Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev 33:1–48
Kumar S, Karnani G, Gaur MS, Mishra A (2021) Cloud security using hybrid cryptography algorithms. In: 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), pp 599–604. https://doi.org/10.1109/ICIEM51511.2021.9445377
Kumar A, Nadeem M, Banka H (2022) Nature inspired optimization algorithms: a comprehensive overview. Evol Syst. https://doi.org/10.1007/s12530-022-09432-6
MazhariSefat B, Hosseini S (2022) Social network security using genetic algorithm. Evol Syst. https://doi.org/10.1007/s12530-022-09442-4
McCall J (2005) Genetic algorithms for modelling and optimisation. J Comput Appl Math 184(1):205–222. https://doi.org/10.1016/j.cam.2004.07.034
Picek S, Jakobovic D (2021) Evolutionary computation and machine learning in cryptology. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery, New York, pp 1089–1118
Rai R, Das A, Dhal KG (2022) Nature-inspired optimization algorithms and their significance in multi-thresholding image segmentation: an inclusive review. Evol Syst. https://doi.org/10.1007/s12530-022-09425-5
Rimol M (2021) Gartner says four trends are shaping the future of public cloud. Stamford, CT
Sajid M, Raza Z (2013) Cloud computing: issues and challenges. In: International Conference on Cloud, Big Data and Trust (ICCBDT) 2013, pp 35–41
Sajid M, Raza Z (2017) Energy-aware stochastic scheduler for batch of precedence-constrained jobs on heterogeneous computing system. Energy 125(C):258–274. https://doi.org/10.1016/j.energy.2017.02
Sajid M, Raza Z (2019) Energy-efficient quantum-inspired stochastic Q-HypE algorithm for batch-of-stochastic-tasks on heterogeneous DVFS-enabled processors. Concurr Comput Pract Exp 31(20):e5357. https://doi.org/10.1002/cpe.5327
Sajid M et al (2021) A novel algorithm for capacitated vehicle routing problem for smart cities. Symmetry (basel). https://doi.org/10.3390/sym13101923
Sajid M, Mittal H, Pare S, Prasad M (2022) Routing and scheduling optimization for UAV assisted delivery system: a hybrid approach. Appl Soft Comput. https://doi.org/10.1016/j.asoc.2022.109225
Sasubilli MK, VR (2021) Cloud computing security challenges, threats and vulnerabilities. In: 2021 6th International Conference on Inventive Computation Technologies (ICICT), pp 476–480. https://doi.org/10.1109/ICICT50816.2021.9358709.
Semwal P, Sharma MK (2017) Comparative study of different cryptographic algorithms for data security in cloud computing. In: 2017 3rd Int. Conf. Adv. Comput. Autom., pp 1–7
Sharma S, Sajid M (2021) Integrated fog and cloud computing issues and challenges. Int J Cloud Appl Comput 11(4):174–193, [Online]. Available: https://ideas.repec.org/a/igg/jcac00/v11y2021i4p174-193.html
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027
Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222. https://doi.org/10.1016/j.jnca.2016.09.002
Subramanian N, Jeyaraj A (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42. https://doi.org/10.1016/j.compeleceng.2018.06.006
Subramanian EK, Tamilselvan L (2020) Elliptic curve Diffie_Hellman cryptosystem in big data cloud security. Clust Comput 23:1–11
Tabrizchi H, Kuchaki-Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493–9532. https://doi.org/10.1007/s11227-020-03213-1
Tahir M, Sardaraz M, Mehmood Z, Muhammad S (2021) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Comput 24(2):739–752. https://doi.org/10.1007/s10586-020-03157-4
Thabit F, Alhomdy S, Jagtap S (2021) A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Netw 2:18–33. https://doi.org/10.1016/j.ijin.2021.03.001
Varghese B, Buyya R (2017) Next generation cloud computing: new trends and research directions. Futur Gener Comput Syst 79(3):849–861. https://doi.org/10.1016/j.future.2017.09.020
Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740. https://doi.org/10.1109/ACCESS.2020.3009876
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The Authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jawed, M.S., Sajid, M. XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals. Evolving Systems 14, 749–770 (2023). https://doi.org/10.1007/s12530-022-09462-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12530-022-09462-0