dc.contributor.author |
Mosola, N.N. |
|
dc.contributor.author |
Dlamini, M.T. |
|
dc.contributor.author |
Blackledge, J.M. |
|
dc.contributor.author |
Eloff, J.H.P. |
|
dc.contributor.author |
Venter, H.S. |
|
dc.date.accessioned |
2020-03-18T13:47:22Z |
|
dc.date.available |
2020-03-18T13:47:22Z |
|
dc.date.issued |
2017-09 |
|
dc.identifier.citation |
Mosola, N.N. et al. (2017) Chaos-based Encryption Keys and Neural Key-store for Cloud-hosted Data Confidentiality, Southern Africa Telecommunication Networks and Applications Conference (SATNAC, 2017), Royal Caribbean International, September 3-10, pp. 168-173, 2017. |
en_ZA |
dc.identifier.uri |
https://arrow.tudublin.ie/cgi/viewcontent.cgi?article=1266&context=engscheleart |
|
dc.identifier.uri |
http://repository.tml.nul.ls/handle/20.500.14155/1444 |
|
dc.description |
Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2017, 3-10 September 2017, Freedom of the Seas Cruise |
en_ZA |
dc.description.abstract |
Cloud computing brings flexible and cost effective
services. However, security concerns plague the cloud. Data
confidentiality is one of the concerns inhibiting the adoption of
cloud computing. This concern stems from various cyberattacks
directed towards gaining unauthorised access to cloud-bound or
cloud-hosted data. This paper proposes a client-end encryption
and key management system to curb attacks that targets
compromising the confidentiality of cloud-hosted data. The
proposed system uses chaotic atmospheric noise to generate a
fitness function. The fitness function generates random numbers
which create encryption keys. The strength of the encryption keys
is derived from the chaotic and random nature of the atmospheric
noise. The keys are then used for encrypting cloud-bound data
using Advanced Encryption Standard (AES-128, 192 and 256),
Data Encryption Standard (DES), 3-DES, and our novel
cryptosystem named Cryptor, before it can be sent to the cloud.
However, encryption bears no significance if the key management
is flawed. To address the inherent key management problem, the
solution uses a neural network to learn patterns of an encryption
key. Once learnt, the key is then discard to thwart possible key
attacks. The key is reconstructed by the neural network for
decryption purposes. |
en_ZA |
dc.language.iso |
en |
en_ZA |
dc.publisher |
Technological University Dublin |
en_ZA |
dc.subject |
Cloud computing |
en_ZA |
dc.subject |
confidentiality |
en_ZA |
dc.subject |
chaotic noise |
en_ZA |
dc.subject |
encryption |
en_ZA |
dc.subject |
neural network |
en_ZA |
dc.title |
Chaos-based Encryption Keys and Neural Key-store for Cloudhosted Data Confidentiality |
en_ZA |
dc.type |
Conferencepaper |
en_ZA |