National University of Lesotho
Institutional
Repository (NULIR)
Library and
Information Services

Chaos-based Encryption Keys and Neural Key-store for Cloudhosted Data Confidentiality

Show simple item record

dc.contributor.author Mosola, N.N.
dc.contributor.author Dlamini, M.T.
dc.contributor.author Blackledge, J.M.
dc.contributor.author Eloff, J.H.P.
dc.contributor.author Venter, H.S.
dc.date.accessioned 2020-03-18T13:47:22Z
dc.date.available 2020-03-18T13:47:22Z
dc.date.issued 2017-09
dc.identifier.citation Mosola, N.N. et al. (2017) Chaos-based Encryption Keys and Neural Key-store for Cloud-hosted Data Confidentiality, Southern Africa Telecommunication Networks and Applications Conference (SATNAC, 2017), Royal Caribbean International, September 3-10, pp. 168-173, 2017. en_ZA
dc.identifier.uri https://arrow.tudublin.ie/cgi/viewcontent.cgi?article=1266&context=engscheleart
dc.identifier.uri http://repository.tml.nul.ls/handle/20.500.14155/1444
dc.description Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2017, 3-10 September 2017, Freedom of the Seas Cruise en_ZA
dc.description.abstract Cloud computing brings flexible and cost effective services. However, security concerns plague the cloud. Data confidentiality is one of the concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks directed towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a client-end encryption and key management system to curb attacks that targets compromising the confidentiality of cloud-hosted data. The proposed system uses chaotic atmospheric noise to generate a fitness function. The fitness function generates random numbers which create encryption keys. The strength of the encryption keys is derived from the chaotic and random nature of the atmospheric noise. The keys are then used for encrypting cloud-bound data using Advanced Encryption Standard (AES-128, 192 and 256), Data Encryption Standard (DES), 3-DES, and our novel cryptosystem named Cryptor, before it can be sent to the cloud. However, encryption bears no significance if the key management is flawed. To address the inherent key management problem, the solution uses a neural network to learn patterns of an encryption key. Once learnt, the key is then discard to thwart possible key attacks. The key is reconstructed by the neural network for decryption purposes. en_ZA
dc.language.iso en en_ZA
dc.publisher Technological University Dublin en_ZA
dc.subject Cloud computing en_ZA
dc.subject confidentiality en_ZA
dc.subject chaotic noise en_ZA
dc.subject encryption en_ZA
dc.subject neural network en_ZA
dc.title Chaos-based Encryption Keys and Neural Key-store for Cloudhosted Data Confidentiality en_ZA
dc.type Conferencepaper en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search NULIR


Browse

My Account