Lightweight Effective Encryption Algorithm for Securing Data in Cloud Computing

  • Basel Saleh Al-AttabEmail author
  • H. S. Fadewar
  • Mahmoud E. Hodeish
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810)


Communication in the environment of cloud computing is implemented through the Internet and its backbone. Some issues of network security in the cloud environment are caused by its essential characteristics such as resource pooling, virtualized nature, elasticity, and other measured services. Though many algorithms have been used to secure the data communication in the cloud environment, some problems in the use of such algorithms still exist. Some of such problems are the mathematical complexity, key and security weakness, time complexity, and slow performance. In this paper, an algorithm called hyper data encryption (HDE) is proposed to combine the symmetric ciphers, secret sharing, and Diffie–Hellman key exchange concepts in order to enhance the security and solve the mentioned problems. Performance analysis is conducted in terms of key-space analysis, key sensitivity analysis, correlation analysis, information entropy analysis, time complexity, and execution time. The results show that the proposed algorithm is better in a cloud environment, which can provide strong security and high performance.


Cloud computing Cryptography Secret sharing Key exchange 


  1. 1.
    Deshpande, P., Sharma, S.C., Sateesh Kumar, P.: Security threats in cloud computing. In: International Conference on Computing, Communication & Automation (ICCCA), pp. 632–636 (2015)Google Scholar
  2. 2.
    Pansotra, A., Preet Singh, S.: Cloud Security Algorithms. Int. J. Secur. Appl. 9 (10) (2015)CrossRefGoogle Scholar
  3. 3.
    Saleh, A.-A.B., Fadewar, H.S.: Security issues and challenges in cloud computing. IJESE 2(7), 2319–6378 (2014)Google Scholar
  4. 4.
    Deshpande, P., Sharma, S.C., Peddoju, S.K., et al.: Security and service assurance issues in Cloud environment. Int. J. Syst. Assur. Eng. Manag. (2016). Scholar
  5. 5.
    Deshpande, P., Sharma, S.C., Peddoju, S.K.: Data Storage Security in Cloud Paradigm. In: Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 436. Springer, Singapore (2016)Google Scholar
  6. 6.
    Daya, B.: Network Security: History, Importance, and Future University of Florida Department of Electrical and Computer EngineeringGoogle Scholar
  7. 7.
    Jaber, A.N., Fadli, M., Zolkipli, B.: Use of cryptography in cloud computing. In: IEEE International Conference on Control System, Computing and Engineering, 29 Nov–1 Dec 2013Google Scholar
  8. 8.
    Thakur, J., Kumar, N.: DES, AES, blowfish: symmetric key cryptography algorithm simulation based performance analysis. Int. J. Emerging Technol. Adv. Eng. (IJETAE) 1(2) (2011), ISSN: 2250-2459Google Scholar
  9. 9.
    Pansotra, A., Preet Singh, S.: Cloud security algorithms. Int. J. Secur. Appl. 9(10), pp. 353–360 (2015)CrossRefGoogle Scholar
  10. 10.
    Patil, S., Bhusari, V.: An enhancement in international data encryption algorithm for increasing security. Int. J. Appl. Innov. Eng. Manag. 3(8), Aug 2014Google Scholar
  11. 11.
    Sanyal, S., Iyer, P.P.: Cloud Computing-An Approach with Modern Cryptography (2013). arXiv:1303.1048
  12. 12.
    Ustimenko, V., Wroblewska, A.: On some algebraic aspects of data security in cloud computing. In: Proceedings of Applications of Computer Algebra ACA 2013, Málaga, p. 155 (2013)Google Scholar
  13. 13.
    Wazed Nafi, K., Shekha Kar, T., Anisul Hoque, S., Hashem, M.: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture (2013)Google Scholar
  14. 14.
    Atayero, A.A., Feyisetan, O.: Security issues in cloud computing: the potentials of homomorphicencryption. J. Emerg. Trends Comput. Inf. Sci. 2(10), 546–552 (2011)Google Scholar
  15. 15.
    Bhardwaj, A., et al.: Security algorithms for cloud computing. Procedia Comput. Sci. 85, 535–542 (2016)CrossRefGoogle Scholar
  16. 16.
    Kaushik, S., Gandhi, C.: Cloud data security with hybrid symmetric encryption. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE (2016)Google Scholar
  17. 17.
    Naor, M., Shamir, A.: Visual cryptography, advances in cryptography-eurocrypt ‘94, vis. Lect. Notes Comput. Sci. 950, 1–12 (1994)Google Scholar
  18. 18.
    Hodeish, M.E., Humbe, V.T.: A (2, 2) secret sharing scheme for visual cryptography without Pixel Expansion. In: 2015 IEEE International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Basel Saleh Al-Attab
    • 1
    Email author
  • H. S. Fadewar
    • 1
  • Mahmoud E. Hodeish
    • 1
  1. 1.School of Computational SciencesS.R.T.M UniversityNandedIndia

Personalised recommendations