Status: this preprint was under review for the journal GI. A final paper is not foreseen.
An Analytical approach for optimal secured data storage on cloud server for online education platform
R. Soundhara Raja Pandianand Christopher Columbus
Abstract. Cloud computing is becoming increasingly popular in the IT business because of its higher performance, widespread access, cheap cost, and other benefits. It is also a pay-as-you-go approach; hence, anyone can access cloud data from anywhere, and it is employed in education platforms for online classes due to its ease of use. However, many educational institutions hesitate to use the cloud educational platform due to security and privacy issues. Hence in this study, the performance analysis of various cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Advanced encryption standard (AES), Two Fish, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (TDES) and role-based access control (RBAC) was analyzed and compared with each other in a view to ensuring the protection of cloud data storage used for educational purpose in the NPTEL database. Encryption time, decryption time, and retrieval time with different data sizes were used as performance evaluation factors to figure out the best End-To-End Encryption security in a network system. Moreover, an ElGamal SBO with Delta Competitive NN Cryptography has been proposed in which ElGamal Stag beetle optimization performs ElGamal encryption with the generation of an optimized key with low execution time, thereby allowing only authorized users to access the educational data in the cloud and the data transmission has been secured using Delta Competitive NN that minimizes vulnerable attacks while controlling the decryption activity. Results showed that the proposed ElGamal SBO with Delta Competitive NN Cryptography performs better than all other techniques in terms of retrieval time, encryption time, communication cost, computational overhead and decryption time and hence when applied in a security scenario, it can improve the encryption effectiveness.
This preprint has been withdrawn.
Received: 25 Jul 2022 – Discussion started: 22 Aug 2022
Publisher's note: Copernicus Publications remains neutral with regard to jurisdictional claims made in the text, published maps, institutional affiliations, or any other geographical representation in this preprint. The responsibility to include appropriate place names lies with the authors.
This study aims to figure out the ideal cryptographic technique for End-To-End Encryption security for educational purposes. For this purpose, various encryption methodologies are compared to various metrics including encryption time, decryption time, retrieval time and number of data size versus Encryption for the NPTEL cloud database and an enhanced role-based technique has been suggested.
This study aims to figure out the ideal cryptographic technique for End-To-End Encryption...