Preprints
https://doi.org/10.5194/gi-2022-15
https://doi.org/10.5194/gi-2022-15
22 Aug 2022
 | 22 Aug 2022
Status: this preprint was under review for the journal GI. A final paper is not foreseen.

An Analytical approach for optimal secured data storage on cloud server for online education platform

R. Soundhara Raja Pandian and Christopher Columbus

Abstract. Cloud computing is becoming increasingly popular in the IT business because of its higher performance, widespread access, cheap cost, and other benefits. It is also a pay-as-you-go approach; hence, anyone can access cloud data from anywhere, and it is employed in education platforms for online classes due to its ease of use. However, many educational institutions hesitate to use the cloud educational platform due to security and privacy issues. Hence in this study, the performance analysis of various cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Advanced encryption standard (AES), Two Fish, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (TDES) and role-based access control (RBAC) was analyzed and compared with each other in a view to ensuring the protection of cloud data storage used for educational purpose in the NPTEL database. Encryption time, decryption time, and retrieval time with different data sizes were used as performance evaluation factors to figure out the best End-To-End Encryption security in a network system. Moreover, an ElGamal SBO with Delta Competitive NN Cryptography has been proposed in which ElGamal Stag beetle optimization performs ElGamal encryption with the generation of an optimized key with low execution time, thereby allowing only authorized users to access the educational data in the cloud and the data transmission has been secured using Delta Competitive NN that minimizes vulnerable attacks while controlling the decryption activity. Results showed that the proposed ElGamal SBO with Delta Competitive NN Cryptography performs better than all other techniques in terms of retrieval time, encryption time, communication cost, computational overhead and decryption time and hence when applied in a security scenario, it can improve the encryption effectiveness.

This preprint has been withdrawn.

R. Soundhara Raja Pandian and Christopher Columbus

Interactive discussion

Status: closed

Comment types: AC – author | RC – referee | CC – community | EC – editor | CEC – chief editor | : Report abuse

Interactive discussion

Status: closed

Comment types: AC – author | RC – referee | CC – community | EC – editor | CEC – chief editor | : Report abuse
R. Soundhara Raja Pandian and Christopher Columbus
R. Soundhara Raja Pandian and Christopher Columbus

Viewed

Total article views: 902 (including HTML, PDF, and XML)
HTML PDF XML Total BibTeX EndNote
638 237 27 902 25 15
  • HTML: 638
  • PDF: 237
  • XML: 27
  • Total: 902
  • BibTeX: 25
  • EndNote: 15
Views and downloads (calculated since 22 Aug 2022)
Cumulative views and downloads (calculated since 22 Aug 2022)

Viewed (geographical distribution)

Total article views: 853 (including HTML, PDF, and XML) Thereof 853 with geography defined and 0 with unknown origin.
Country # Views %
  • 1
1
 
 
 
 

Cited

Latest update: 25 Apr 2024
Download

This preprint has been withdrawn.

Short summary
This study aims to figure out the ideal cryptographic technique for End-To-End Encryption security for educational purposes. For this purpose, various encryption methodologies are compared to various metrics including encryption time, decryption time, retrieval time and number of data size versus Encryption for the NPTEL cloud database and an enhanced role-based technique has been suggested.