Applied Sciences (Dec 2022)

Development of Security Rules and Mechanisms to Protect Data from Assaults

  • Syeda Wajiha Zahra,
  • Ali Arshad,
  • Muhammad Nadeem,
  • Saman Riaz,
  • Ashit Kumar Dutta,
  • Zaid Alzaid,
  • Rana Alabdan,
  • Badr Almutairi,
  • Sultan Almotairi

DOI
https://doi.org/10.3390/app122412578
Journal volume & issue
Vol. 12, no. 24
p. 12578

Abstract

Read online

Cloud cryptography is the art of converting plain text into an unreadable format, which protects data and prevents the data from being misused by the attacker. Different researchers designed various Caesar cipher algorithms for data security. With the help of these algorithms, the data can be converted into a nonreadable format, but the data cannot be completely secured. In this paper, data security is provided in different phases. Firstly, data are secured through a bit-reversing mechanism in which those replace the actual values with no relation to the original data. Then the four-bit values are added at the beginning and end of bits using a salting mechanism to interlink the salting and existing bit-values and hide the original data. A Caesar cipher value is obtained by applying the Caesar cipher algorithm to the resulting bits. The Caesar cipher algorithm is used to implement number-of-shifting on the obtained values. An efficient cipher matrix algorithm is then developed in which different rules are designed to encrypt the data. Afterward, a secure cipher value is obtained by implementing Cipher XORation rules on the result obtained and the user-defined key. In the end, the proposed algorithm is compared with various papers. It identifies how much better the proposed algorithm performs than all the previous algorithms and how much the attack rate can be reduced if this algorithm is used for data security.

Keywords