Cargando…

A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing

Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of consequences. Many experiments have been conducted to investigate time-efficient and high-randomized encryption methods for the data. The latest studies, however, have still been debated because of d...

Descripción completa

Detalles Bibliográficos
Autores principales: Peechara, Ravinder Rao, V, Sucharita
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372001/
https://www.ncbi.nlm.nih.gov/pubmed/34458569
http://dx.doi.org/10.7717/peerj-cs.628
_version_ 1783739751045529600
author Peechara, Ravinder Rao
V, Sucharita
author_facet Peechara, Ravinder Rao
V, Sucharita
author_sort Peechara, Ravinder Rao
collection PubMed
description Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of consequences. Many experiments have been conducted to investigate time-efficient and high-randomized encryption methods for the data. The latest studies, however, have still been debated because of different factors. The study outcomes do not yield completely random keys for encryption methods that are longer than this. Prominent repetition makes the processes predictable and susceptible to assaults. Furthermore, recently generated keys need recent algorithms to run at a high volume of transactional data successfully. In this article, the proposed solutions to these two critical issues are presented. In the beginning, one must use the chaotic series of events for generating keys is sufficient to obtain a high degree of randomness. Moreover, this work also proposes a novel and non-traditional validation test to determine the true randomness of the keys produced from a correlation algorithm. An approximate 100% probability of the vital phase over almost infinitely long-time intervals minimizes the algorithms’ complexity for the higher volume of data security. It is suggested that these algorithms are mainly intended for cloud-based transactions. Data volume is potentially higher and extremely changeable 3% to 4% of the improvement in data transmission time with suggested algorithms. This research has the potential to improve communication systems over ten years by unblocking decades-long bottlenecks.
format Online
Article
Text
id pubmed-8372001
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-83720012021-08-26 A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing Peechara, Ravinder Rao V, Sucharita PeerJ Comput Sci Computer Networks and Communications Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of consequences. Many experiments have been conducted to investigate time-efficient and high-randomized encryption methods for the data. The latest studies, however, have still been debated because of different factors. The study outcomes do not yield completely random keys for encryption methods that are longer than this. Prominent repetition makes the processes predictable and susceptible to assaults. Furthermore, recently generated keys need recent algorithms to run at a high volume of transactional data successfully. In this article, the proposed solutions to these two critical issues are presented. In the beginning, one must use the chaotic series of events for generating keys is sufficient to obtain a high degree of randomness. Moreover, this work also proposes a novel and non-traditional validation test to determine the true randomness of the keys produced from a correlation algorithm. An approximate 100% probability of the vital phase over almost infinitely long-time intervals minimizes the algorithms’ complexity for the higher volume of data security. It is suggested that these algorithms are mainly intended for cloud-based transactions. Data volume is potentially higher and extremely changeable 3% to 4% of the improvement in data transmission time with suggested algorithms. This research has the potential to improve communication systems over ten years by unblocking decades-long bottlenecks. PeerJ Inc. 2021-08-09 /pmc/articles/PMC8372001/ /pubmed/34458569 http://dx.doi.org/10.7717/peerj-cs.628 Text en ©2021 Peechara and Sucharita https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Peechara, Ravinder Rao
V, Sucharita
A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
title A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
title_full A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
title_fullStr A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
title_full_unstemmed A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
title_short A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
title_sort chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372001/
https://www.ncbi.nlm.nih.gov/pubmed/34458569
http://dx.doi.org/10.7717/peerj-cs.628
work_keys_str_mv AT peechararavinderrao achaostheoryinspiredasynchronoustwowayencryptionmechanismforcloudcomputing
AT vsucharita achaostheoryinspiredasynchronoustwowayencryptionmechanismforcloudcomputing
AT peechararavinderrao chaostheoryinspiredasynchronoustwowayencryptionmechanismforcloudcomputing
AT vsucharita chaostheoryinspiredasynchronoustwowayencryptionmechanismforcloudcomputing