An Enhanced Software as a Service (SaaS) Architectural Model for Cloud Based Security Using Hybrid Symmetric Algorithm
Main Article Content
Abstract
Protecting cloud data from security breaches, preventing and ensuring safe cloud data is concealed from unauthorized access or infiltration by unwanted users are all part of cloud infrastructure security. This proposed technique is based on ensuring data confidentiality by adding extra-layer of security from the client side, developing a framework that implements the AES 256-bit key and Fernet 128-bits algorithms, which encrypt and decrypt files via random algorithm selection during uploads and downloads. When a file is uploaded to the cloud, the decryption key is recorded in the local server's file log. The software use randomized algorithm selection to provide security to ensure that an attacker having a prior link cannot reset the user account since the attacker cannot guess the token. Furthermore, invalidating this token ensures that the link cannot be used more than once if it was previously logged anywhere. To propose and verify the efficiency of the model the results generated(in quantitative values) are frequency (monobit) testing, with a minimum bit size of 64, given the P-values derived from the above study (i.e., 0.8838, 0.6187, 0.3768, 0.2817, 0.5843, 0.4167). The findings reveal throughput for encryption of 0.91531 and for decryption of 0.4854, space complexity of 0.4854, and entropy of 7.942616667.This research work studies the design of a robust, adaptable, and non-deterministic SaaS application that can be secure for enterprises and subsequent research studies will be conducted in the development.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
. Abroshan, H. (2021). A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms. International Journal of Advanced Computer Science and Applications, 12(6), 12-23.
. Ahsan, M., Idna B. I. M., Bin A. W., Ali, A. I., Khan, N., Al-Garwi, M. & Rahman, A. (2018). Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme. Symmetry, 10(5), 99-161
. Aleem, S., Ahmed, F., Batool, R. &Khattak, A. (2021). Empirical Investigation of Key Factors for SaaS Architecture. Institute of Electrical and Electronics Engineers Transactions on Cloud Computing, 9(3), 1037–1049.
. Anirudk, V. K. (2019). What Is Cloud Computing Architecture: Front-End & Back-End Explained. Toolbox.
. Borah, R. (2021). Cloud Computing Architecture: What is Front End and Back End? www.clariontech.com.
. Eswari, S. &Manikandan, S. (2016). Key Factor Authentication and Access Control for Accessing Cloud Computing Services. International Journal of Computer Applications, 151(4), 35–41.
. Kidd, C. (2020). SaaS in 2020: Growth Trends & Statistics. BMC Blogs.
. Rivest, R. L. & Sherman, A.T. (1983). Randomized Encryption Techniques. Springer Link. Webeduclick. (2021, October 22). Types of Ciphers in Cryptography. Webeduclick.Com.
. Paschal Uchenna, C. (2018). Security of Cloud Virtualized Resource on a SaaS Encryption Solution. Science Journal of Energy Engineering, 6(1), 8.
. Sweta, M. &Jayasimha, S. R. (2020). Detection of Phishing Attacks using Content Analysis in the Cloud. International Journal of Recent Technology and Engineering,9(1), 2277-3878.