An Enhanced Software as a Service (SaaS) Architectural Model for Cloud Based Security Using Hybrid Symmetric Algorithm

Main Article Content

Afiesimama Dimabo Joshua
Onate Egerton Taylor

Abstract

Protecting cloud data from security breaches, preventing and ensuring safe cloud data is concealed from unauthorized access or infiltration by unwanted users are all part of cloud infrastructure security. This proposed technique is based on ensuring data confidentiality by adding extra-layer of security from the client side, developing a framework that implements the AES 256-bit key and Fernet 128-bits algorithms, which encrypt and decrypt files via random algorithm selection during uploads and downloads. When a file is uploaded to the cloud, the decryption key is recorded in the local server's file log. The software use randomized algorithm selection to provide security to ensure that an attacker having a prior link cannot reset the user account since the attacker cannot guess the token. Furthermore, invalidating this token ensures that the link cannot be used more than once if it was previously logged anywhere. To propose and verify the efficiency of the model the results generated(in quantitative values) are frequency (monobit) testing, with a minimum bit size of 64, given the P-values derived from the above study (i.e., 0.8838, 0.6187, 0.3768, 0.2817, 0.5843, 0.4167). The findings reveal throughput for encryption of 0.91531 and for decryption of 0.4854, space complexity of 0.4854, and entropy of 7.942616667.This research work studies the design of a robust, adaptable, and non-deterministic SaaS application that can be secure for enterprises and subsequent research studies will be conducted in the development.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

Afiesimama Dimabo Joshua

Department of Computer Science                                                   

Rivers State University of  Science Technology                           

Port Harcourt, Rivers State, Nigeria

References

. Abroshan, H. (2021). A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms. International Journal of Advanced Computer Science and Applications, 12(6), 12-23.

. Ahsan, M., Idna B. I. M., Bin A. W., Ali, A. I., Khan, N., Al-Garwi, M. & Rahman, A. (2018). Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme. Symmetry, 10(5), 99-161

. Aleem, S., Ahmed, F., Batool, R. &Khattak, A. (2021). Empirical Investigation of Key Factors for SaaS Architecture. Institute of Electrical and Electronics Engineers Transactions on Cloud Computing, 9(3), 1037–1049.

. Anirudk, V. K. (2019). What Is Cloud Computing Architecture: Front-End & Back-End Explained. Toolbox.

. Borah, R. (2021). Cloud Computing Architecture: What is Front End and Back End? www.clariontech.com.

. Eswari, S. &Manikandan, S. (2016). Key Factor Authentication and Access Control for Accessing Cloud Computing Services. International Journal of Computer Applications, 151(4), 35–41.

. Kidd, C. (2020). SaaS in 2020: Growth Trends & Statistics. BMC Blogs.

. Rivest, R. L. & Sherman, A.T. (1983). Randomized Encryption Techniques. Springer Link. Webeduclick. (2021, October 22). Types of Ciphers in Cryptography. Webeduclick.Com.

. Paschal Uchenna, C. (2018). Security of Cloud Virtualized Resource on a SaaS Encryption Solution. Science Journal of Energy Engineering, 6(1), 8.

. Sweta, M. &Jayasimha, S. R. (2020). Detection of Phishing Attacks using Content Analysis in the Cloud. International Journal of Recent Technology and Engineering,9(1), 2277-3878.