Visible to the public Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA

TitleOptimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA
Publication TypeConference Paper
Year of Publication2020
Authorsshree, S. R., Chelvan, A. Chilambu, Rajesh, M.
Conference Name2020 International Conference on Computer Communication and Informatics (ICCCI)
Keywordsauditing, cloud computing, compositionality, Cuckoo search, cuckoo search algorithm, data integrity, decryption purpose, Encryption, encryption audits, Optimization, Predictive Metrics, pubcrawl, public key cryptography, Resiliency, search problems, Secret key, secret key generation algorithms, third party auditors, TPA
AbstractOptimization plays an important role in many problems that expect the accurate output. Security of the data stored in remote servers purely based on secret key which is used for encryption and decryption purpose. Many secret key generation algorithms such as RSA, AES are available to generate the key. The key generated by such algorithms are need to be optimized to provide more security to your data from unauthorized users as well as from the third party auditors(TPA) who is going to verify our data for integrity purpose. In this paper a method to optimize the secret key by using cuckoo search algorithm (CSA) is proposed.
DOI10.1109/ICCCI48352.2020.9104102
Citation Keyshree_optimization_2020