Title | Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | shree, S. R., Chelvan, A. Chilambu, Rajesh, M. |
Conference Name | 2020 International Conference on Computer Communication and Informatics (ICCCI) |
Keywords | auditing, cloud computing, compositionality, Cuckoo search, cuckoo search algorithm, data integrity, decryption purpose, Encryption, encryption audits, Optimization, Predictive Metrics, pubcrawl, public key cryptography, Resiliency, search problems, Secret key, secret key generation algorithms, third party auditors, TPA |
Abstract | Optimization plays an important role in many problems that expect the accurate output. Security of the data stored in remote servers purely based on secret key which is used for encryption and decryption purpose. Many secret key generation algorithms such as RSA, AES are available to generate the key. The key generated by such algorithms are need to be optimized to provide more security to your data from unauthorized users as well as from the third party auditors(TPA) who is going to verify our data for integrity purpose. In this paper a method to optimize the secret key by using cuckoo search algorithm (CSA) is proposed. |
DOI | 10.1109/ICCCI48352.2020.9104102 |
Citation Key | shree_optimization_2020 |