Muhammad Umair

Work place: Department of Computer Science, University of Central Punjab, Lahore

E-mail: Muhammad.umair@ucp.edu.pk

Website:

Research Interests: Computer Architecture and Organization, Image Processing, Data Structures and Algorithms

Biography

Dr. Muhammad Umair has teaching and industrial experience of more than 10 years. He has joined the University of Central Punjab, Lahore, Pakistan in August 2014. He is currently serving as Assistant Professor along with an additional charge of Director Graduate Program at Faculty of Information Technology. His research interest includes applications of computational intelligence methods in the areas of image processing, data sciences and cryptography.

Author Articles
Improving Cloud Data Encryption Using Customized Genetic Algorithm

By Muhammad Junaid Arshad Muhammad Umair Saima Munawar Nasir Naveed Humaira Naeem

DOI: https://doi.org/10.5815/ijisa.2020.06.04, Pub. Date: 8 Dec. 2020

Data Encryption is widely utilized for ensuring data privacy, integrity, and confidentiality. Nowadays, a large volume of data is uploaded to the cloud, which increases its vulnerability and adds to security breaches. These security breaches include circumstances where sensitive information is being exposed to third parties or any access to sensitive information by unauthorized personnel. The objective of this research is to propose a method for improving encryption by customizing the genetic algorithm (GA) with added steps of encryption. These added steps of encryption include the data being processed with local information (chromosome's value calculated with computer-generated random bits without human intervention). The improvement in the randomness of the key generated is based on altering the population size, number of generations, and mutation rate. The first step of encrypting is to convert sample data into binary form. Once the encryption process is complete, this binary result is converted back to get the encrypted data or cipher-text. Foremost, the GA operators (population size, number of generations, and mutation rate) are changed to determine the optimal values of each operator to bring forth a random key in the minimum possible time, then local intelligence is headed in the algorithm to further improve the outcomes. Local Intelligence consists of local information and a random bit generated in each iteration. Local Information is the current value of a parent in each iteration at the gene level. Both local information and random bit are then applied in a mathematical pattern to generate a randomized key. The local intelligence-based algorithm can operate better in terms of time with the same degree of randomness that is generated with the conventional GA technique. The result showed that the proposed method is at least 80% more efficient in terms of time while generating the secret key with the same randomness level as generated by a conventional GA. Therefore, when large data are intended to be encrypted, then using local intelligence can demonstrate to be better utilized time.

[...] Read more.
Other Articles