IDEAS home Printed from https://ideas.repec.org/a/igg/jcac00/v12y2022i1p1-10.html
   My bibliography  Save this article

Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm

Author

Listed:
  • Huthaifa A. Al Issa

    (Al-Balqa Applied University, Jordan)

  • Mustafa Hamzeh Al-Jarah

    (Al-Balqa Applied University, Jordan)

  • Ammar Almomani

    (IT Department, Al-Huson University College, AL-Balqa Applied University, Irbid, Jordan & Research and Innovation Department, Skyline University College, Sharjah, UAE)

  • Ahmad Al-Nawasrah

    (British University of Bahrain, Bahrain)

Abstract

Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data and the easily of sharing, and this data can also be accessed from anywhere in the world as long as it is on the Internet, large gaps have emerged around data theft and viewing. Accordingly, researchers have developed algorithms and methods to protect this data, but the attempts to penetrate the data did not stop. In this research, we developed a method that combines XOR and Genetic algorithm to protect the data on the cloud through encryption operations and keep the key from being lost or stolen. The data that is uploaded to cloud computing may be important and we should not allow any party to see it or steal it. Therefore, it became imperative to protect this data and encrypt it. We have developed an algorithm that uses XOR and genetic algorithms in the encryption process.

Suggested Citation

  • Huthaifa A. Al Issa & Mustafa Hamzeh Al-Jarah & Ammar Almomani & Ahmad Al-Nawasrah, 2022. "Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 12(1), pages 1-10, January.
  • Handle: RePEc:igg:jcac00:v:12:y:2022:i:1:p:1-10
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.297101
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcac00:v:12:y:2022:i:1:p:1-10. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.