Ensuring the confidentiality of nuclear information at cloud using modular encryption standard

Aysha Shabbir, Maryam Shabbir, Muhammad Rizwan, Fahad Ahmad

Research output: Contribution to journalArticlepeer-review

7 Downloads (Pure)

Abstract

Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear information because of their lack of identification, classification, and securing measures (because of their multifaceted nature). With the increasing trends of data storage and management with the assistance of cloud, data confidentiality threats are immensely increasing. As there is no such safeguard that can make our systems a hundred percent secure, the best approach is to provide security at distinct layers. The basic purpose of layered security is to have the benefit that if one layer fails or compromised, the other layer compensates or maintains that confidentiality with the access control in the owner’s hand. In this paper, we have proposed a multilevel approach with protection-based computing by using Modular Encryption Standard (MES). We proposed a cloud framework as well to further enhance its security by utilizing a multicloud and modular approach. By performing simulations, the obtained results depicted that our proposed scheme works efficiently than other commonly used schemes.
Original languageEnglish
Article number2509898
Number of pages16
JournalSecurity and Communication Networks
Volume2019
DOIs
Publication statusPublished - 18 Dec 2019

Fingerprint

Dive into the research topics of 'Ensuring the confidentiality of nuclear information at cloud using modular encryption standard'. Together they form a unique fingerprint.

Cite this