Research Article of Research Journal of Mathematics and Computer Science
An Implementation of a One-Time Pad Encryption Algorithm for Data Security in Cloud Computing Environment
Omotunde Ayokunle A*1, Faith Adekogbe2, Onuiri Ernest3, Precious Uchendu4
1Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria.
2Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria
3Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria
4Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria
The cloud is a computing model used by many consumers which include individuals and organizations for data storage which hitherto demands that adequate security measures be put in place to protect the confidentiality and integrity of that information. In cases where these security measures are inefficient or in some cases non-existent, client data is prone to a number of unauthorized violations which include breach of privacy, loss of data, compromised data integrity, and data manipulation among others. This therefore necessitates the demand for efficient security measures. Encryption is a security technique adopted by many for data protection which entails concealing the information content of a message in a way that only the intended recipient can make use of it. This research paper discusses the concept of encryption, a review of different encryption schemes that have been discussed over the years, and proposes a one-time pad encryption (OTP) algorithm (FAPE’s OTP). FAPE’s OTP implements the one time pad using a key expansion process that transforms a 512 bit key to the length of the plaintext. This research was carried out through a comprehensive study of encryption and cloud processes to understand both concepts independently and determine how they can be interleaved while sustaining optimum delivery. Furthermore, our findings indicate that FAPE’s OTP has a faster speed of operation in comparison to the Advanced Encryption Standard.
Keywords: Data Storage, Security, Encryption, One-Time Pad, Cloud Computing, Information
How to cite this article:
Omotunde Ayokunle A et al., An Implementation of a One-Time Pad Encryption Algorithm for Data Security in Cloud Computing Environment. Research Journal of Mathematics and Computer Science, 2017; 1:6. DOI: 10.28933/rjmcs-2017-10-1402
 Kuyoro, S. O., Omotunde, A. A., Ajaegbu, C. A., & Ibikunle, F. (2012, July). Towards Building a Secure Cloud Computing Environment. International Journal of Advanced Research in Computer Science, 3(4).
 Devipriya, M., & Sasikala, G. (2015, June). A New Technique for One Time Pad Security Scheme with Complement Method. International Journal of Advanced Research in Computer Science and Software Engineering, 5(6), 220-223.
 Widiasari, I. R. (2012, November). Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security. International Journal of Computer Applications, 57(20).
 Jayashree, K., Santoshi, P., & Lande, B. (2015, July). Two Level Encryption based on One Time Pad and Koblitz Method of Encoding. International Journal of Computer Applications, 122(15).
 Menezes, A., PC, O. V., & Vanstone, S. (1996). Handbook of applied cryptography. Boca Raton, FL: CRC Press.
 Ogundele, O., Adetunmbi, A., Adewale, O., Alowolodu, O., & Alese, B. (2013). Elliptic Curve Cryptography for Securing Cloud Computing Appliations. International Journal of Computer Applications, 10-18.
 Bajpai, S., & Srivastava, P. (2014). A Fully Homomorphic Encryption Implementation on Cloud Computing. International Journal of Information & Computation Technology, 811-816.
 Louk, M., Lim, H., & Lee, H. J. (2014). Security System for Healthcare Data in Cloud Computing. International Journal of Security and Its Applications, 8(3), 241-248.
 Saini, G., & Sharma, N. (2014, March). Triple Security of Data in Cloud Computing. International Journal of Computer Science and Information Technologies, 5(4), 5825-5827.
 Khan, S. S., & Tuteja, P. (2015, January). Security in Cloud Computing using Cryptographic Algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 3(1), 148-155.
 Elminaam, D. S., Kader, H. M., & Hadhoud, M. M. (2009). Performnce Evaluation of Symmetric Encryption Algorithms. Communications of the IBIMA, 8, 58-65.
 Microsoft Technet. (2003, March 28). What is TLS/SSL? Retrieved from Microsoft:https://technet.microsoft.com/enus/library/cc784450(v=ws.10).aspx
This work and its PDF file(s) are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.