A SECURE STORAGE MODEL WITH AUTHENTICATION AND OPTIMAL KEY GENERATION BASED ENCRYPTION

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2026 | Volume : 17 | 01 | Page :
    By

    R. SASIKALA, M.E.,

  • MAHARAJA M,

  • MUKESH.M,

  • NITHISH KUMAR.V,

  • VIDYADHARAN.K,

  1. Faculty, Department of CSE (cyber security) HOD, Department of CSE (cyber security) Student, Department of CSE (cyber security) Karpagam College of Engineering Karpagam College of Engineering Karpagam College of Engineering Coimbatore, Tamil Nadu, India
  2. Head of Department, Department of CSE (cyber security) HOD, Department of CSE (cyber security) Student, Department of CSE (cyber security) Karpagam College of Engineering Karpagam College of Engineering Karpagam College of Engineering Coimbatore, Tamil Nadu, India
  3. Student, Department of CSE (cyber security) HOD, Department of CSE (cyber security) Student, Department of CSE (cyber security) Karpagam College of Engineering Karpagam College of Engineering Karpagam College of Engineering Coimbatore, Tamil Nadu, India
  4. Student, Department of CSE (cyber security) HOD, Department of CSE (cyber security) Student, Department of CSE (cyber security) Karpagam College of Engineering Karpagam College of Engineering Karpagam College of Engineering Coimbatore, Tamil Nadu, India
  5. Student, Department of CSE (cyber security) HOD, Department of CSE (cyber security) Student, Department of CSE (cyber security) Karpagam College of Engineering Karpagam College of Engineering Karpagam College of Engineering Coimbatore, Tamil Nadu, India

Abstract

In digital forensics, ensuring the secure storage of digital evidence is crucial. This paper introduces a new method that uses advanced encryption and key generation techniques to protect digital evidence throughout an investigation. Cloud forensics, a modern approach to digital forensics, aims to safeguard evidence from online hacking. However, storing all evidence in one central location can reduce its reliability. To address this, we propose a digital forensics architecture for cloud platforms, specifically Infrastructure as a Service (IaaS). In the DFA-AOKGE concept, a Secure Block Verification Mechanism (SBVM) is used to accomplish authentication. An Enhanced Equilibrium Optimizer (EEO) model is used to generate secret keys, and a multikey homomorphic encryption (MHE) approach is used to guarantee data secrecy before cloud storage. The suggested DFA-AOKGE method beats current state-of-the-art techniques on a number of performance parameters, according to experimental simulations. The DFA-AOKGE architecture is specifically designed to simplify and enhance the processes of digital evidence collection, storage, and protection while ensuring the preservation of evidence integrity and provenance throughout the forensic lifecycle. By maintaining a verifiable chain of custody and preventing unauthorized modifications, the architecture strengthens the trustworthiness and legal admissibility of digital evidence in cloud computing environments. This architecture is designed to make it easier to collect and protect digital evidence while maintaining its integrity and origin in cloud computing environments. Our approach, called DFA-AOKGE (Digital Forensic Architecture with Authentication and Optimal Key Generation Encryption), uses a decentralized system to distribute data across. multiple peers for collection and secure storage. For authentication, the DFA-AOKGE model uses a Secure Block Verification Mechanism (SBVM). It also generates secret keys using an Enhanced Equilibrium Optimizer (EEO) model. Data is encrypted using a multikey homomorphic encryption (MHE) method and then stored on the cloud server. Simulations show that the DFA- AOKGE method outperforms other recent approaches in various performance measures.

Keywords: Digital Forensics, Cloud Forensics, Secure Evidence Storage, Multikey Homomorphic Encryption, Decentralized Forensic Architecture

How to cite this article:
R. SASIKALA, M.E., MAHARAJA M, MUKESH.M, NITHISH KUMAR.V, VIDYADHARAN.K. A SECURE STORAGE MODEL WITH AUTHENTICATION AND OPTIMAL KEY GENERATION BASED ENCRYPTION. Journal of Control & Instrumentation. 2026; 17(01):-.
How to cite this URL:
R. SASIKALA, M.E., MAHARAJA M, MUKESH.M, NITHISH KUMAR.V, VIDYADHARAN.K. A SECURE STORAGE MODEL WITH AUTHENTICATION AND OPTIMAL KEY GENERATION BASED ENCRYPTION. Journal of Control & Instrumentation. 2026; 17(01):-. Available from: https://journals.stmjournals.com/joci/article=2026/view=238750


References

  1.  Bachiphale PM, Zulpe NS. Optimal multisecret image sharing using lightweight visual sign-cryptography scheme with optimal key generation for gray/color images. International Journal of Image and Graphics. 2025 May 28;25(03):2550017.
  2.  Kumar G, Saha R, Lal C, Conti M. Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Generation Computer Systems. 2021 Jul 1;120:13-25.
  3. Raji L, Ramya ST. Secure forensic data transmission system in cloud database using fuzzy based butterfly optimization and modified ECC. Transactions on Emerging Telecommunications Technologies. 2022 Sep;33(9):e4558.
  4. Abdel-Ghaffar EA, Daoudi M. Personal authentication and cryptographic key generation based on electroencephalographic signals. Journal of King Saud University-Computer and Information Sciences. 2023 May 1;35(5):101541.
  5. Velmurugadass P, Dhanasekaran S, Anand SS, Vasudevan V. Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Materials Today: Proceedings. 2021 Jan 1;37:2653-9.
  6. Nyangaresi VO, Ahmad M, Alkhayyat A, Feng W. Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. Expert Systems. 2022 Dec;39(10):e13126.
  7. Nasreen S, Mir AH. Enhancing cloud forensic investigation system in distributed cloud computing using dk-cp-ecc algorithm and ek- anfis. Journal of Mobile Multimedia. 2023 May;19(3):679-706.
  8. Du J, Raza SH, Ahmad M, Alam I, Dar SH, Habib MA. Digital Forensics as Advanced Ransomware Pre‐Attack Detection Algorithm for Endpoint Data Protection. Security and Communication Networks. 2022;2022(1):1424638.
  9. Razaque A, Aloqaily M, Almiani M, Jararweh Y, Srivastava G. Efficient and reliable forensics using intelligent edge computing. Future Generation Computer Systems. 2021 May 1;118:230-9.
  10. Kashif M, Mehfuz S, Shakeel I, Ahmad S. Employing an ECC-based hybrid data encryption method to improve multitenancy security in cloud computing. In2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON) 2023 May 1 (pp. 79-83). IEEE.

Ahead of Print Subscription Review Article
Volume 17
01
Received 16/06/2025
Accepted 06/02/2026
Published 18/03/2026
Publication Time 275 Days


Login


My IP

PlumX Metrics