Information Technology Management for Modifying the Random S-Box Generation of AES Using Cloud


  • Muatamed Abed Hajer Professor
  • Ali Obied Professor
  • Bahaa Hussein Taher Professor



AES (E-AES), E-AES, S-box, Side Channel.


The cloud computing is growing technology for IT industries. The cloud refers to a network or internet and the cloud computing refers to manipulating, configuring and accessing the software and hardware resources remotely. The attack detection is used for detecting the attack in cloud computing. It is used to prevent the data and improve the security. The cloud computing is attacked by the attackers, and among those Side Channel Attacks are most harmful. This type of attack is aimed to retrieve the secret data from the cryptographic system. This type of attacks reduces the performance of cloud computing. The attacks occur due to security issues in terms of increasing the memory spaces, high power consumption, and high execution time, reduced browsing security, and increased time complexity and error tolerances. It decreases the performances of cloud computing process. To overcome the security issues, two processes are developed. The first process developed is AES with Rijndael algorithm and the next process is effective Enriched AES (E-AES) algorithm. To increase the security, modified AES with random S-box generation is proposed in next process of the work. Data security is critical in the communication system with secure and complex cryptographic algorithms. The secret keys are used in data transmission in data management for security purposes. The effective security is provided by secure Side Channel Attack and the effective Enriched AES (E-AES) algorithm. In this phase, the E-AES algorithm is used for both encryption and decryption processes. This algorithm is used to reduce the Side Channel Attacks. The generation of random multiple S-box is made hard, to break the text that is in the encryption process which helps to manage the information technology. The proposed algorithm provides some advantages, such as, reduced time complexity, and error tolerances. It is used in varies key bits, such as, 64 bits, 128 bits, and 256 bits.


[1] M. H. Ali, M. F. Zolkipli, M. M. Jaber, and M. A. Mohammed, “Intrusion detection system based on machine learning in cloud computing,†J. Eng. Appl. Sci., vol. 12, no. 16, 2017.

[2] S. K. Abd, S. A. R. Al-Haddad, F. Hashim, A. B. H. J. Abdullah, and S. Yussof, “Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing,†in Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017, 2017.

[3] M. A. Mohammed, M. H. Kadhim, A. Fuad, and M. M. Jaber, “Follow up system for directorate of scholarship and cultural relations in Iraq,†in I4CT 2014 - 1st International Conference on Computer, Communications, and Control Technology, Proceedings, 2014.

[4] S. K. Abd, R. T. Salih, S. A. R. Al-Haddad, F. Hashim, A. B. H. Abdullah, and S. Yussof, “Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol,†in IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2016.

[5] P. Mohamed Shakeel, S. Baskar, V. R. Sarma Dhulipala, S. Mishra, and M. M. Jaber, “Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks,†J. Med. Syst., 2018.

[6] M. A. Mohammed et al., “Genetic case-based reasoning for improved mobile phone faults diagnosis,†Comput. Electr. Eng., 2018.

[7] M. Khanapi Abd Ghani and M. Musa Jaber, “The Effect of Patient Privacy on Telemedicine Implementation in Developing Countries: Iraq Case Study,†Res. J. Appl. Sci. Eng. Technol., 2015.

[8] Jarrar, M., Minai, M. S., Al-Bsheish, M., Meri, A., & Jaber, M. (2018). Hospital nurse shift length, patient-centered care, and the perceived quality and patient safety. International Journal of Health Planning and Management.

[9] M. A. Mohammed, H. B. Ibrahim, A. H. Hussein, and M. M. Anad, “General E-government Structure for Iraqi decentralization government,†in 2013 IEEE Conference on e-Learning, e-Management and e-Services, IC3e 2013, 2013.

[10] M. K. A. Ghani, M. M. Jaber, and N. Suryana, “Telemedicine supported by data warehouse architecture,†ARPN J. Eng. Appl. Sci., vol. 10, no. 2, 2015.

[11] S. K. Abd, S. A. R. Al-Haddad, F. Hashim, and A. Abdullah, “A review of cloud security based on cryptographic mechanisms,†in Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, 2015.

[12] T. IT Service Management Forum, “Foundations of IT Service Management based on ITIL V3,†ITIL Libr., 2007.

[13] J. Luftman, “Assessing it/business alignment,†Inf. Syst. Manag., 2003.

[14] School of Management & Languages, “A guide to writing your masters dissertation,†T. 2012.

[15] S. S. Al-Gahtani, G. S. Hubona, and J. Wang, “Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT,†Inf. Manag., 2007.

[16] M. K. Abd Ghani and M. M. Jaber, “Willingness to Adopt Telemedicine in Major Iraqi Hospitals: A Pilot Study,†Int. J. Telemed. Appl., vol. 2015, 2015.

[17] S. de Haes and W. van Grembergen, “An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment,†Inf. Syst. Manag., 2009.

View Full Article:

Additional Files