A Novel Approach of Cryptography Via Z-Buffer Method
-
https://doi.org/10.14419/t9dxpr23
Received date: May 28, 2025
Accepted date: July 9, 2025
Published date: July 20, 2025
-
Cloud Storage; Cryptography; Data Security; Hyperbolic Equation; Resource Optimization; Z-Buffer -
Abstract
As the reliability on the cloud grows in modern technology, the importance of robust security for data to reduce the risk of breaching and unauthorized access has also become more essential. A novel approach is presented over the cloud to secure textual data over the cloud ecosystem by adapting the Z-Buffer algorithm, which is commonly used in computer graphics. The proposed technique is incorporating complex number-based key generation and hyperbolic encryption and decryption. The system shall be effective and scalable for data organization, which is developed through advanced concepts of mathematics. The performance of the proposed method is analyzed using primary metrics like central processing unit utilization and latency, as it demonstrates the ability to enhance security and proper utilization of resources across different file sizes, supporting real-world cloud applications and providing practical solutions to sensitive data. The pro-posed work is apart from previous work because of the fusion of graphic algorithm with security method, showing a new path for future possibility in cloud data security. The research work addresses the present challenges in security and also lays down the foundation for future breakthroughs in the area of security. By filling the gap between security and computer graphics, the presented approach offers a new perspective to secure data over cloud-dependent environments.
-
References
- Liu P.P. and Wu Y.C (2018), “Research on Real-Time Graphics Drawings Technology in Virtual Scene”. In 2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 1-6. IEEE. https://doi.org/10.1109/CISP-BMEI.2018.8633195.
- Bakshi N, Shivani S, Tiwari S and Khurana M.(2020), “Optimized Z-Buffer Using Divide and Conquer”, In Innovations in Computational Intelligence and Computer Vision, pp. 41-47. https://doi.org/10.1007/978-981-15-6067-5_6.
- Mantler S. and Hadwiger M.(2007), “Saving the Z-cull Optimization”, In ACM SIGGRAPH 2007 posters 2007; 7. https://doi.org/10.1145/1280720.1280729.
- Sakamoto Y, Takase M, Aoki Y.(2023), “Hidden surface removal using z-buffer for computer-generated hologram”, Practical Holography XVII and Holographic Materials IX , Vol. 276-283. https://doi.org/10.1117/12.473824.
- Güney E., Bayilmiş C. and Cakan B. (2022), Corrections to “an implementation of real-time traffic signs and road objects detection based on mobile GPU platforms”. IEEE Access.10, pp: 86191-86203. https://doi.org/10.1109/ACCESS.2022.3198954.
- Vasuki P., Shakin Banu A., Mohamed Mansoor Roomi S. and Maragatham G (2020), “Efficient target detection and classification of SAR images using Z-buffer convolutional neural networks”. InSmart Trends in Computing and Communications: Proceedings of SmartCom; pp: 449-458. https://doi.org/10.1007/978-981-15-5224-3_45.
- Chen Z, Tagliasacchi A and Zhang H (2021), “Learning mesh representations via binary space partitioning tree networks”, Transactions on Pattern Analysis and Machine Intelligence. 202129, Vol. 45, No.4, pp:4870-4881.
- Schiff, J. L. (2022). Topics in complex analysis. Walter de Gruyter GmbH & Co KG. 88.
- Sánchez-Ruiz, L. M., Legua, M., Moll-López, S., Moraño-Fernández, J. A., & Roselló, M. D. (2025), “The Exponential Versus the Complex Power ez Function Revisited”, Mathematics, 13(8), 1306. https://doi.org/10.3390/math13081306.
- Alsammarraie, O., Al-Salami, Q., and Al-Salami, N (2024), “ Transforming Coordinate Function Points into 2D or 3D Graphics: An Algorithmic Approach”, 5TH International Conference On Communication Engineering and Computer Science. https://doi.org/10.24086/cocos2024/paper.1562.
- Nielsen MA, Chuang IL. Quantum computation and quantum information. Cambridge university press; 2010.
- Lee, C., Hasegawa, H., and Gao, S. (2022), “Complex-Valued Neural Networks: A Comprehensive Survey”, IEEE/CAA Journal of Automatica Sinica,Vol. 9, pp. 1406-1426. https://doi.org/10.1109/JAS.2022.105743.
- Victor, M., Praveenraj, D., R, S., Alkhayyat, A., and Shakhzoda, A (2023), “Cryptography: Advances in Secure Communication and Data Protection”, E3S Web of Conferences. https://doi.org/10.1051/e3sconf/202339907010.
- Lv, Y (2021), “Data privacy protection based on homomorphic encryption”, Journal of Physics: Conference Series; pp. 2037. https://doi.org/10.1088/1742-6596/2037/1/012129.
- Cheon J.H., Kim A., Kim M., Song Y.(2017),“Homomorphic encryption for arithmetic of approximate numbers”, In Advances in cryptology–ASIACRYPT 23rd International conference on the theory and applications of cryptology and information security, pp.409-437. https://doi.org/10.1007/978-3-319-70694-8_15.
- Liu, S. (2022). Privacy Protection Revolution: Zero-knowledge Proof. 2022 International Conference on Data Analytics, Computing and Artificial Intelligence, pp. 394-397. https://doi.org/10.1109/ICDACAI57211.2022.00084.
- Solomka, I., Liubinskyi, B., and Torshyn, V (2024), “Application of machine learning algorithms to enhance blockchain network security”, Mathematical Modeling and Computing. https://doi.org/10.23939/mmc2024.03.893.
- Bennett CH, Brassard G. (2014), “Quantum cryptography: Public key distribution and coin tossing”, Theoretical computer science. Vol. 560, pp.7-11. https://doi.org/10.1016/j.tcs.2014.05.025.
- Kumar J, Saxena V. Hybridization of Cryptography for Security of Cloud Data. International Journal of Future Generation Communication and Networking. 2020;13(4):4007-14.
- Saxena V and Kumar P. (2023), “Secure Transaction of Digital Currency through Fuzzy Based Cryptography”, Indian Journal of Science and Technology. Vol.16, No.37, pp. 3148-58. https://doi.org/10.17485/IJST/v16i37.1453.
- Kumar P. and Saxena V. (2024), “Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange” , Journal of Computer and Communications. Vol. 12, No. 2, pp.201-10. https://doi.org/10.4236/jcc.2024.122012.
- Kumar P. and Saxena V. (2024), “Secure Transmission of Information through Hybrid Cryptographical Techniques”, TWIST. Vol.19,No.2,pp.508-12.
- Gautam D. and Saxena V. (2023), “Secure exchange of IMSI number between sender and receiver”, Kepes. Vol.21, No.3, pp:750-62.
- Gautam D, Rimer S. and Saxena V. (2023), “Secure access of folders and files after removal of duplicacy over the cloud”, International Journal of Computer Network and Information Security. Vol.16, No. 1, https://doi.org/10.5815/ijcnis.2024.01.04.
- Gautam D and Saxena V. (2023), “Optimization of Storage of Cloud Servers Through Binary Search Algorithm”, 7th Conference on Information and Communication Technology, pp:1-6. https://doi.org/10.1109/CICT59886.2023.10455361.
- William P, Choubey A, Chhabra GS, Bhattacharya R, Vengatesan K. and Choubey S (2022), “Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content”, International conference on electronics and renewable systems; pp:918-922. https://doi.org/10.1109/ICEARS53579.2022.9751932.
- Kinganga, J., Kasoro, N., Ramadhani, I., Musesa, A., Mabela, R., & Kenke, E. W. (2024). Literature review on data encryption based on elliptic curves and chaotic functions, and future prospects. Journal Africain Des Sciences., 1(2), 83–95. https://doi.org/10.70237/jafrisci.2024.v1.i2.10.
- Chen, A. C. (2023). Using Elliptic Curve Cryptography for Homomorphic Hashing. In 2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES). pp. 1-5. IEEE. https://doi.org/10.1109/ICSSES58299.2023.10200709.
- Mahajan, H. B., and Junnarkar, A. A. (2023),”Smart healthcare system using integrated and lightweight ECC with private blockchain for multimedia medical data processing”, Multimedia Tools and Applications, 82(28), 44335-44358. https://doi.org/10.1007/s11042-023-15204-4.
- Hosseingholizadeh, A., Rahmati, F., Ali, M., Damadi, H., and Liu, X. (2024), “Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services”, IEEE Internet of Things Journal, 11, 728-741. https://doi.org/10.1109/JIOT.2023.3286508.
- Morales, A. N., Bishwas, A. K., & Varghese, J. J. (2025). Quantum-enabled framework for the Advanced Encryption Standard in the post-quantum era. arXiv.
- Zala, D. K., and Khan, M. A. (2024, December). Novel Dual-Encryption and Compression Strategy: AES and Fernet for Secure Multimedia Transmission. In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS) (pp. 239-244). IEEE. https://doi.org/10.1109/ICICNIS64247.2024.10823305.
- Yang, W., Xiang, X., Huang, C., Fu, A., & Yang, Y. (2023). MCA-based multi-channel fusion attacks against cryptographic implementations. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 13(2), 476-488. https://doi.org/10.1109/JETCAS.2023.3252085.
- Ramakrishna, D., & Shaik, M. A. (2024). A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges. IEEE Access, 1. https://doi.org/10.1109/ACCESS.2024.3518533.
- Chahar, S. (2024). Exploring the future trends of cryptography. 234–257. https://doi.org/10.1201/9781003508632-16.
-
Downloads
-
How to Cite
Gautam, D., & Saxena, V. . (2025). A Novel Approach of Cryptography Via Z-Buffer Method. International Journal of Basic and Applied Sciences, 14(3), 178-184. https://doi.org/10.14419/t9dxpr23
