Abstract
With the rapid development of network technology, personal information security issues are becoming increasingly prominent. In large-scale data transmission and high-concurrency scenarios, encryption processing has become one of the performance bottlenecks for network nodes. How to allocate encryption resources reasonably to balance the load of network nodes is an urgent problem that needs to be solved. This study conducted in-depth research on optimizing network node encryption performance and resource allocation strategy based on the RSA algorithm. Firstly, optimize the encryption performance by optimizing the parameter selection of the RSA algorithm, selecting appropriate public and private key lengths, and reducing unnecessary computational overhead. At the same time, introducing fast power algorithm optimization accelerates the encryption and decryption. At the same time, a load-aware resource allocation algorithm is designed to monitor the real-time load situation of network nodes, dynamically adjust the allocation of encryption resources, and ensure that each node can balance the processing of encryption tasks in high concurrency scenarios. In order to verify the effectiveness of the optimization strategy, a simulation experimental environment was set up, and many experiments were conducted. The experimental results show that through algorithm-level optimization and hardware acceleration, the encryption performance of the RSA algorithm has been significantly improved, and the encryption speed has been increased by about 30%. Meanwhile, the load-aware resource allocation strategy effectively balances the load of the network nodes, reduces the overall response time of the system, and improves the overall performance of the system.
References
Adeniyi, A. E., R. G. Jimoh and J. B. Awotunde, “A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security,” Computers and Electrical Engineering, vol. 118, pp. 109330, 2024.
Mojisola, F. O., S. Misra, C. Falayi Febisola, O. Abayomi-Alli and G. Sengul, “An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA),” Egyptian Informatics Journal, vol. 23, no. 2, pp. 291–301, 2022.
Susilo, W., J. Tonien and G. Yang, “Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA,” Computer Standards & Interfaces, vol. 74, pp. 103470, 2021.
Alhassan, A. M., “Secure multi-cloud resource allocation with SDN and self-adaptive authentication,” Ain Shams Engineering Journal, vol. 15, no. 6, pp. 102742, 2024.
Bai, W., H. Yang, A. Yu, H. Xiao, L. He, L. Feng and J. Zhang, “Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks,” Optical Fiber Technology, vol. 40, pp. 18–27, 2018.
Biswas, K., V. Muthukkumarasamy, M. J. M. Chowdhury, X.-W. Wu and K. Singh, “A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks,” Computer Networks, vol. 232, pp. 109842, 2023.
Che, M., H. Chen, Y. Ueda and K. Kato, “Secured THz communication in photonic microcell networks based on spatial wave mixing of steered beams,” Optical Switching and Networking, vol. 54, pp. 100773, 2024.
Chithaluru, P., A. Singh, J. S. Dhatterwal, A. H. Sodhro, M. A. Albahar, A. Jurcut and A. Alkhayyat, “An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks,” Future Generation Computer Systems, vol. 148, pp. 225–239, 2023.
Gurusamy, S. and R. Selvaraj, “Resource allocation with efficient task scheduling in cloud computing using hierarchical auto-associative polynomial convolutional neural network,” Expert Systems with Applications, vol. 249, pp. 123554, 2024.
Mahboubi, A., S. Camtepe, K. Ansari, M. Pawłowski, P. Morawiecki, H. Aboutorab, J. Pieprzyk and J. Duda, “Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method,” Journal of Information Security and Applications, vol. 86, pp. 103873, 2024.
Marwan, M., A. Ait Temghart, S. Ouhmi and M. Lazaar, “Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification,” Results in Engineering, vol., pp. 102902, 2024.
Marwan, M., F. AlShahwan, Y. Afoudi, A. Ait Temghart and M. Lazaar, “Leveraging artificial intelligence and mutual authentication to optimize content caching in edge data centers,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 9, pp. 101742, 2023.
Mershad, K. and O. Cheikhrouhou, “Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review,” Internet of Things, vol. 24, pp. 100984, 2023.
Mohamed, S. A. A. and S. Kurnaz, “Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network,” Computers, Materials and Continua, vol. 80, no. 1, pp. 819–841, 2024.
Nawaz, M. W., W. Zhang, D. Flynn, L. Zhang, R. Swash, Q. H. Abbasi, M. A. Imran and O. Popoola, “6G edge-networks and multi-UAV knowledge fusion for urban autonomous vehicles,” Physical Communication, vol. 67, pp. 102479, 2024.
Rehman, A., T. Saba, K. Haseeb, T. Alam and G. Jeon, “IoT-Edge technology based cloud optimization using artificial neural networks,” Microprocessors and Microsystems, vol. 106, pp. 105049, 2024.
Sham, E. E. and D. P. Vidyarthi, “CoFA for QoS based secure communication using adaptive chaos dynamical system in fog-integrated cloud,” Digital Signal Processing, vol. 126, pp. 103523, 2022.
Shivaramakrishna, D. and M. Nagaratna, “A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control,” Alexandria Engineering Journal, vol. 84, pp. 275–284, 2023.
Si, H., W. Li, N. Su, T. Li, Y. Li, C. Zhang, B. Fernando and C. Sun, “A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem,” Computer Communications, vol. 223, pp. 68–80, 2024.
Srinidhi, N. N., S. M. Dilip Kumar and K. R. Venugopal, “Network optimizations in the Internet of Things: A review,” Engineering Science and Technology, an International Journal, vol. 22, no. 1, pp. 1–21, 2019.
Liu, Y., X. Shen, J. Liu and K. Peng, “Optical asymmetric JTC cryptosystem based on multiplication-division operation and RSA algorithm,” Optics & Laser Technology, vol. 160, pp. 109042, 2023.
Talha, A., A. Bouayad and M. O. C. Malki, “An improved pathfinder algorithm using opposition-based learning for tasks scheduling in cloud environment,” Journal of Computational Science, vol. 64, pp. 101873, 2022.
Josien, M. and R. Prat, “Parallel and bias-free RSA algorithm for maximal Poisson-sphere sampling,” Computer Physics Communications, vol. 305, pp. 109354, 2024.
Thabit, F., O. Can, S. Alhomdy, G. H. Al-Gaphari and S. Jagtap, “A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing,” International Journal of Intelligent Networks, vol. 3, pp. 16–30, 2022.
Wang, Y., Z. Wang and X. Liu, “Key security measurement method of authentication based on mobile edge computing in urban rail transit communication network,” Computer Communications, vol. 215, pp. 140–149, 2024.
Zhang, L., Y. Zou, W. Wang, Z. Jin, Y. Su and H. Chen, “Resource allocation and trust computing for blockchain-enabled edge computing system,” Computers & Security, vol. 105, pp. 102249, 2021.
Zhang, X., Y. Wang, T. Ma, L. Guo and Z. Hu, “A Lightweight_PAEKS-based energy scheduling model considering priority in MicroGrid,” Ad Hoc Networks, vol. 162, pp. 103531, 2024.
Zhou, C. and Z. Jiang, “Computer Network Communication Security Encryption System Based on Ant Colony Optimization Algorithm,” Procedia Computer Science, vol. 228, pp. 38–46, 2023.
Anitha, S., S. Saravanan and A. Chandrasekar, “Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission,” Measurement: Sensors, vol. 29, pp. 100889, 2023.
Gong, L., K. Qiu, C. Deng and N. Zhou, “An optical image compression and encryption scheme based on compressive sensing and RSA algorithm,” Optics and Lasers in Engineering, vol. 121, pp. 169–180, 2019.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
