Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Wireless Personal Communications 2/2022

01-06-2022

A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA

Authors: J. Nithisha, P. Jesu Jayarin

Published in: Wireless Personal Communications | Issue 2/2022

Login to get access
share
SHARE

Abstract

Security is necessary for performing the effective data communications in internet and cloud environment. The data security in cloud is becoming very challenging task due to the presence of huge volume of cloud users. Even though, the various secured cloud data storage mechanisms are available and tried to fulfill the current requirement in terms of security level and efficiency. However, the available works are not obtained the enough security level and the efficiency while storing and sharing the data in cloud. For this purpose, this work proposes a new secured storage method for providing data security to store the data securely in cloud. The proposed system consists of three different algorithms for performing prime number generation, digital signature creation for generating keys, encryption, decryption and authorization. Here, a new technique to find a co-prime number which is used to generate keys in key generation process and also useful for performing encryption and decryption process. Moreover, a new key generation technique is also introduced for elliptic curve cryptography and digital signature algorithm using polynomial congruence for performing key generation process securely. In addition, a new elliptic curve and polynomial congruence based encryption/decryption algorithms for performing data encryption and decryption in the process of data storage and communication. Finally, the user authenticity is verified by the proposed digital signature algorithm in this work. The experiments have been conducted for evaluating the proposed secured storage and communication system and proved as better than others in terms of efficiency and security level.
Literature
1.
go back to reference Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181–190. CrossRef Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181–190. CrossRef
2.
go back to reference Elumalaivasan, P., Kulothungan, K., Ganapathy, S., & Kannan, A. (2016). Trust based ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Australian Journal of Basic and Applied Sciences, 10(2), 18–26. Elumalaivasan, P., Kulothungan, K., Ganapathy, S., & Kannan, A. (2016). Trust based ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Australian Journal of Basic and Applied Sciences, 10(2), 18–26.
3.
go back to reference Kendrekar, P. P., & Chavan, M. K. (2016). Cryptographic implementation of aggregate-key encryption for data sharing in cloud storage. In 2016 IEEE international conference on recent trends in electronics, information & communication technology (RTEICT) (pp. 829–832). Kendrekar, P. P., & Chavan, M. K. (2016). Cryptographic implementation of aggregate-key encryption for data sharing in cloud storage. In 2016 IEEE international conference on recent trends in electronics, information & communication technology (RTEICT) (pp. 829–832).
4.
go back to reference Potey, M. M., Dhote, C. A., & Sharma, D. H. (2016). Efficient homomorphic encryption using ECC-ElGamal scheme for cloud data. In 3rd international conference on electrical, electronics, engineering trends, communication, optimization and sciences (EEECOS 2016) (pp. 1–5). Potey, M. M., Dhote, C. A., & Sharma, D. H. (2016). Efficient homomorphic encryption using ECC-ElGamal scheme for cloud data. In 3rd international conference on electrical, electronics, engineering trends, communication, optimization and sciences (EEECOS 2016) (pp. 1–5).
5.
go back to reference Alrawais, Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access, 5, 9131–9138. CrossRef Alrawais, Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access, 5, 9131–9138. CrossRef
6.
go back to reference Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120–141. CrossRef Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120–141. CrossRef
7.
go back to reference Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115. CrossRef Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115. CrossRef
8.
go back to reference Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems, 9(14), 2764–2777. Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems, 9(14), 2764–2777.
9.
go back to reference Mudepalli, S., Rao, V. S., & Kumar, R. K. (2017). An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In 2017 international conference on intelligent computing and control systems (ICICCS) (pp. 267–271). Mudepalli, S., Rao, V. S., & Kumar, R. K. (2017). An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In 2017 international conference on intelligent computing and control systems (ICICCS) (pp. 267–271).
10.
go back to reference Thangapandiyan, M., Anand, P. M. R., & Sankaran, K. S. (2018). Enhanced cloud security implementation using modified ECC algorithm. In 2018 international conference on communication and signal processing (ICCSP) (pp. 1019–1022). Thangapandiyan, M., Anand, P. M. R., & Sankaran, K. S. (2018). Enhanced cloud security implementation using modified ECC algorithm. In 2018 international conference on communication and signal processing (ICCSP) (pp. 1019–1022).
11.
go back to reference Mehmood, Natgunanathan, I., Xiang, Y., Poston, H., & Zhang, Y. (2018). Anonymous authentication scheme for smart cloud based healthcare applications. IEEE Access, 6, 33552–33567. CrossRef Mehmood, Natgunanathan, I., Xiang, Y., Poston, H., & Zhang, Y. (2018). Anonymous authentication scheme for smart cloud based healthcare applications. IEEE Access, 6, 33552–33567. CrossRef
12.
go back to reference Kumar, V., Ahmad, M., & Kumari, A. (2019). A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS. Telematics and Informatics, 38, 100–117. CrossRef Kumar, V., Ahmad, M., & Kumari, A. (2019). A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS. Telematics and Informatics, 38, 100–117. CrossRef
13.
go back to reference Chen, Y., Xu, W., Peng, L., & Zhang, H. (2019). Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT. IEEE Access, 7, 15210–15221. CrossRef Chen, Y., Xu, W., Peng, L., & Zhang, H. (2019). Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT. IEEE Access, 7, 15210–15221. CrossRef
14.
go back to reference Yang, X., Wang, M., Li, T., Liu, R., & Wang, C. (2020). Privacy-preserving cloud auditing for multiple users scheme with authorization and traceability. IEEE Access, 8, 130866–130877. CrossRef Yang, X., Wang, M., Li, T., Liu, R., & Wang, C. (2020). Privacy-preserving cloud auditing for multiple users scheme with authorization and traceability. IEEE Access, 8, 130866–130877. CrossRef
15.
go back to reference Atiewi, S., Al-rahayfeh, A., Almiani, M., Yussof, S., et al. (2020). Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access, 8, 113498–113511. CrossRef Atiewi, S., Al-rahayfeh, A., Almiani, M., Yussof, S., et al. (2020). Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access, 8, 113498–113511. CrossRef
16.
go back to reference Nishoni, S., & Tenis, A. A. (2020). Secure communication with data analysis and auditing using bilinear key aggregate cryptosystem in cloud computing. Materials Today: Proceedings, 24(4), 2358–2365. Nishoni, S., & Tenis, A. A. (2020). Secure communication with data analysis and auditing using bilinear key aggregate cryptosystem in cloud computing. Materials Today: Proceedings, 24(4), 2358–2365.
17.
go back to reference Dang, T. K., Pham, C. D. M., & Nguyen, T. L. P. (2020). A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities. Sustainable Cities and Society, 56, Article No.102097. Dang, T. K., Pham, C. D. M., & Nguyen, T. L. P. (2020). A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities. Sustainable Cities and Society, 56, Article No.102097.
18.
go back to reference Prabha, K. M., & Saraswathi, P. V. (2020). Suppressed K-anonymity multi-factor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Computer Communications, 158, 85–94. CrossRef Prabha, K. M., & Saraswathi, P. V. (2020). Suppressed K-anonymity multi-factor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Computer Communications, 158, 85–94. CrossRef
19.
go back to reference Khan, M. A., Quasim, M. T., Alghamdi, N. S., & Khan, M. Y. (2020). A secure framework for authentication and encryption using improved ECC for IoT-Based medical sensor data. IEEE Access, 8, 52018–52027. CrossRef Khan, M. A., Quasim, M. T., Alghamdi, N. S., & Khan, M. Y. (2020). A secure framework for authentication and encryption using improved ECC for IoT-Based medical sensor data. IEEE Access, 8, 52018–52027. CrossRef
20.
go back to reference Kavin, B. P., & Ganapathy, S. (2020). EC(DH)2: An effective secured data storage mechanism for cloud based IoT applications using elliptic curve and Diffie–Hellman. International Journal of Internet Technology and Secured Transactions, 10(5), 601–607. CrossRef Kavin, B. P., & Ganapathy, S. (2020). EC(DH)2: An effective secured data storage mechanism for cloud based IoT applications using elliptic curve and Diffie–Hellman. International Journal of Internet Technology and Secured Transactions, 10(5), 601–607. CrossRef
21.
go back to reference Pradeep, S., Muthurajkumar, S., Ganapathy, S., & Kannan, A. (2021). A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wireless Personal Communications 1–20. Pradeep, S., Muthurajkumar, S., Ganapathy, S., & Kannan, A. (2021). A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wireless Personal Communications 1–20.
22.
go back to reference Kavin, B. P., & Ganapathy, S. (2021). A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. International Arab Journal of Information Technology, 18(2), 180–190. Kavin, B. P., & Ganapathy, S. (2021). A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. International Arab Journal of Information Technology, 18(2), 180–190.
24.
go back to reference Sowjanya, K., Dasgupta, M., & Ray, S. (2021). Elliptic curve cryptography based authentication scheme for internet of medical things. Journal of Information Security and Applications, 58, 102761. CrossRef Sowjanya, K., Dasgupta, M., & Ray, S. (2021). Elliptic curve cryptography based authentication scheme for internet of medical things. Journal of Information Security and Applications, 58, 102761. CrossRef
25.
go back to reference Kavin, B. P., Ganapathy, S., Kanimozhi, U., & Kannan, A. (2020). An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA. Wireless Personal Communications, 115(2), 1107–1135. CrossRef Kavin, B. P., Ganapathy, S., Kanimozhi, U., & Kannan, A. (2020). An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA. Wireless Personal Communications, 115(2), 1107–1135. CrossRef
Metadata
Title
A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA
Authors
J. Nithisha
P. Jesu Jayarin
Publication date
01-06-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09778-9

Other articles of this Issue 2/2022

Wireless Personal Communications 2/2022 Go to the issue