Skip to main content
Top

2021 | OriginalPaper | Chapter

An Efficient Privacy Preserving Algorithm for Cloud Users

Authors : Manoj Kumar Shukla, Ashwani Kumar Dubey, Divya Upadhyay, Boris Novikov

Published in: Advanced Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Now a day’s cloud-based instant message services are becoming popular. It can be an efficient way of communication even for events that require a certain level of security like banking, e-commerce applications, e-transactions etc. Cloud can provide a distributed notification of messages along with the queuing them to facilitate the transfer of messages between various applications and connected systems. Cloud message services can be as simple as a pay-as-you-go service, which does not require significant investment and protect its customers, providing a hassle-free and maintenance-free services platform. This research paper proposes a privacy-preserving approach to users utilizing cloud-based services. A cloud-based model is created and simulated. The proposed method is based on a multi-method approach where a virtual system is acting as an agent and is interconnected with other virtual systems. Inside a virtual system, a discrete event model of job processing and privacy preserving is defined as shown in the process flowchart. The proposed model is scalable. To preserve the privacy, Blowfish and Honey Encryption algorithm is used. This research aims to make the current messaging framework more secure, resilient and effective by the application of symmetric-key algorithm amalgamated with Honey key encryption. The performance of the proposed algorithm evaluated and found satisfactory results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Karpisek, F., Baggili, I., Breitinger, F.: WhatsApp network forensics: decrypting and understanding the WhatsApp call signaling messages. Digital Invest. 15, 110–118 (2015)CrossRef Karpisek, F., Baggili, I., Breitinger, F.: WhatsApp network forensics: decrypting and understanding the WhatsApp call signaling messages. Digital Invest. 15, 110–118 (2015)CrossRef
3.
go back to reference Karale, S.N., Pendke, K., Dahiwale, P.: The survey of various techniques & algorithms for SMS security. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, pp. 1–6. IEEE (2015) Karale, S.N., Pendke, K., Dahiwale, P.: The survey of various techniques & algorithms for SMS security. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, pp. 1–6. IEEE (2015)
4.
go back to reference Agoyi, M., Seral, D.: SMS security: an asymmetric encryption approach. In: 6th International Conference on Wireless and Mobile Communications, pp. 448–452. IEEE, Valencia (2010) Agoyi, M., Seral, D.: SMS security: an asymmetric encryption approach. In: 6th International Conference on Wireless and Mobile Communications, pp. 448–452. IEEE, Valencia (2010)
5.
go back to reference Khan, M.W.: SMS security in mobile devices: a survey. Int. J. Adv. Netw. Appl. 5(2), 1873–1882 (2013) Khan, M.W.: SMS security in mobile devices: a survey. Int. J. Adv. Netw. Appl. 5(2), 1873–1882 (2013)
7.
go back to reference Juels, A., Ristenpart, T.: Honey encryption: encryption beyond the brute-force barrier. IEEE Secur. Priv. 12(4), 59–62 (2014)CrossRef Juels, A., Ristenpart, T.: Honey encryption: encryption beyond the brute-force barrier. IEEE Secur. Priv. 12(4), 59–62 (2014)CrossRef
9.
go back to reference Moe, K.S.M., Win, T.: Enhanced honey encryption algorithm for increasing message space against brute force attack. In: 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) , Chiang Rai, Thailand, pp. 86–89. IEEE (2018) Moe, K.S.M., Win, T.: Enhanced honey encryption algorithm for increasing message space against brute force attack. In: 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) , Chiang Rai, Thailand, pp. 86–89. IEEE (2018)
10.
go back to reference Dharshini, P., Renjith, A.J., Kumar, M.P.: Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey. Secur. Commun. Netw. 9(18), 6379–6385 (2016)CrossRef Dharshini, P., Renjith, A.J., Kumar, M.P.: Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey. Secur. Commun. Netw. 9(18), 6379–6385 (2016)CrossRef
11.
go back to reference Raj, K.V., Ankitha, H., Ankitha, N.G., Hegde, L.K.: Honey encryption based hybrid cryptographic algorithm: a fusion ensuring enhanced security. In: 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, pp. 490–494. IEEE (2020) Raj, K.V., Ankitha, H., Ankitha, N.G., Hegde, L.K.: Honey encryption based hybrid cryptographic algorithm: a fusion ensuring enhanced security. In: 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, pp. 490–494. IEEE (2020)
12.
go back to reference Kim, J. I., Yoon, J.W.: Honey chatting: a novel instant messaging system robust to eavesdropping over communication. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, pp. 2184–2188. IEEE (2016) Kim, J. I., Yoon, J.W.: Honey chatting: a novel instant messaging system robust to eavesdropping over communication. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, pp. 2184–2188. IEEE (2016)
14.
go back to reference Tan, S.F., Samsudin, A.: Enhanced security of internet banking authentication with EXtended Honey Encryption (XHE) scheme. In: Zelinka, I., Vasant, P., Duy, V., Dao, T. (eds.) Innovative Computing, Optimization and Its Applications. Studies in Computational Intelligence, vol. 741. Springer, Cham (2018).https://doi.org/10.1007/978-3-319-66984-7_12 Tan, S.F., Samsudin, A.: Enhanced security of internet banking authentication with EXtended Honey Encryption (XHE) scheme. In: Zelinka, I., Vasant, P., Duy, V., Dao, T. (eds.) Innovative Computing, Optimization and Its Applications. Studies in Computational Intelligence, vol. 741. Springer, Cham (2018).https://​doi.​org/​10.​1007/​978-3-319-66984-7_​12
17.
18.
go back to reference Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 1230–124. Association for Computing Machinery (2016) Golla, M., Beuscher, B., Dürmuth, M.: On the security of cracking-resistant password vaults. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 1230–124. Association for Computing Machinery (2016)
20.
go back to reference Mudepalli, S., Rao, V.S., Kumar, R.K.: An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In: International Conference on Intelligent Computing and Control Systems (ICICCS) , Madurai, India, pp. 267–271. IEEE (2017). https://doi.org/10.1109/ICCONS.2017.8250724. Mudepalli, S., Rao, V.S., Kumar, R.K.: An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In: International Conference on Intelligent Computing and Control Systems (ICICCS) , Madurai, India, pp. 267–271. IEEE (2017). https://​doi.​org/​10.​1109/​ICCONS.​2017.​8250724.
21.
go back to reference Rani, S., Kaur, H.: Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal. In: Int. J. Adv. Res. Comput. Sci. 8(3), 254–258 (2017) Rani, S., Kaur, H.: Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal. In: Int. J. Adv. Res. Comput. Sci. 8(3), 254–258 (2017)
22.
go back to reference Yadav, G., Majare, A.: A comparative study of performance analysis of various encryption algorithms. In: International Conference on Emanations in Modern Technology and Engg. (ICEMTE-2017), vol. 5(3), pp. 70–73 (2017) Yadav, G., Majare, A.: A comparative study of performance analysis of various encryption algorithms. In: International Conference on Emanations in Modern Technology and Engg. (ICEMTE-2017), vol. 5(3), pp. 70–73 (2017)
24.
go back to reference Stallings, W.: Network Security Essentials: Applications and Standards, 4th edn. Prentice Hall, Pearson (2011) Stallings, W.: Network Security Essentials: Applications and Standards, 4th edn. Prentice Hall, Pearson (2011)
25.
Metadata
Title
An Efficient Privacy Preserving Algorithm for Cloud Users
Authors
Manoj Kumar Shukla
Ashwani Kumar Dubey
Divya Upadhyay
Boris Novikov
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0404-1_20

Premium Partner