Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 8/2022

05.02.2022 | Research Article-Computer Engineering and Computer Science

Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique

verfasst von: Vidyullata Devmane, B. K. Lande, Jyoti Joglekar, Dilendra Hiran

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 8/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat DuPont, Q.: Experiments in algorithmic governance: a history and ethnography of “The DAO,” a failed decentralized autonomous organization. Experiments in algorithmic governance, Bitcoin and Beyond, Routledge, pp. 21, ed. 1 (2017) DuPont, Q.: Experiments in algorithmic governance: a history and ethnography of “The DAO,” a failed decentralized autonomous organization. Experiments in algorithmic governance, Bitcoin and Beyond, Routledge, pp. 21, ed. 1 (2017)
6.
Zurück zum Zitat Luo, R.C.; Chung, L.Y.; Lien, C.H.: A novel symmetric cryptography based on the hybrid haar wavelets encoder and chaotic masking scheme. IEEE Trans. Ind. Electron. 49(4), 933–944 (2002)CrossRef Luo, R.C.; Chung, L.Y.; Lien, C.H.: A novel symmetric cryptography based on the hybrid haar wavelets encoder and chaotic masking scheme. IEEE Trans. Ind. Electron. 49(4), 933–944 (2002)CrossRef
7.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006) Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)
8.
Zurück zum Zitat Sultan, N.A.: Reaching for the “cloud”: How SMEs can manage. Int. J. Inf. Manag. 31(3), 272–278 (2011)CrossRef Sultan, N.A.: Reaching for the “cloud”: How SMEs can manage. Int. J. Inf. Manag. 31(3), 272–278 (2011)CrossRef
9.
Zurück zum Zitat Che, J.; Duan, Y.; Zhang, T.; Fan, J.: Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)CrossRef Che, J.; Duan, Y.; Zhang, T.; Fan, J.: Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)CrossRef
11.
Zurück zum Zitat Banerjee, M.; Lee, J.; Choo, K.K.R.: A blockchain future for internet of things security: a position paper. Digit. Commun. Netw. 4(3), 149–160 (2018)CrossRef Banerjee, M.; Lee, J.; Choo, K.K.R.: A blockchain future for internet of things security: a position paper. Digit. Commun. Netw. 4(3), 149–160 (2018)CrossRef
12.
Zurück zum Zitat Ouaddah, A.; Elkalam, A.A.; Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, Á.; Serrhini, M.; Felgueiras, C. (Eds.) Europe and MENA cooperation advances in information and communication technologies. Advances in intelligent systems and computing, Vol. 520. Springer, Cham (2017) Ouaddah, A.; Elkalam, A.A.; Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, Á.; Serrhini, M.; Felgueiras, C. (Eds.) Europe and MENA cooperation advances in information and communication technologies. Advances in intelligent systems and computing, Vol. 520. Springer, Cham (2017)
14.
Zurück zum Zitat Kwak, K.S., Ullah, S., Ullah, N.: An overview of IEEE 802.15.6 standard. In: 2010 3rd international symposium on applied sciences in biomedical and communication technologies (ISABEL 2010), pp. 1–6 (2010) Kwak, K.S., Ullah, S., Ullah, N.: An overview of IEEE 802.15.6 standard. In: 2010 3rd international symposium on applied sciences in biomedical and communication technologies (ISABEL 2010), pp. 1–6 (2010)
15.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: proceedings of the 13th ACM conference on computer and communications security, pp. 89–98, Acm (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: proceedings of the 13th ACM conference on computer and communications security, pp. 89–98, Acm (2006)
16.
Zurück zum Zitat Gennaro, R.; Lysyanskaya, A.; Malkin, T.; Micali, S.; Rabin, T.: Algorithmic tamper-proof (atp) security: theoretical foundations for security against hardware tampering. In: Naor, M. (Ed.) Theory of cryptography TCC 2004. Lecture notes in computer science, Vol. 2951. Springer, Berlin (2004) Gennaro, R.; Lysyanskaya, A.; Malkin, T.; Micali, S.; Rabin, T.: Algorithmic tamper-proof (atp) security: theoretical foundations for security against hardware tampering. In: Naor, M. (Ed.) Theory of cryptography TCC 2004. Lecture notes in computer science, Vol. 2951. Springer, Berlin (2004)
17.
Zurück zum Zitat Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: proceedings of the 33rd international conference on machine learning, PMLR 48 pp. 201–210 (2016) Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: proceedings of the 33rd international conference on machine learning, PMLR 48 pp. 201–210 (2016)
18.
Zurück zum Zitat Chatterjee, A.; Kaushal, M.; Sengupta, I.: Accelerating sorting of fully homomorphic encrypted data. In: Paul, G.; Vaudenay, S. (Eds.) Progress in cryptology – INDOCRYPT 2013. Lecture notes in computer science, Vol. 8250. Springer, Cham (2013) Chatterjee, A.; Kaushal, M.; Sengupta, I.: Accelerating sorting of fully homomorphic encrypted data. In: Paul, G.; Vaudenay, S. (Eds.) Progress in cryptology – INDOCRYPT 2013. Lecture notes in computer science, Vol. 8250. Springer, Cham (2013)
20.
Zurück zum Zitat Lin, X.; Sun, X.; Ho, P.H.; Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef Lin, X.; Sun, X.; Ho, P.H.; Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef
21.
Zurück zum Zitat Zhu, L.; Wu, Y.; Gai, K.; Choo, K.K.R.: Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 91, 527–535 (2019)CrossRef Zhu, L.; Wu, Y.; Gai, K.; Choo, K.K.R.: Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 91, 527–535 (2019)CrossRef
22.
Zurück zum Zitat Wang, Y.; Luo, F.; Dong, Z.; Tong, Z.; Qiao, Y.: Distributed meter data aggregation framework based on Blockchain and homomorphic encryption. IET Cyber-Phys. Syst. Theory Appl. 4(1), 30–37 (2019)CrossRef Wang, Y.; Luo, F.; Dong, Z.; Tong, Z.; Qiao, Y.: Distributed meter data aggregation framework based on Blockchain and homomorphic encryption. IET Cyber-Phys. Syst. Theory Appl. 4(1), 30–37 (2019)CrossRef
23.
Zurück zum Zitat Wang, J.; Peng, F.; Tian, H.; Chen, W.; Lu, J.: Public auditing of log integrity for cloud storage systems via blockchain. In: Li, J.; Liu, Z.; Peng, H. (Eds.) Security and privacy in new computing environments SPNCE 2019. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, Vol. 284. Springer, Cham (2019) Wang, J.; Peng, F.; Tian, H.; Chen, W.; Lu, J.: Public auditing of log integrity for cloud storage systems via blockchain. In: Li, J.; Liu, Z.; Peng, H. (Eds.) Security and privacy in new computing environments SPNCE 2019. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, Vol. 284. Springer, Cham (2019)
30.
Zurück zum Zitat Kammoun, M., Elleuchi, M., Abid, M., BenSaleh, M.S. FPGA-based implementation of the SHA-256 hash algorithm. In: 2020 IEEE international conference on design & test of integrated micro & nano-systems (DTS), (2020), pp. 1–6 Kammoun, M., Elleuchi, M., Abid, M., BenSaleh, M.S. FPGA-based implementation of the SHA-256 hash algorithm. In: 2020 IEEE international conference on design & test of integrated micro & nano-systems (DTS), (2020), pp. 1–6
31.
Zurück zum Zitat Kim, Y.; Choi, H.; Seo, S.C.: Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes. In: Hong, D. (Ed.) Information security and cryptology – ICISC 2020. Springer, Cham (2021) Kim, Y.; Choi, H.; Seo, S.C.: Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes. In: Hong, D. (Ed.) Information security and cryptology – ICISC 2020. Springer, Cham (2021)
Metadaten
Titel
Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique
verfasst von
Vidyullata Devmane
B. K. Lande
Jyoti Joglekar
Dilendra Hiran
Publikationsdatum
05.02.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 8/2022
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06347-3

Weitere Artikel der Ausgabe 8/2022

Arabian Journal for Science and Engineering 8/2022 Zur Ausgabe

RESEARCH ARTICLE-COMPUTER ENGINEERING AND COMPUTER SCIENCE

Upgrading the Quality of Power Using TVSS Device and PFC Converter Fed SBLDC Motor

Research Article-Computer Engineering and Computer Science

An Improved and Robust Encoder–Decoder for Skin Lesion Segmentation

Research Article-Computer Engineering and Computer Science

Watermarking Techniques for the Security of Medical Images and Image Sequences

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.