An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

被引:0
作者
Shrivastava, Pranav [1 ]
Alam, Bashir [1 ]
Alam, Mansaf [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Jamia Millia Islamia, Dept Comp Sci, New Delhi 110025, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 10期
关键词
Hyperelliptic curve; SHA; 256; 512; Ring-based Homomorphic Encryption; Polynomial Ring; Cloud computing; PROTOCOL; DESIGN;
D O I
10.1007/s10586-024-04617-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.
引用
收藏
页码:13675 / 13691
页数:17
相关论文
共 29 条
[1]  
Almutairi S, 2021, INT J ADV COMPUT SC, V12, P339
[2]   A Survey on Blockchain-Fog Integration Approaches [J].
Baniata, Hamza ;
Kertesz, Attila .
IEEE ACCESS, 2020, 8 :102657-102668
[3]   Blockchain-based solutions for cloud computing: A survey [J].
Dorsala, Mallikarjun Reddy ;
Sastry, V. N. ;
Chapram, Sudhakar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 196
[4]   Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective [J].
Du, Zhiqiang ;
Jiang, Wenlong ;
Tian, Chenguang ;
Rong, Xiaofeng ;
She, Yuchao .
ELECTRONICS, 2023, 12 (09)
[5]   Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges [J].
Ferrag, Mohamed Amine ;
Shu, Lei ;
Yang, Xing ;
Derhab, Abdelouahid ;
Maglaras, Leandros .
IEEE ACCESS, 2020, 8 :32031-32053
[6]   Blockchain Meets Cloud Computing: A Survey [J].
Gai, Keke ;
Guo, Jinnan ;
Zhu, Liehuang ;
Yu, Shui .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :2009-2030
[7]   An in-depth and systematic literature review on the blockchain-based approaches for cloud computing [J].
Gong, Jianhu ;
Navimipour, Nima Jafari .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01) :383-400
[8]   Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing [J].
Habib, Gousia ;
Sharma, Sparsh ;
Ibrahim, Sara ;
Ahmad, Imtiaz ;
Qureshi, Shaima ;
Ishfaq, Malik .
FUTURE INTERNET, 2022, 14 (11)
[9]   Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing [J].
Hewa, Tharaka ;
Braeken, An ;
Liyanage, Madhusanka ;
Ylianttila, Mika .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) :7174-7185
[10]  
Hussein M., DESIGNING NEW TECHNI