An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

被引:0
作者
Shrivastava, Pranav [1 ]
Alam, Bashir [1 ]
Alam, Mansaf [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Jamia Millia Islamia, Dept Comp Sci, New Delhi 110025, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 10期
关键词
Hyperelliptic curve; SHA; 256; 512; Ring-based Homomorphic Encryption; Polynomial Ring; Cloud computing; PROTOCOL; DESIGN;
D O I
10.1007/s10586-024-04617-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.
引用
收藏
页码:13675 / 13691
页数:17
相关论文
共 29 条
  • [1] Almutairi S, 2021, INT J ADV COMPUT SC, V12, P339
  • [2] A Survey on Blockchain-Fog Integration Approaches
    Baniata, Hamza
    Kertesz, Attila
    [J]. IEEE ACCESS, 2020, 8 (08): : 102657 - 102668
  • [3] Blockchain-based solutions for cloud computing: A survey
    Dorsala, Mallikarjun Reddy
    Sastry, V. N.
    Chapram, Sudhakar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 196
  • [4] Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
    Du, Zhiqiang
    Jiang, Wenlong
    Tian, Chenguang
    Rong, Xiaofeng
    She, Yuchao
    [J]. ELECTRONICS, 2023, 12 (09)
  • [5] Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges
    Ferrag, Mohamed Amine
    Shu, Lei
    Yang, Xing
    Derhab, Abdelouahid
    Maglaras, Leandros
    [J]. IEEE ACCESS, 2020, 8 : 32031 - 32053
  • [6] Blockchain Meets Cloud Computing: A Survey
    Gai, Keke
    Guo, Jinnan
    Zhu, Liehuang
    Yu, Shui
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 2009 - 2030
  • [7] An in-depth and systematic literature review on the blockchain-based approaches for cloud computing
    Gong, Jianhu
    Navimipour, Nima Jafari
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 383 - 400
  • [8] Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing
    Habib, Gousia
    Sharma, Sparsh
    Ibrahim, Sara
    Ahmad, Imtiaz
    Qureshi, Shaima
    Ishfaq, Malik
    [J]. FUTURE INTERNET, 2022, 14 (11):
  • [9] Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing
    Hewa, Tharaka
    Braeken, An
    Liyanage, Madhusanka
    Ylianttila, Mika
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) : 7174 - 7185
  • [10] Hussein M., DESIGNING NEW TECHNI