Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments

被引:1
作者
Benmenzer, Faiza [1 ,2 ]
Beghdad, Rachid [1 ,2 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia, Algeria
[2] Univ Batna, Lab LAMIE, Route Constantine, Fesdis, Batna, Algeria
关键词
Attribute-based Encryption; Blockchain. Cloud Computing; Encryption Elliptic Curve; Homomorphic Encryption; Security; PRIVACY;
D O I
10.4018/IJISP.307072
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many encryption strategies have been applied to ensure data confidentiality and improve cloud security. The most recent cryptosystems are based on homomorphic (HE), attribute-based (ABE), and hybrid encryption. However, most of them suffer from numerous drawbacks: high time consumption, encrypted message size, and some vulnerabilities. Hence, a secure method is highly required to get a satisfying security level while keeping the computational complexity reduced. This paper outlines a novel technique that combines elliptic curve cryptography (ECC) and blockchain technology. The data is first encoded using the elliptic curve integrated encryption scheme, then signed using signed using the elliptic curve digital signature algorithm, and finally confirmed by the blockchain network before being stored in the cloud. The performance evaluation results prove that the proposed system is highly resistant to man-in-the-middle and replay attacks and performs better than a set of existing solutions in terms of cryptography cost, encryption/decryption time, and algortithm complexity.
引用
收藏
页数:20
相关论文
共 44 条
[1]  
Bala B., 2018, INTL J ADVANCED RSRC, V9
[2]   Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 :1-20
[3]   Analysis of attribute-based cryptographic techniques and their application to protect cloud services [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Hammoudeh, Mohammad .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[4]  
Chinnasamy P., 2021, Inventive Communication and Computational Technologies. Proceedings of ICICCT 2020. Lecture Notes in Networks and Systems (LNNS 145), P537, DOI 10.1007/978-981-15-7345-3_46
[5]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[6]  
Devi T, 2019, EKOLOJI, V28, P665
[7]   Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing [J].
El Makkaoui, Khalid ;
Ezzati, Abdellah ;
Beni-Hssane, Abderrahim ;
Ouhmad, Slimane .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (06) :2205-2214
[8]   Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing [J].
El Makkaoui, Khalid ;
Beni-Hssane, Abderrahim ;
Ezzati, Abdellah .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (12) :4629-4640
[9]   Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network [J].
Gao, Chong-zhi ;
Cheng, Qiong ;
Li, Xuan ;
Xia, Shi-bing .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1) :1655-1663
[10]  
Gunjal Y., 2018, 2018 INT C ADV COMM, DOI [10.1109/ICACCT.2018.8529627, DOI 10.1109/ICACCT.2018.8529627]