Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique

被引:4
作者
Devmane, Vidyullata [1 ]
Lande, B. K. [2 ]
Joglekar, Jyoti [3 ]
Hiran, Dilendra [4 ]
机构
[1] Shah & Anchor Kutchhi Engn Coll, Dept Comp Engn, Mumbai 400088, Maharashtra, India
[2] Datta Meghe Coll Engn, Navi Mumbai 400708, Maharashtra, India
[3] KJ Somaiya Coll Engn, Mumbai 400077, Maharashtra, India
[4] PAHER Univ, Udaipur 313001, Rajasthan, India
关键词
Elliptic curve cryptography; Homomorphism; Security analysis; Encryption; Blockchain; Time consumption; FUTURE; CRYPTOGRAPHY; INTERNET;
D O I
10.1007/s13369-021-06347-3
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model's efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.
引用
收藏
页码:10381 / 10394
页数:14
相关论文
共 31 条
[1]   A blockchain future for internet of things security: a position paper [J].
Banerjee, Mandrita ;
Lee, Junghee ;
Choo, Kim-Kwang Raymond .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (03) :149-160
[2]   The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model [J].
Chakrabarti, Sreeparna ;
Suresh Babu, G. N. K. .
INFORMATION SECURITY JOURNAL, 2021, 30 (06) :325-341
[3]  
Chatterjee Ayantika, 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P262, DOI 10.1007/978-3-319-03515-4_17
[4]   Study on the security models and strategies of cloud computing [J].
Che, Jianhua ;
Duan, Yamin ;
Zhang, Tao ;
Fan, Jie .
PEEA 2011, 2011, 23
[5]   DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks [J].
Chen, Yun ;
Xie, Hui ;
Lv, Kun ;
Wei, Shengjun ;
Hu, Changzhen .
INFORMATION SCIENCES, 2019, 501 :100-117
[6]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[7]  
DuPont Q, 2018, RIPE SER GLOB POLIT, P157
[8]   Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing [J].
El Makkaoui, Khalid ;
Beni-Hssane, Abderrahim ;
Ezzati, Abdellah .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (12) :4629-4640
[9]   A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption [J].
Elhoseny, Mohamed ;
Elminir, Hamdy ;
Riad, Alaa ;
Yuan, Xiaohui .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) :262-275
[10]  
Gennaro R, 2004, LECT NOTES COMPUT SC, V2951, P258