Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud

被引:0
|
作者
Pranav Shrivastava
Bashir Alam
Mansaf Alam
机构
[1] JMI,Department of Computer Engineering
[2] JMI,Department of Computer Science
来源
Cluster Computing | 2023年 / 26卷
关键词
Blockchain; Cloud computing; Security; Privacy; Authentication; Hash function; Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user’s routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods.
引用
收藏
页码:3673 / 3688
页数:15
相关论文
共 50 条
  • [1] Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud
    Shrivastava, Pranav
    Alam, Bashir
    Alam, Mansaf
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3673 - 3688
  • [2] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [3] Using Blockchain in Cloud Computing to Enhance Relational Database Security
    Awadallah, Ruba
    Samsudin, Azman
    IEEE ACCESS, 2021, 9 : 137353 - 137366
  • [4] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526
  • [5] IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
    Balogh, Stefan
    Gallo, Ondrej
    Ploszek, Roderik
    Spacek, Peter
    Zajac, Pavol
    ELECTRONICS, 2021, 10 (21)
  • [6] Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm
    Velmurugadass, P.
    Dhanasekaran, S.
    Anand, S. Shasi
    Vasudevan, V.
    MATERIALS TODAY-PROCEEDINGS, 2021, 37 : 2653 - 2659
  • [7] Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
    Benmenzer, Faiza
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [8] Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment
    Hema, Sri Vigna V.
    Ramesh, K.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (26)
  • [9] Modified security and cryptography-based data deduplication in cloud environment
    Kumar, Doddi Suresh
    Srinivasu, Nulaka
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2025,
  • [10] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12) : 6428 - 6453