Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud

被引:0
|
作者
Pranav Shrivastava
Bashir Alam
Mansaf Alam
机构
[1] JMI,Department of Computer Engineering
[2] JMI,Department of Computer Science
来源
Cluster Computing | 2023年 / 26卷
关键词
Blockchain; Cloud computing; Security; Privacy; Authentication; Hash function; Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user’s routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods.
引用
收藏
页码:3673 / 3688
页数:15
相关论文
共 50 条
  • [21] Cloud based security on outsourcing using blockchain in E-health systems
    Benil, T.
    Jasper, J.
    COMPUTER NETWORKS, 2020, 178
  • [22] A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing
    Shrivastava, Pranav
    Alam, Bashir
    Alam, Mansaf
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 2683 - 2702
  • [23] A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing
    Pranav Shrivastava
    Bashir Alam
    Mansaf Alam
    Multimedia Tools and Applications, 2024, 83 : 2683 - 2702
  • [24] Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
    Cherbal, Sarra
    Zier, Abdelhak
    Hebal, Sara
    Louail, Lemia
    Annane, Boubakeur
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (03) : 3738 - 3816
  • [25] Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture
    Chaganti, Rajasekhar
    Varadarajan, Vijayakumar
    Gorantla, Venkata Subbarao
    Gadekallu, Thippa Reddy
    Ravi, Vinayakumar
    FUTURE INTERNET, 2022, 14 (09)
  • [26] Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
    Sasikumar, K.
    Nagarajan, Sivakumar
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2025, 6 : 392 - 402
  • [27] Security enhancement in wireless sensors using blockchain technology
    Ravichandran, C.
    Kumar, Ravi
    Kumar, T. Senthil
    Veluri, Ravi Kishore
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2023, 15 (05) : 516 - 531
  • [28] Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain
    El-Zawawy, Mohamed A.
    Brighente, Alessandro
    Conti, Mauro
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1775 - 1789
  • [29] Security enhancement on an RFID ownership transfer protocol based on cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 266 - 277
  • [30] Enabled Security based on Elliptic Curve Cryptography with optimal Resource Allocation schema in cloud computing environment
    Nagalakshmi, N.
    Rajalakshmi, S.
    2015 IEEE SEVENTH NATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND INFORMATION SYSTEMS (NCCCIS), 2015, : 17 - 22