Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud

被引:0
|
作者
Pranav Shrivastava
Bashir Alam
Mansaf Alam
机构
[1] JMI,Department of Computer Engineering
[2] JMI,Department of Computer Science
来源
Cluster Computing | 2023年 / 26卷
关键词
Blockchain; Cloud computing; Security; Privacy; Authentication; Hash function; Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user’s routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods.
引用
收藏
页码:3673 / 3688
页数:15
相关论文
共 50 条
  • [31] Security enhancement of the authenticated RFID security mechanism based on chaotic maps
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2356 - 2372
  • [32] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [33] Modified Elliptic Curve Cryptography Model for Personal Health Record Sharing in Cloud with Trust Valuation
    Sukte, ChudamanDevidasrao
    Emmanuel, M.
    Deshmukh, Ratnadeep R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (01): : 593 - 601
  • [34] A novel security mechanism using AES cryptography approach in cloud computing
    Muthulakshmi, B.
    Venkatesulu, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (06)
  • [35] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Neeraj Kumar
    The Journal of Supercomputing, 2018, 74 : 6428 - 6453
  • [36] A blockchain-based security system with light cryptography for user authentication security
    Imen Hagui
    Amina Msolli
    Noura ben Henda
    Abdelhamid Helali
    Abdelaziz Gassoumi
    Thanh Phuong Nguyen
    Fredj Hassen
    Multimedia Tools and Applications, 2024, 83 : 52451 - 52480
  • [37] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [38] DNA cryptography based security framework for health-cloud data
    Qiqieh, Issa
    Alzubi, Jafar
    Alzubi, Omar
    COMPUTING, 2025, 107 (01)
  • [39] NETWORK SECURITY USING LATTICE BASED CRYPTOGRAPHY
    Singhla, Sonal
    Yadav, Shailja
    Tanwar, Rohit
    IIOAB JOURNAL, 2019, 10 (02) : 66 - 71
  • [40] Blockchain Chain Based Cloud Security Using Provable Partitioned Folding Encryption for Integrity Proofing in Cloud Environment
    P. Tamilselvi
    SN Computer Science, 5 (8)