Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud

被引:0
|
作者
Pranav Shrivastava
Bashir Alam
Mansaf Alam
机构
[1] JMI,Department of Computer Engineering
[2] JMI,Department of Computer Science
来源
Cluster Computing | 2023年 / 26卷
关键词
Blockchain; Cloud computing; Security; Privacy; Authentication; Hash function; Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user’s routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods.
引用
收藏
页码:3673 / 3688
页数:15
相关论文
共 50 条
  • [41] A blockchain-based security system with light cryptography for user authentication security
    Hagui, Imen
    Msolli, Amina
    ben Henda, Noura
    Helali, Abdelhamid
    Gassoumi, Abdelaziz
    Nguyen, Thanh Phuong
    Hassen, Fredj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 52451 - 52480
  • [42] Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
    K. L. Neela
    V. Kavitha
    Applied Intelligence, 2023, 53 : 4733 - 4747
  • [43] Blockchain-based Security Architecture for Distributed Cloud Storage
    Li, Jiaxing
    Liu, Zhusong
    Chen, Long
    Chen, Pinghua
    Wu, Jigang
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 408 - 411
  • [44] Improvement of image transmission using chaotic system and elliptic curve cryptography
    Singh, Khoirom Motilal
    Singh, Laiphrakpam Dolendro
    Tuithung, Themrichon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (01) : 1149 - 1170
  • [45] Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
    Neela, K. L.
    Kavitha, V
    APPLIED INTELLIGENCE, 2023, 53 (04) : 4733 - 4747
  • [46] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [47] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57
  • [48] Security enhancement of the cloud paradigm using a novel optimized crypto mechanism
    Singh, Kishan Kumar
    Jha, Vijay Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 15983 - 16007
  • [49] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [50] Cloud Based Supply Chain Management System Using Blockchain
    Karumanchi, Mani Deep
    Sheeba, J., I
    Devaneyan, S. Pradeep
    2019 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2019, : 390 - 395