A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

被引:3
|
作者
Shrivastava, Pranav [1 ]
Alam, Bashir [1 ]
Alam, Mansaf [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Jamia Millia Islamia, Dept Comp Sci, New Delhi 110025, India
关键词
Blockchain technology; Hybrid lightweight data encryption; Cloud computing; Optimization; Cryptographic hashing; Proof of authority; ARCHITECTURE;
D O I
10.1007/s11042-023-17040-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks, and unauthorized users get easy data access to the data. Blockchain technology provides better security in the cloud based on its distributed and highly cohesive nature. In order to enhance the block chain based encryption process, the second work intends to propose a blockchain based hybrid optimized cryptography scheme for secure cloud storage. At first, key generation is performed using the ECC approach in the cloud. In cloud user registration, keys and data are needed, and the cloud will provide the user ID. Then, the optimal key selection is performed by using flamingo search optimization (FSO). The public and the private key is selected by using this optimization approach. Afterwards, data encryption is performed using the Elgamal scheme on the owner side. This hybrid lightweight elliptic Elgamal based encryption (HLEEE) approach in key generation and data encryption process increases data security. After the authentication process, the cloud controller maintains the blockchain to protect the data and signatures of the users by generating the hash in blocks. An optimal hash generation is performed using the SHA-256 approach in the blockchain. The generated hash value, encrypted data and timestamp are stored in each block to provide more security. Finally, blockchain validation is performed using the proof of authority (PoA) approach.
引用
收藏
页码:2683 / 2702
页数:20
相关论文
共 50 条
  • [21] Security enhancement of the access control scheme in IoMT applications based on fuzzy logic processing and lightweight encryption
    El-Banby, Ghada M.
    Elazm, Lamiaa A. Abou
    El-Shafai, Walid
    El-Bahnasawy, Nirmeen A.
    El-Samie, Fathi E. Abd
    Elazm, Atef Abou
    Siam, Ali I.
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (01) : 435 - 454
  • [22] Security enhancement of the access control scheme in IoMT applications based on fuzzy logic processing and lightweight encryption
    Ghada M. El-Banby
    Lamiaa A. Abou Elazm
    Walid El-Shafai
    Nirmeen A. El-Bahnasawy
    Fathi E. Abd El-Samie
    Atef Abou Elazm
    Ali I. Siam
    Complex & Intelligent Systems, 2024, 10 : 435 - 454
  • [23] Improving cloud security by enhanced HASBE using hybrid encryption scheme
    Poornima, B.
    Rajendran, T.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 312 - 314
  • [24] A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
    Du, Haorui
    Chen, Jianhua
    Lin, Fei
    Peng, Cong
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [25] IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing
    Zheng, Tiange
    Wu, Junhua
    Li, Guangshun
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [26] IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing
    Tiange Zheng
    Junhua Wu
    Guangshun Li
    Journal of Cloud Computing, 12
  • [27] Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing
    Yan, Xixi
    Feng, Suwei
    Tang, Yongli
    Yin, Pei
    Deng, Dazhi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [28] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526
  • [29] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [30] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571