A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

被引:3
|
作者
Shrivastava, Pranav [1 ]
Alam, Bashir [1 ]
Alam, Mansaf [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Jamia Millia Islamia, Dept Comp Sci, New Delhi 110025, India
关键词
Blockchain technology; Hybrid lightweight data encryption; Cloud computing; Optimization; Cryptographic hashing; Proof of authority; ARCHITECTURE;
D O I
10.1007/s11042-023-17040-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks, and unauthorized users get easy data access to the data. Blockchain technology provides better security in the cloud based on its distributed and highly cohesive nature. In order to enhance the block chain based encryption process, the second work intends to propose a blockchain based hybrid optimized cryptography scheme for secure cloud storage. At first, key generation is performed using the ECC approach in the cloud. In cloud user registration, keys and data are needed, and the cloud will provide the user ID. Then, the optimal key selection is performed by using flamingo search optimization (FSO). The public and the private key is selected by using this optimization approach. Afterwards, data encryption is performed using the Elgamal scheme on the owner side. This hybrid lightweight elliptic Elgamal based encryption (HLEEE) approach in key generation and data encryption process increases data security. After the authentication process, the cloud controller maintains the blockchain to protect the data and signatures of the users by generating the hash in blocks. An optimal hash generation is performed using the SHA-256 approach in the blockchain. The generated hash value, encrypted data and timestamp are stored in each block to provide more security. Finally, blockchain validation is performed using the proof of authority (PoA) approach.
引用
收藏
页码:2683 / 2702
页数:20
相关论文
共 50 条
  • [31] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
    Li, Jian
    Chen, Sicong
    Song, Danjie
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227
  • [32] Hybrid encryption algorithms in cloud computing
    Guo, Ping
    Su, Liping
    Ning, Lijiang
    Dan, Guangxiang
    Information Technology Journal, 2013, 12 (14) : 3015 - 3019
  • [33] Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
    Tan, Syh-Yuan
    Yeow, Kin-Woon
    Hwang, Seong Oun
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04): : 6384 - 6395
  • [34] Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems
    Abiodun, Moses Kazeem
    Imoize, Agbotiname Lucky
    Awotunde, Joseph Bamidele
    Lee, Cheng-Chi
    Adeniyi, Abidemi Emmanuel
    Chioma, Ugbaja
    Li, Chun-Ta
    JOURNAL OF LIBRARY AND INFORMATION STUDIES, 2023, 21 (02): : 1 - 26
  • [35] Cloud Computing Security by Integrating Classical Encryption
    Goodarzi, Koorosh
    Karimi, Abbas
    MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 : 320 - 326
  • [36] Massive Data Hybrid Encryption Algorithm Based on Cloud Computing
    Yang, Ersong
    You, Lin
    Wu, Zhendong
    Yu, Wangke
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1864 - 1867
  • [37] Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
    Gunjal, Yogita S.
    Gunjal, Mahesh S.
    Tambe, Avinash R.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 187 - 190
  • [38] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [39] BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
    Zuo, Yuting
    Kang, Zhaozhe
    Xu, Jian
    Chen, Zhide
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (03)
  • [40] Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known-Plaintext Attack
    Babenko, Mikhail
    Chervyakov, Nikolay
    Radchenko, Gleb
    Tchernykh, Andrei
    Navaux, Philippe O. A.
    Kucherov, Nikolay
    Deryabin, Maxim
    Svyatkin, Viktor
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 270 - 274