Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services (2024)

research-article

Authors: Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, + 3, Badria Sulaiman Alfurhood, Anitha Premkumar Academic Editor: Wanli Wen (Less)

IET Information Security, Volume 2024

Published: 31 July 2024 Publication History

Metrics

Total Citations0Total Downloads0

Last 12 Months0

Last 6 weeks0

New Citation Alert added!

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

Manage my Alerts

New Citation Alert!

Please log in to your account

    • View Options
    • References
    • Media
    • Tables
    • Share

Abstract

Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. It includes keeping data private and safe across online-based infrastructure, applications, and platforms. Securing these systems involves the efforts of cloud providers and the clients that use them, whether an individual, small-to-medium business, or enterprise uses. Security is essential for protecting data and cloud resources from malicious activity. A cloud service provider is utilized to provide secure data storage services. Data integrity is a critical issue in cloud computing. However, using data storage services securely and ensuring data integrity in these cloud servers remain an issue for cloud users. We introduce a unique piecewise regressive Kupyna cryptographic hash blockchain (PRKCHB) technique to secure cloud services with higher data integrity to solve these issues. The proposed PRKCHB method involves user registration, cryptographic hash blockchain, and regression analysis. Initially, the registration process for each cloud user is performed. After registering user particulars, Davies–Meyer Kupyna’s cryptographic hash blockchain generates the hash value of data in each block. When a user requests data from the server, a piecewise regression function is used to validate their identity. Furthermore, the Gaussian kernel function recognizes authorized or unauthorized users for secure cloud information transmission. The regression function results in original data by enhanced integrity in the cloud. An analysis of the proposed PRKCHB technique evaluates different existing methods implemented in Python. The results contain different metrics: data confidentiality rate, data integrity rate, authentication time, storage overhead, and execution time. Compared to conventional techniques, findings corroborate the assertion that the proposed PRKCHB technique improves data confidentiality and integrity by up to 9% and 9% while lowering storage overhead, authentication time, and execution time by 10%, 12%, and 12%.

References

[1]

E. B. Sifah, Q. Xia, K. O.-B. O. Agyekum, H. Xia, A. Smahi, and J. andGao., “A blockchain approach to ensuring provenance to outsourced cloud data in a sharing ecosystem,” IEEE Systems Journal, vol. 16, no. 1, pp. 1673–1684, 2022.

[2]

S. I. Shyla and S. S. Sujatha, “Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, pp. 151–163, 2021.

[3]

M. A. Nezhad, H. Barati, and A. Barati, “An authentication-based secure data aggregation method in internet of things,” ournal of Grid Computing, vol. 20, pp. 20–29, 2022.

Digital Library

[4]

I. Gupta, A. K. Singh, C.-N. Lee, and R. Buyya, “Secure data storage and sharing techniques for data protection in cloud environments: a systematic review, analysis, and future directions,” IEEE Access, vol. 10, pp. 71247–71277, 2022.

[5]

Q. Zhang, S. Wang, D. Zhang, J. Wang, and Y. Zhang, “Time and attribute based dual access control and data integrity verifiable scheme in cloud computing applications,” IEEE Access, vol. 7, pp. 137594–137607, 2019.

[6]

S. Belguith, N. Kaaniche, M. Laurent, and A. J. R. Attia, “Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds,” Journal of Parallel and Distributed Computing, vol. 135, pp. 1–20, 2020.

Digital Library

[7]

S. Wang, X. Wang, and Y. Zhang, “A secure cloud storage framework with access control based on blockchain,” IEEE Access, vol. 7, pp. 112713–112725, 2019.

[8]

N. H. Sultan, N. Kaaniche, M. Laurent, and F. A. Barbhuiya, “Authorized keyword search over outsourced encrypted data in cloud environment,” IEEE Transactions on Cloud Computing, vol. 10, no. 1, pp. 216–233, 2022.

[9]

A. M. Sauber, P. M. El-Kafrawy, A. F. Shawish, M. A. Amin, and I. M. Hagag, “A new secure model for data protection over cloud computing,” Computational Intelligence and Neuroscience, vol. 2021, 11 pages, 2021.

Digital Library

[10]

F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena, “Security by design for big data frameworks over cloud computing,” IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3676–3693, 2022.

[11]

F. Thabit, S. Alhomdy, and S. Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functionsl,” International Journal of Intelligent Networks, vol. 2, pp. 18–33, 2021.

[12]

S. Peng, Z. Cai, W. Liu, W. Wang, G. Li, Y. Sun, and L. Zhu, “Blockchain data secure transmission method based on hom*omorphic encryption,” Computational Intelligence and Neuroscience, vol. 2022, 9 pages, 2022.

Digital Library

[13]

I. A. A. Samy and M. S. Mary, “Secure data transmission in cloud computing using std-rsa with eslurnn data classification and blockchain based user authentication system,” Research Square, pp. 1–21, 2022.

[14]

R. Awadallah, A. Samsudin, J. S. Teh, and M. Almazrooie, “An integrated architecture for maintaining security in cloud computing based on blockchain,” IEEE Access, vol. 9, pp. 69513–69526, 2021.

[15]

S. Son, J. Lee, M. Kim, S. Yu, A. K. Das, and Y. Park, “Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain,” IEEE Access, vol. 8, pp. 192177–192191, 2020.

[16]

Y. M. Gajmal and R. Udayakumar, “Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system,” Information Security Journal: A Global Perspective, vol. 31, no. 4, pp. 451–465, 2022.

[17]

I. B. Franklin, M. P. A. Jerald, and R. Bhuvaneswari, “Machine learning-based trust management in cloud using blockchain technology,” S.N.Computer Science, vol. 3, 2022.

Digital Library

[18]

Y.-S. Jeong and B.-T. Ahn, “An efficient management scheme of blockchain-based cloud user information using probabilistic weighting,” The Journal of Supercomputing, vol. 77, no. 4, pp. 3339–3358, 2021.

Digital Library

[19]

H. Pajooh, H. M. Rashid, F. Alam, and S. Demidenko, “Multi-layer blockchain-based security architecture for internet of things,” Sensors, vol. 21, no. 3, 2021.

[20]

O. A. Khashan, S. Alamri, W. Alomoush, M. K. Alsmadi, S. Atawneh, and U. Mir, “Blockchain-based decentralized authentication model for IoT-based e-learning and educational environments,” Computers, Materials & Continua, vol. 75, no. 2, pp. 3133–3158, 2023.

[21]

S. Wong, J.-K.-W. Yeung, Y.-Y. Lau, and J. So, “Technical sustainability of cloud-based blockchain integrated with machine learning for supply chain management,” Sustainability, vol. 13, no. 15, 2021.

[22]

S. Kaur, G. Kaur, and M. Shabaz, “A secure two-factor authentication framework in cloud computing,” Security and Communication Networks, vol. 2022, 9 pages, 2022.

Digital Library

[23]

A. Jyoti and R. K. Chauhan, “A blockchain and smart contract-based data provenance collection and storing in cloud environment,” Wireless Networks, vol. 28, no. 1, pp. 1541–1562, 2022.

Digital Library

[24]

G. Ragu and S. Ramamoorthy, “Blockchain—based cloud forensics architecture for privacy leakage prediction with cloud,” Healthcare Analytics, vol. 4, 2023.

[25]

A. Rahman, M. J. Islam, S. S. Band, G. Muhammad, K. Hasan, and P. Tiwari, “Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT,” Digital Communications and Networks, vol. 9, no. 2, pp. 411–421, 2023.

[26]

C. Qin, L. Wu, W. Meng, Z. Xu, S. Li, and H. Wang, “A privacy-preserving blockchain-based tracing model for virus-infected people in cloud,” Expert Systems with Applications, vol. 211, 2023.

Digital Library

[27]

J. A. Alzubi, “Blockchain-based lamport merkle digital signature: authentication tool in IoT healthcare,” Computer Communications, vol. 170, pp. 200–208, 2021.

[28]

H. Zhang, P. Gao, J. Yu, J. Lin, and N. N. Xiong, “Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression,” EEE Transactions on Network Science and Engineering, vol. 9, no. 6, pp. 3956–3967, 2022.

[29]

B. Sowmiya, E. Poovammal, K. Ramana, S. Singh, and B. Yoon, “Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server,” IEEE Access, vol. 9, pp. 138245–138253, 2021.

[30]

A. Sharma and U. K. Singh, “Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms,” Global Transitions Proceedings, vol. 3, no. 1, pp. 243–250, 2022.

[31]

R. Gupta and A. K. Singh, “A differential approach for data and classification service based privacy-preserving machine learning model in cloud environment,” New Generation Computing, vol. 40, no. 3, pp. 737–764, 2022.

Digital Library

[32]

R. Premkumar and S. S. Priya, “Service constraint NCBQ trust orient secure transmission with iot devices for improved data security in cloud using blockchain,” Measurement: Sensors, vol. 24, 2022.

[33]

J. Yu and R. Hao, “Comments on “SEPDP: secure and efficient privacy preserving provable data possession in cloud storage”,” IEEE Transactions on Services Computing, vol. 14, no. 6, pp. 2090–2092, 2021.

[34]

A. A. Movassagh, J. A. Alzubi, M. Gheisari, M. Rahimi, S. Mohan, A. A. Abbasi, and N. Nabipour, “Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 6017–6025, 2023.

[35]

O. A. Alzubi, J. A. Alzubi, M. Alazab, A. Alrabea, A. Awajan, and I. Qiqieh, “Optimized machine learning-based intrusion detection system for fog and edge computing environment,” Electronics, vol. 11, no. 19, 2022.

Index Terms

  1. Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

    1. Computer systems organization

      1. Architectures

        1. Distributed architectures

          1. Cloud computing

      2. Security and privacy

        1. Cryptography

          1. Key management

            1. Symmetric cryptography and hash functions

            2. Network security

              1. Security protocols

              2. Security services

                1. Access control

                  1. Privacy-preserving protocols

                  2. Systems security

                    1. Distributed systems security

                Index terms have been assigned to the content through auto-classification.

                Recommendations

                • A Provably Secure Proxy Signature Scheme in Certificateless Cryptography

                  A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified ...

                  Read More

                • Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain

                  To achieve confidentiality, authentication, integrity of medical data, and support fine-grained access control, we propose a secure electronic health record (EHR) system based on attribute-based cryptosystem and blockchain technology. In our system, we ...

                  Read More

                • Secure searches in the cloud

                  Cloud security is a huge concern when users and enterprises consider to deploy cloud computing services. This article mainly presented an important aspect of cloud security which is called searchable encryption. Searchable encryption is a scheme that ...

                  Read More

                Comments

                Information & Contributors

                Information

                Published In

                Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services (1)

                IET Information Security Volume 2024, Issue

                2024

                536 pages

                EISSN:1751-8717

                Issue’s Table of Contents

                Copyright © 2024 Selvakumar Shanmugam et al.

                This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

                Publisher

                John Wiley & Sons, Inc.

                United States

                Publication History

                Published: 31 July 2024

                Qualifiers

                • Research-article

                Contributors

                Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services (2)

                Other Metrics

                View Article Metrics

                Bibliometrics & Citations

                Bibliometrics

                Article Metrics

                • Total Citations

                • Total Downloads

                • Downloads (Last 12 months)0
                • Downloads (Last 6 weeks)0

                Reflects downloads up to 28 Aug 2024

                Other Metrics

                View Author Metrics

                Citations

                View Options

                View options

                Get Access

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                Get this Publication

                Media

                Figures

                Other

                Tables

                Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services (2024)
                Top Articles
                ODYSSEUS THE SOPHIST: On the Birth of Philosophy from the Spirit of Travel Stress
                What is the crime of treason and what does it have to do with ‘El Mayo’ Zambada?
                Lux Nails Columbia Mo
                RS3 Mining Training Guide - 1-99/120 | Gaming Elephant
                0.0Gomovies
                Editado Como Google Translate
                What Does Sybau Mean
                When Does Dtlr Close
                7 Best Character Builds In Nioh 2
                Caldwell Idaho Craigslist
                Strange World Showtimes Near Cmx Downtown At The Gardens 16
                Vonage Support Squad.screenconnect.com
                Pokemon Fire Red Download Pc
                Nearest Walmart Address
                Black Friday 2024, Black Friday 2025 and further
                Craigslist Tools Las Cruces Nm
                Pathfinder 2E Throwing Weapons
                Fragments Of Power Conan Exiles
                Tractorhouse Farm Equipment
                Walking through the Fire: Why nothing stops Jesus’ love for you - Ann Voskamp
                Osrs Toby
                St Paul Pioneer Obituaries Past 30 Days Of
                John Wick 4 Showtimes Near Starlight Whittier Village Cinemas
                San Diego Cars And Trucks Craigslist
                Filmy4Wap Xyz.com 2022
                Bdo Passion Of Valtarra
                Tighe Hamilton Hudson Ma Obituary
                Publix – Supermarkt mit ökologischem Gewissen und exzellentem Service
                Christian Publishers Outlet Rivergate
                Marie Anne Thiebaud 2019
                Proto Ultima Exoplating
                Central Valley growers, undocumented farmworkers condemn Trump's 'emergency'
                Danville Va Active Warrant List
                Projo Sports High School
                Margie's Money Saver Hey Dudes
                Joftens Notes Skyrim
                Wiki Jfk Film
                Unveiling The "Little Princess Poppy Only Fans Leak": Discoveries And Insights Revealed
                Parx Entries For Today
                Richard Sambade Obituary
                Theresa Alone Gofundme
                Black Panther Pitbull Puppy For Sale
                Cibo Tx International Kitchen Schertz Menu
                Craigslist Pelham Al
                Gizmo Ripple Tank Answer Key
                Wrdu Contests
                11 Fascinating Axolotl Facts
                Gaylia puss*r Davis
                Grizzly Expiration Date 2023
                Saratoga Otb Results
                Edible Arrangements Track
                Tetris Google Sites
                Latest Posts
                Article information

                Author: Msgr. Benton Quitzon

                Last Updated:

                Views: 5804

                Rating: 4.2 / 5 (43 voted)

                Reviews: 90% of readers found this page helpful

                Author information

                Name: Msgr. Benton Quitzon

                Birthday: 2001-08-13

                Address: 96487 Kris Cliff, Teresiafurt, WI 95201

                Phone: +9418513585781

                Job: Senior Designer

                Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

                Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.