research-article
Authors: Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, + 3, Badria Sulaiman Alfurhood, Anitha Premkumar Academic Editor: Wanli Wen (Less)
IET Information Security, Volume 2024
Published: 31 July 2024 Publication History
Metrics
Total Citations0Total Downloads0Last 12 Months0
Last 6 weeks0
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
- View Options
- References
- Media
- Tables
- Share
Abstract
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. It includes keeping data private and safe across online-based infrastructure, applications, and platforms. Securing these systems involves the efforts of cloud providers and the clients that use them, whether an individual, small-to-medium business, or enterprise uses. Security is essential for protecting data and cloud resources from malicious activity. A cloud service provider is utilized to provide secure data storage services. Data integrity is a critical issue in cloud computing. However, using data storage services securely and ensuring data integrity in these cloud servers remain an issue for cloud users. We introduce a unique piecewise regressive Kupyna cryptographic hash blockchain (PRKCHB) technique to secure cloud services with higher data integrity to solve these issues. The proposed PRKCHB method involves user registration, cryptographic hash blockchain, and regression analysis. Initially, the registration process for each cloud user is performed. After registering user particulars, Davies–Meyer Kupyna’s cryptographic hash blockchain generates the hash value of data in each block. When a user requests data from the server, a piecewise regression function is used to validate their identity. Furthermore, the Gaussian kernel function recognizes authorized or unauthorized users for secure cloud information transmission. The regression function results in original data by enhanced integrity in the cloud. An analysis of the proposed PRKCHB technique evaluates different existing methods implemented in Python. The results contain different metrics: data confidentiality rate, data integrity rate, authentication time, storage overhead, and execution time. Compared to conventional techniques, findings corroborate the assertion that the proposed PRKCHB technique improves data confidentiality and integrity by up to 9% and 9% while lowering storage overhead, authentication time, and execution time by 10%, 12%, and 12%.
References
[1]
E. B. Sifah, Q. Xia, K. O.-B. O. Agyekum, H. Xia, A. Smahi, and J. andGao., “A blockchain approach to ensuring provenance to outsourced cloud data in a sharing ecosystem,” IEEE Systems Journal, vol. 16, no. 1, pp. 1673–1684, 2022.
[2]
S. I. Shyla and S. S. Sujatha, “Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, pp. 151–163, 2021.
[3]
M. A. Nezhad, H. Barati, and A. Barati, “An authentication-based secure data aggregation method in internet of things,” ournal of Grid Computing, vol. 20, pp. 20–29, 2022.
Digital Library
[4]
I. Gupta, A. K. Singh, C.-N. Lee, and R. Buyya, “Secure data storage and sharing techniques for data protection in cloud environments: a systematic review, analysis, and future directions,” IEEE Access, vol. 10, pp. 71247–71277, 2022.
[5]
Q. Zhang, S. Wang, D. Zhang, J. Wang, and Y. Zhang, “Time and attribute based dual access control and data integrity verifiable scheme in cloud computing applications,” IEEE Access, vol. 7, pp. 137594–137607, 2019.
[6]
S. Belguith, N. Kaaniche, M. Laurent, and A. J. R. Attia, “Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds,” Journal of Parallel and Distributed Computing, vol. 135, pp. 1–20, 2020.
Digital Library
[7]
S. Wang, X. Wang, and Y. Zhang, “A secure cloud storage framework with access control based on blockchain,” IEEE Access, vol. 7, pp. 112713–112725, 2019.
[8]
N. H. Sultan, N. Kaaniche, M. Laurent, and F. A. Barbhuiya, “Authorized keyword search over outsourced encrypted data in cloud environment,” IEEE Transactions on Cloud Computing, vol. 10, no. 1, pp. 216–233, 2022.
[9]
A. M. Sauber, P. M. El-Kafrawy, A. F. Shawish, M. A. Amin, and I. M. Hagag, “A new secure model for data protection over cloud computing,” Computational Intelligence and Neuroscience, vol. 2021, 11 pages, 2021.
Digital Library
[10]
F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena, “Security by design for big data frameworks over cloud computing,” IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3676–3693, 2022.
[11]
F. Thabit, S. Alhomdy, and S. Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functionsl,” International Journal of Intelligent Networks, vol. 2, pp. 18–33, 2021.
[12]
S. Peng, Z. Cai, W. Liu, W. Wang, G. Li, Y. Sun, and L. Zhu, “Blockchain data secure transmission method based on hom*omorphic encryption,” Computational Intelligence and Neuroscience, vol. 2022, 9 pages, 2022.
Digital Library
[13]
I. A. A. Samy and M. S. Mary, “Secure data transmission in cloud computing using std-rsa with eslurnn data classification and blockchain based user authentication system,” Research Square, pp. 1–21, 2022.
[14]
R. Awadallah, A. Samsudin, J. S. Teh, and M. Almazrooie, “An integrated architecture for maintaining security in cloud computing based on blockchain,” IEEE Access, vol. 9, pp. 69513–69526, 2021.
[15]
S. Son, J. Lee, M. Kim, S. Yu, A. K. Das, and Y. Park, “Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain,” IEEE Access, vol. 8, pp. 192177–192191, 2020.
[16]
Y. M. Gajmal and R. Udayakumar, “Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system,” Information Security Journal: A Global Perspective, vol. 31, no. 4, pp. 451–465, 2022.
[17]
I. B. Franklin, M. P. A. Jerald, and R. Bhuvaneswari, “Machine learning-based trust management in cloud using blockchain technology,” S.N.Computer Science, vol. 3, 2022.
Digital Library
[18]
Y.-S. Jeong and B.-T. Ahn, “An efficient management scheme of blockchain-based cloud user information using probabilistic weighting,” The Journal of Supercomputing, vol. 77, no. 4, pp. 3339–3358, 2021.
Digital Library
[19]
H. Pajooh, H. M. Rashid, F. Alam, and S. Demidenko, “Multi-layer blockchain-based security architecture for internet of things,” Sensors, vol. 21, no. 3, 2021.
[20]
O. A. Khashan, S. Alamri, W. Alomoush, M. K. Alsmadi, S. Atawneh, and U. Mir, “Blockchain-based decentralized authentication model for IoT-based e-learning and educational environments,” Computers, Materials & Continua, vol. 75, no. 2, pp. 3133–3158, 2023.
[21]
S. Wong, J.-K.-W. Yeung, Y.-Y. Lau, and J. So, “Technical sustainability of cloud-based blockchain integrated with machine learning for supply chain management,” Sustainability, vol. 13, no. 15, 2021.
[22]
S. Kaur, G. Kaur, and M. Shabaz, “A secure two-factor authentication framework in cloud computing,” Security and Communication Networks, vol. 2022, 9 pages, 2022.
Digital Library
[23]
A. Jyoti and R. K. Chauhan, “A blockchain and smart contract-based data provenance collection and storing in cloud environment,” Wireless Networks, vol. 28, no. 1, pp. 1541–1562, 2022.
Digital Library
[24]
G. Ragu and S. Ramamoorthy, “Blockchain—based cloud forensics architecture for privacy leakage prediction with cloud,” Healthcare Analytics, vol. 4, 2023.
[25]
A. Rahman, M. J. Islam, S. S. Band, G. Muhammad, K. Hasan, and P. Tiwari, “Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT,” Digital Communications and Networks, vol. 9, no. 2, pp. 411–421, 2023.
[26]
C. Qin, L. Wu, W. Meng, Z. Xu, S. Li, and H. Wang, “A privacy-preserving blockchain-based tracing model for virus-infected people in cloud,” Expert Systems with Applications, vol. 211, 2023.
Digital Library
[27]
J. A. Alzubi, “Blockchain-based lamport merkle digital signature: authentication tool in IoT healthcare,” Computer Communications, vol. 170, pp. 200–208, 2021.
[28]
H. Zhang, P. Gao, J. Yu, J. Lin, and N. N. Xiong, “Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression,” EEE Transactions on Network Science and Engineering, vol. 9, no. 6, pp. 3956–3967, 2022.
[29]
B. Sowmiya, E. Poovammal, K. Ramana, S. Singh, and B. Yoon, “Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server,” IEEE Access, vol. 9, pp. 138245–138253, 2021.
[30]
A. Sharma and U. K. Singh, “Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms,” Global Transitions Proceedings, vol. 3, no. 1, pp. 243–250, 2022.
[31]
R. Gupta and A. K. Singh, “A differential approach for data and classification service based privacy-preserving machine learning model in cloud environment,” New Generation Computing, vol. 40, no. 3, pp. 737–764, 2022.
Digital Library
[32]
R. Premkumar and S. S. Priya, “Service constraint NCBQ trust orient secure transmission with iot devices for improved data security in cloud using blockchain,” Measurement: Sensors, vol. 24, 2022.
[33]
J. Yu and R. Hao, “Comments on “SEPDP: secure and efficient privacy preserving provable data possession in cloud storage”,” IEEE Transactions on Services Computing, vol. 14, no. 6, pp. 2090–2092, 2021.
[34]
A. A. Movassagh, J. A. Alzubi, M. Gheisari, M. Rahimi, S. Mohan, A. A. Abbasi, and N. Nabipour, “Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 6017–6025, 2023.
[35]
O. A. Alzubi, J. A. Alzubi, M. Alazab, A. Alrabea, A. Awajan, and I. Qiqieh, “Optimized machine learning-based intrusion detection system for fog and edge computing environment,” Electronics, vol. 11, no. 19, 2022.
Index Terms
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Computer systems organization
Architectures
Distributed architectures
Cloud computing
Security and privacy
Cryptography
Key management
Symmetric cryptography and hash functions
Network security
Security protocols
Security services
Access control
Privacy-preserving protocols
Systems security
Distributed systems security
Index terms have been assigned to the content through auto-classification.
Recommendations
- A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified ...
Read More
- Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained access control, we propose a secure electronic health record (EHR) system based on attribute-based cryptosystem and blockchain technology. In our system, we ...
Read More
- Secure searches in the cloud
Cloud security is a huge concern when users and enterprises consider to deploy cloud computing services. This article mainly presented an important aspect of cloud security which is called searchable encryption. Searchable encryption is a scheme that ...
Read More
Comments
Information & Contributors
Information
Published In
IET Information Security Volume 2024, Issue
2024
536 pages
EISSN:1751-8717
Issue’s Table of Contents
Copyright © 2024 Selvakumar Shanmugam et al.
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Published: 31 July 2024
Qualifiers
- Research-article
Contributors
Other Metrics
View Article Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
Total Citations
Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 28 Aug 2024
Other Metrics
View Author Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Publication
Media
Figures
Other
Tables