Abstract
Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user’s routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods.
Similar content being viewed by others
Data availability
The authors confirm that the data supporting the findings of this study are available within the article and its supplementary materials.
References
Park, J.H., Park, J.H.: Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(8), 164 (2017)
Zhang, Y., Deng, R.H., Liu, X., Zheng, D.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)
Sadhu, R.B., Subarna, S.: BSS: Blockchain Security over Software Defined Network, International Conference on Computing, Communication and Automation (ICCCA), IEEE (2017)
Sharma, S.G., Ahuja, L., Goyal, D.P.: Building secure infrastructure for cloud computing using blockchain. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS) IEEE, pp. 1985–1988. (2018)
Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE, pp. 180–184. (2015)
Li, Z., Barenji, A.V., Huang, G.Q.: Toward a blockchain cloud manufacturing system as a peer-to-peer distributed network platform. Robot. Comput. Integr. Manuf. 54, 133–144 (2018)
Meng, W., Tischhauser, E., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access (2018). https://doi.org/10.1109/ACCESS.2018.2799854
Lin, Q., Yan, H., Huang, Z., Chen, W., Shen, J., Tang, Y.: An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access (2018). https://doi.org/10.1109/ACCESS.2018.2809426
Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)
Hassan, M.M., Alelaiwi, A., Alamri, A.: A dynamic and efficient coalition formation game in cloud federation for multimedia applications. In: Proceedings of the International Conference on Grid Computing and Applications. 71 (2015)
Esposito, C., De Santis, A., Tortora, G., Chang, H., Choo, K.-K.R.: Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5(1), 31–37 (2018)
Chen, H., An, B., Niyato, D., Soh, Y.C., Miao, C.: Workload factoring and resource sharing via joint vertical and horizontal cloud federation networks. IEEE J. Sel. Areas Commun. 35(3), 557–570 (2017)
Ray, B., Saha, A., Khatua, S., Roy, S.: Quality and profit assured trusted cloud federation formation: game theory-based approach. IEEE Trans. Serv. Comput. 14(3), 805–819 (2018)
Bairagi, A.K., Alam, M.G.R., Talukder, A., Nguyen, T.H., Hong, C.S., et al.: An overlapping coalition formation approach to maximize payoffs in cloud computing environment. In: 2016 International Conference on Information Networking, pp. 324–329 (2016)
Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A, Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), IEEE, p. 458–467 (2017)
Taghavi, M., Bentahar, J., Otrok, H., Bakhtiyari, K.: Cloudchain: a blockchain-based coopetition differential game model for cloud computing. In: International Conference on Service-Oriented Computing, pp. 146–161. Springer, Cham (2018)
Mayuranathan, M., Murugan, M., Dhanakoti, V.: Enhanced security in cloud applications using emerging blockchain security algorithm. J. Ambient Intell. Hum. Comput. 12, 1–3 (2020)
Yang, C., Tan, L., Shi, N., Xu, B., Cao, Y., Yu, K.: AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8, 70604–70615 (2020)
Wang, Y., Zhang, A., Zhang, P., Wang, H.: Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access 7, 136704–136719 (2019)
Zhu, L., Wu, Y., Gai, K., Choo, K.K.: Controllable and trustworthy blockchain-based cloud data management. Futur. Gener. Comput. Syst. 91, 527–535 (2019)
Deep, G., Mohana, R., Nayyar, A., Sanjeev Kumar, P., Hossain, E.: Authentication protocol for cloud databases using blockchain mechanism. Sensors 19(20), 4444 (2019)
Zhang, Y., Xu, C., Lin, X., Shen, X.S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923–937 (2019)
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Archit. 102, 101653 (2020)
Rebello, G.A.F., Alvarenga, I.D., Sanz, I.J., Duarte, O.C.M.B.: BSec-NFVO: a blockchain-based security for network function virtualization orchestration. In: ICC 2019–2019 IEEE International Conference on Communications (ICC), pp. 1–6 (2019)
Wei, P.C., Wang, D., Zhao, Y., Tyagi, S.K.S., Kumar, N.: Blockchain data-based cloud data integrity protection mechanism. Future Gener. Comput. Syst. 102, 902–911 (2020)
Cao, S., Zhang, G., Liu, P., Zhang, X., Neri, F.: Cloud-assisted secure eHealth systems for tamper-proofing EHR via Blockchain. Inf. Sci. 485, 427–440 (2019)
Tan, X., Zhang, J., Zhang, Y., Qin, Z., Ding, Y., Wang, X.: A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network. Tsinghua Sci. Technol. 26(1), 36–47 (2020)
Sandhu, A.K.: Big data with cloud computing: discussions and challenges. Big Data Min. Anal. 5(1), 32–40 (2021)
Li, F., Yu, X., Ge, R., Wang, Y., Cui, Y., Zhou, H.: BCSE: blockchain-based trusted service evaluation model over big data. Big Data Min. Anal. 5(1), 1–14 (2021)
Zhang, R., Hu, Z.: Encryption method for blockchain based data for safe transmission using fuzzy algorithm. IETE J. Res. (2022). https://doi.org/10.1080/03772063.2022.2030813
Jalasri, M., Lakshmanan, L.: Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm. Clust. Comput. (2022). https://doi.org/10.1007/s10586-022-03606-2
Tu, Y., Yang, G., Wang, J., Qingjian, Su.: A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. Clust. Comput. 24(1), 225–247 (2021)
Devmane, V., Lande, B.K., Joglekar, J., Hiran, D.: Preserving data security in cloud environment using an adaptive homomorphic blockchain technique. Arab. J. Sci. Eng. 47, 1–14 (2022)
Samy, I., Antony, A., Safish Mary, M.: Secure data transmission in cloud computing using std-rsa with eslurnn data classification and blockchain based user authentication system. (2022). https://www.researchsquare.com/article/rs-1724672/v1
Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Blockchain for secure ehrs sharing of mobile cloud-based e-health systems. IEEE Access 7, 66792–66806 (2019)
Ying, Z., Wei, L., Li, Q., Liu, X., Cui, J.: A lightweight policy preserving EHR sharing scheme in the cloud. IEEE Access 6, 53698–53708 (2018)
Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D.: Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp. 1–5. (2017)
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. BA and MA, motivated the research direction and provided academic support to conduct this research work. Material preparation, data collection and analysis were performed by PS. The first draft of the manuscript was written by PS and all authors commented on previous versions of the manuscript. All authors have read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors have no relevant financial or non-financial interests to disclose.
Informed consent
All authors agree with the content and we all gave explicit consent to submit. We also declare that no consent was needed from any authority for getting this work is submitted.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shrivastava, P., Alam, B. & Alam, M. Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud. Cluster Comput 26, 3673–3688 (2023). https://doi.org/10.1007/s10586-022-03777-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03777-y