Skip to main content
Log in

Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user’s routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

The authors confirm that the data supporting the findings of this study are available within the article and its supplementary materials.

References

  1. Park, J.H., Park, J.H.: Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(8), 164 (2017)

    Article  Google Scholar 

  2. Zhang, Y., Deng, R.H., Liu, X., Zheng, D.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)

    Article  MathSciNet  Google Scholar 

  3. Sadhu, R.B., Subarna, S.: BSS: Blockchain Security over Software Defined Network, International Conference on Computing, Communication and Automation (ICCCA), IEEE (2017)

  4. Sharma, S.G., Ahuja, L., Goyal, D.P.: Building secure infrastructure for cloud computing using blockchain. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS) IEEE, pp. 1985–1988. (2018)

  5. Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE, pp. 180–184. (2015)

  6. Li, Z., Barenji, A.V., Huang, G.Q.: Toward a blockchain cloud manufacturing system as a peer-to-peer distributed network platform. Robot. Comput. Integr. Manuf. 54, 133–144 (2018)

    Article  Google Scholar 

  7. Meng, W., Tischhauser, E., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access (2018). https://doi.org/10.1109/ACCESS.2018.2799854

    Article  Google Scholar 

  8. Lin, Q., Yan, H., Huang, Z., Chen, W., Shen, J., Tang, Y.: An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access (2018). https://doi.org/10.1109/ACCESS.2018.2809426

    Article  Google Scholar 

  9. Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)

    Article  Google Scholar 

  10. Hassan, M.M., Alelaiwi, A., Alamri, A.: A dynamic and efficient coalition formation game in cloud federation for multimedia applications. In: Proceedings of the International Conference on Grid Computing and Applications. 71 (2015)

  11. Esposito, C., De Santis, A., Tortora, G., Chang, H., Choo, K.-K.R.: Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5(1), 31–37 (2018)

    Article  Google Scholar 

  12. Chen, H., An, B., Niyato, D., Soh, Y.C., Miao, C.: Workload factoring and resource sharing via joint vertical and horizontal cloud federation networks. IEEE J. Sel. Areas Commun. 35(3), 557–570 (2017)

    Article  Google Scholar 

  13. Ray, B., Saha, A., Khatua, S., Roy, S.: Quality and profit assured trusted cloud federation formation: game theory-based approach. IEEE Trans. Serv. Comput. 14(3), 805–819 (2018)

    Article  Google Scholar 

  14. Bairagi, A.K., Alam, M.G.R., Talukder, A., Nguyen, T.H., Hong, C.S., et al.: An overlapping coalition formation approach to maximize payoffs in cloud computing environment. In: 2016 International Conference on Information Networking, pp. 324–329 (2016)

  15. Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A, Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), IEEE, p. 458–467 (2017)

  16. Taghavi, M., Bentahar, J., Otrok, H., Bakhtiyari, K.: Cloudchain: a blockchain-based coopetition differential game model for cloud computing. In: International Conference on Service-Oriented Computing, pp. 146–161. Springer, Cham (2018)

    Google Scholar 

  17. Mayuranathan, M., Murugan, M., Dhanakoti, V.: Enhanced security in cloud applications using emerging blockchain security algorithm. J. Ambient Intell. Hum. Comput. 12, 1–3 (2020)

    Google Scholar 

  18. Yang, C., Tan, L., Shi, N., Xu, B., Cao, Y., Yu, K.: AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8, 70604–70615 (2020)

    Article  Google Scholar 

  19. Wang, Y., Zhang, A., Zhang, P., Wang, H.: Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access 7, 136704–136719 (2019)

    Article  Google Scholar 

  20. Zhu, L., Wu, Y., Gai, K., Choo, K.K.: Controllable and trustworthy blockchain-based cloud data management. Futur. Gener. Comput. Syst. 91, 527–535 (2019)

    Article  Google Scholar 

  21. Deep, G., Mohana, R., Nayyar, A., Sanjeev Kumar, P., Hossain, E.: Authentication protocol for cloud databases using blockchain mechanism. Sensors 19(20), 4444 (2019)

    Article  Google Scholar 

  22. Zhang, Y., Xu, C., Lin, X., Shen, X.S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923–937 (2019)

    Article  Google Scholar 

  23. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Archit. 102, 101653 (2020)

    Article  Google Scholar 

  24. Rebello, G.A.F., Alvarenga, I.D., Sanz, I.J., Duarte, O.C.M.B.: BSec-NFVO: a blockchain-based security for network function virtualization orchestration. In: ICC 2019–2019 IEEE International Conference on Communications (ICC), pp. 1–6 (2019)

  25. Wei, P.C., Wang, D., Zhao, Y., Tyagi, S.K.S., Kumar, N.: Blockchain data-based cloud data integrity protection mechanism. Future Gener. Comput. Syst. 102, 902–911 (2020)

    Article  Google Scholar 

  26. Cao, S., Zhang, G., Liu, P., Zhang, X., Neri, F.: Cloud-assisted secure eHealth systems for tamper-proofing EHR via Blockchain. Inf. Sci. 485, 427–440 (2019)

    Article  Google Scholar 

  27. Tan, X., Zhang, J., Zhang, Y., Qin, Z., Ding, Y., Wang, X.: A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network. Tsinghua Sci. Technol. 26(1), 36–47 (2020)

    Article  Google Scholar 

  28. Sandhu, A.K.: Big data with cloud computing: discussions and challenges. Big Data Min. Anal. 5(1), 32–40 (2021)

    Article  Google Scholar 

  29. Li, F., Yu, X., Ge, R., Wang, Y., Cui, Y., Zhou, H.: BCSE: blockchain-based trusted service evaluation model over big data. Big Data Min. Anal. 5(1), 1–14 (2021)

    Article  Google Scholar 

  30. Zhang, R., Hu, Z.: Encryption method for blockchain based data for safe transmission using fuzzy algorithm. IETE J. Res. (2022). https://doi.org/10.1080/03772063.2022.2030813

    Article  Google Scholar 

  31. Jalasri, M., Lakshmanan, L.: Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm. Clust. Comput. (2022). https://doi.org/10.1007/s10586-022-03606-2

    Article  Google Scholar 

  32. Tu, Y., Yang, G., Wang, J., Qingjian, Su.: A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. Clust. Comput. 24(1), 225–247 (2021)

    Article  Google Scholar 

  33. Devmane, V., Lande, B.K., Joglekar, J., Hiran, D.: Preserving data security in cloud environment using an adaptive homomorphic blockchain technique. Arab. J. Sci. Eng. 47, 1–14 (2022)

    Article  Google Scholar 

  34. Samy, I., Antony, A., Safish Mary, M.: Secure data transmission in cloud computing using std-rsa with eslurnn data classification and blockchain based user authentication system. (2022). https://www.researchsquare.com/article/rs-1724672/v1

  35. Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Blockchain for secure ehrs sharing of mobile cloud-based e-health systems. IEEE Access 7, 66792–66806 (2019)

    Article  Google Scholar 

  36. Ying, Z., Wei, L., Li, Q., Liu, X., Cui, J.: A lightweight policy preserving EHR sharing scheme in the cloud. IEEE Access 6, 53698–53708 (2018)

    Article  Google Scholar 

  37. Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D.: Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp. 1–5. (2017)

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. BA and MA, motivated the research direction and provided academic support to conduct this research work. Material preparation, data collection and analysis were performed by PS. The first draft of the manuscript was written by PS and all authors commented on previous versions of the manuscript. All authors have read and approved the final manuscript.

Corresponding author

Correspondence to Pranav Shrivastava.

Ethics declarations

Competing interests

The authors have no relevant financial or non-financial interests to disclose.

Informed consent

All authors agree with the content and we all gave explicit consent to submit. We also declare that no consent was needed from any authority for getting this work is submitted.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shrivastava, P., Alam, B. & Alam, M. Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud. Cluster Comput 26, 3673–3688 (2023). https://doi.org/10.1007/s10586-022-03777-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03777-y

Keywords

Navigation