Skip to main content
Log in

A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks, and unauthorized users get easy data access to the data. Blockchain technology provides better security in the cloud based on its distributed and highly cohesive nature. In order to enhance the block chain based encryption process, the second work intends to propose a blockchain based hybrid optimized cryptography scheme for secure cloud storage. At first, key generation is performed using the ECC approach in the cloud. In cloud user registration, keys and data are needed, and the cloud will provide the user ID. Then, the optimal key selection is performed by using flamingo search optimization (FSO). The public and the private key is selected by using this optimization approach. Afterwards, data encryption is performed using the Elgamal scheme on the owner side. This hybrid lightweight elliptic Elgamal based encryption (HLEEE) approach in key generation and data encryption process increases data security. After the authentication process, the cloud controller maintains the blockchain to protect the data and signatures of the users by generating the hash in blocks. An optimal hash generation is performed using the SHA-256 approach in the blockchain. The generated hash value, encrypted data and timestamp are stored in each block to provide more security. Finally, blockchain validation is performed using the proof of authority (PoA) approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article.

References

  1. Sharma M, Gupta R, Acharya P (2020) Prioritizing the critical factors of cloud computing adoption using multi-criteria decision-making techniques. Glob Bus Rev 21(1):142–161

    Article  Google Scholar 

  2. Maciel P, Dantas J, Melo C, Pereira P, Oliveira F, Araujo J, Matos R (2022) A survey on reliability and availability modeling of edge, fog, and cloud computing. J Reliable Intell Environ 8(3):227–245

    Article  Google Scholar 

  3. Bello SA, Oyedele LO, Akinade OO, Bilal M, Delgado JM, Akanbi LA, Ajayi AO, Owolabi HA (2021) Cloud computing in construction industry: Use cases, benefits and challenges. Autom Constr 122:103441

    Article  Google Scholar 

  4. Chadwick DW, Fan W, Costantino G, De Lemos R, Di Cerbo F, Herwono I, Manea M, Mori P, Sajjad A, Wang XS (2020) A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Futur Gener Comput Syst 102:710–722

    Article  Google Scholar 

  5. Idrees SM, Nowostawski M, Jameel R, Mourya AK (2021) Security aspects of blockchain technology intended for industrial applications. Electronics 10(8):951

    Article  Google Scholar 

  6. Murthy CVB, Shri ML, Kadry S, Lim S (2020) Blockchain based cloud computing: Architecture and research challenges. IEEE Access 8:205190–205205

    Article  Google Scholar 

  7. Kratzke N, Siegfried R (2021) Towards cloud-native simulations–lessons learned from the front-line of cloud computing. J Def Model Simul 18(1):39–58

    Article  Google Scholar 

  8. Attaran M, Woods J (2019) Cloud computing technology: improving small business performance using the Internet. J Small Bus Entrep 31(6):495–519

    Article  Google Scholar 

  9. Domingo-Ferrer J, Farras O, Ribes-González J, Sánchez D (2019) Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput Commun 140:38–60

    Article  Google Scholar 

  10. Heidari A, Navimipour NJ (2021) A new SLA-aware method for discovering the cloud services using an improved nature-inspired optimization algorithm. PeerJ Comput Sci 7:e539

    Article  Google Scholar 

  11. El Kafhali S, El Mir I, Hanini M (2022) Security threats, defense mechanisms, challenges, and future directions in cloud computing. Arch Comput Methods Eng 29(1):223–246

    Article  Google Scholar 

  12. Xue S, Ren C (2019) Security protection of system sharing data with improved CP-ABE encryption algorithm under cloud computing environment. Autom Control Comput Sci 53(4):342–350

    Article  Google Scholar 

  13. Al-Shabi MA (2019) A survey on symmetric and asymmetric cryptography algorithms in information security. Int J Sci Res Publ (IJSRP) 9(3):576–589

    Google Scholar 

  14. Khan IA, Qazi R (2019) Data security in cloud computing using elliptic curve cryptography. Int J Comput Commun Netw 1(1):46–52

    Google Scholar 

  15. Meshram C, Lee CC, Meshram SG, Khan MK (2019) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127–13138

    Article  Google Scholar 

  16. Deverajan GG, Muthukumaran V, Hsu CH, Karuppiah M, Chung YC, Chen YH (2022) Public key encryption with equality test for Industrial Internet of Things system in cloud computing. Trans Emerg Telecommun Technol 33(4):e4202

    Article  Google Scholar 

  17. Nagasubramanian G, Sakthivel RK, Patan R, Gandomi AH, Sankayya M, Balusamy B (2020) Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Comput Appl 32(3):639–647

    Article  Google Scholar 

  18. Zhu X, Shi J, Huang S, Zhang B (2020) Consensus-oriented cloud manufacturing based on blockchain technology: An exploratory study. Pervasive Mob Comput 62:101113

    Article  Google Scholar 

  19. Gupta A, Siddiqui ST, Alam S, Shuaib M (2019) Cloud computing security using blockchain. J Emerg Technol Innov Res (JETIR) 6(6):791–794

    Google Scholar 

  20. Wei P, Wang D, Zhao Y, Tyagi SK, Kumar N (2020) Blockchain data-based cloud data integrity protection mechanism. Futur Gener Comput Syst 102:902–911

    Article  Google Scholar 

  21. Kumar AS, Winster SG, Ramesh R (2021) Efficient sensitivity orient blockchain encryption for improved data security in cloud. Concurr Eng 29(3):249–257

    Article  Google Scholar 

  22. Tahir M, Sardaraz M, Mehmood Z, Muhammad S (2021) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Clust Comput 24(2):739–752

    Article  Google Scholar 

  23. Chinnasamy P, Padmavathi S, Swathy R, Rakesh S (2021) Efficient data security using hybrid cryptography on cloud computing. InInventive Communication and Computational Technologies. Springer, Singapore 537–547

  24. Bermani AK, Murshedi TA, Abod ZA (2021) A hybrid cryptography technique for data storage on cloud computing. J Discret Math Sci Crypt 24(6):1613–1624

    Google Scholar 

  25. Kalia P, Bansal D, Sofat S (2021) Privacy preservation in cloud computing using randomized encoding. Wireless Pers Commun 120(4):2847–2859

    Article  Google Scholar 

  26. Indira N, Devi SR, Kalpana AV (2021) R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment. J Ambient Intell Humaniz Comput 12(5):4643–4654

    Article  Google Scholar 

  27. Zuo Y, Kang Z, Xu J, Chen Z (2021) BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3):1550147721999616

    Article  Google Scholar 

  28. Arunkumar B, Kousalya G (2020) Blockchain-based decentralized and secure lightweight e-health system for electronic health records. InIntelligent Systems, Technologies and Applications. Springer, Singapore 273–289

  29. Zhiheng W, Jianhua L (2021) Flamingo search algorithm: A new swarm intelligence optimization algorithm. IEEE Access 9:88564–88582

    Article  Google Scholar 

Download references

Funding

None.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Pranav Shrivastava.

Ethics declarations

Ethical Approval

This article contains no studies with human participants or animals performed by authors.

Consent to participate

All authors have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent to publish this submitted article.

Conflict of Interest

Authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shrivastava, P., Alam, B. & Alam, M. A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing. Multimed Tools Appl 83, 2683–2702 (2024). https://doi.org/10.1007/s11042-023-17040-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17040-y

Keywords

Navigation