Abstract
The concept of cloud envisioned cyber-physical systems is a practical technology that allows users to interact with each other while transferring data in the cloud. In cyber-physical systems, cloud storage utilizes data deduplication techniques to improve the performance of its applications. However, this method exposes sensitive data and causes security risks. Various research related to cloud storage has been conducted. Despite the advantages of this technology, it lacks the necessary security features and high performance. In the proposed method, a victim's virtual computer is moved to the cloud without interfering with the other processes running on the network. It protects against the attacks caused by encrypting the data with a cryptographically binding hash. Post-Quantum Cryptographic techniques, such as lightweight Multi-Extractable Somewhere Statistically Binding and Learning With Error authenticate data sharing protocols (MESSB–LWE), have been used. These allow for safe data sharing across geographically scattered physical devices and clients with lightweight concepts. The numerical analysis of MESSB–LWE is carried out in different stages, and the results show that it has incredible performance and practicality when compared to the literature. Finally, the authors have explored a couple of factors that should be considered for future research work in authentication for securing remote systems in the cloud environment.




Similar content being viewed by others
References
Chiesa A, Ma F, Spooner N, Zhandry M (2021) Post-quantum succinct arguments. IACR Cryptol ePrint Arch 2021:334
Dominique Unruh. Quantum proofs of knowledge. In Pointcheval D and Johansson T, (eds), Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, Apr 15–19, 2012. Proceedings, vol. 7237 of Lecture Notes in Computer Science, pp. 135–152. Springer, 2012.
He D, Kumar N, Lee J-H, Sherratt RS (2014) Enhanced three factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37
Cheng H, Rong C, Tan Z, Zeng Q (2012) Identity based encryption and biometric authentication scheme for secure data access in cloud computing. Chin J Electron 21(2):254–259
Hafizul Islam SK et al (2017) An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ-Comput Inform Sci 29(3):311–324
Yang J, Wang H, Wang J, Tan C, Dingguo Yu (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Networks 6(7):1033–1040
Han J, Susilo W, Yi Mu (2013) Identity-based data storage in cloud computing. Futur Gener Comput Syst 29(3):673–681
Kalai YT, Vaikuntanathan V, Zhang RY (2021) Somewhere statistical soundness, post-quantum security, and SNARGs. In: Nissim K, Waters B (eds) Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, Nov 8–11, 2021, Proceedings, Part I. Springer, Cham
Karati A et al (2018) Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment. IEEE Trans Cloud Comput 9(1):318–330
Pu Q, Zhao X, Ding J (2009) Cryptanalysis of a three-party authenticated key exchange protocol using elliptic curve cryptography. In: Proceedings of the International Conference on Research Challenges in Computer Science, pp 7–10.
Tan Z (2010) An enhanced three-party authentication key exchange protocol for mobile commerce environments. J Commun 5(5):436–443
Tan Z (2010) An Improvement on a three party authentication key exchange protocol using elliptic curve cryptography. J Converg Inf Technol 5(4):120–129
Yang JH, Chang CC (2009) An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile commerce environments. J Syst Softw 82:1497–1502
Zhou Z, and Huang D. (2012) Efficient and secure data storage operations for mobile cloud computing. In Proceedings of the 8th International Conference on Network and Service Management, pp 37–45. International Federation for Information Processing
Choudhuri AR, Jain A, Jin Z (2021) “SNARGs for P from LWE.” IACR Cryptol. ePrint Arch 808
Bartusek J et al (2019) On the (in) security of Kilian-based SNARGs. In: Hofheinz D, Rosen A (eds) Theory of Cryptography Conference. Springer, Cham
Hubácek P, and Wichs D (2015) On the communication complexity of secure function evaluation with long output. In Tim Roughgarden, editor, Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS 2015, Rehovot, Israel, January 11–13, 2015, pp 163–172. ACM, 2015. 2, 7, 13, 15
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Salvakkam, D.B., Pamula, R. MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage. J Supercomput 78, 16364–16393 (2022). https://doi.org/10.1007/s11227-022-04497-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04497-1