Abstract
When concerned about cloud the security has to be the major factor considered by providers of service. Double encryption is a tool used by the storage server to transfer data by the sender and enhancing the security. The first key performs the identification of the receiver or public key at sender side to generate first-level cipher-text. The other key is stored in the security device issued by SDI (security device issuer) shared with cloud storage systems to originate second-level cipher-text. In the proposed scheme, a file in the cloud is uploaded by the sender and encrypts using the public key, and stores it in the cloud. File in the cloud is visible to the people. Only after the execution of two-step process receiver will be able to access the file. When the user has logged into the application by scanning the QR code in the cloud, the data is sent to the mobile application. As the user passes these step, the shared document is decrypted using a key generated by key generator and user can download the shared file. For each step utmost three attempts are provided, the user will be locked if the user is unable to login during these attempts. A notification facility which enables the user to notify an alert message through e-mail to the concerned user if they exceed more than two attempts or any intruder is trying to access the file is provided. Performance of the system in the cloud environment is analyzed. We present that, encrypted message is sent by a sender to a receiver such that only the receiver’s identity is known by the sender and no other information regarding the data to be accessed. To decrypt the cipher text receiver should perform two-steps. User’s secret key is in the computer and personal security device is connected to it. It is tedious to handle with decrypting the cipher text without either of the above two. This device is revoked In case the security of device is breached. It is not possible to decrypt the cipher text by cloud server.
Similar content being viewed by others
References
Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers,65(6), 1992–2004.
Wang, H., He, D., & Tang, S. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transactions on Information Forensics and Security,11(6), 1165–1176.
Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484–497 (2016).
Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security,11(6), 1265–1277.
Tang, S., Li, X., Huang, X., Xiang, Y., & Xu, L. (2016). Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Transactions on Computers,65(7), 2325–2331.
Bhavana, A., Alekhya, V., Deepak, K., & Sreenivas, V. (2013). Password authentication system for cloud environment. International Journal of Advanced Computer Science and Information Technology, 2(1), 29–33.
Dinesha, H. A., & Agrawal, V. K. (2012). Multi-dimensional password generation technique for accessing cloud services. International Journal on Cloud Computing: Services and Architecture, 2(3), 31–39.
Mhatre, M. V., & Shaikh, M. Z. (2015). Key-aggregate cryptosystem for scalable data sharing in cloud storage. International Journal of Advanced Research in Computer Science and Software Engineering, 5(7), 1280–1284.
Panse, D., & Haritha, P. (2014). Multi-factor authentication in cloud computing for data storage security. International Journal of Advanced Research in Computer Science and Software Engineering, 4(8), 629–634.
Wang, C., Wang, Q., Ren, K., & Lou, W. (2011). Towards secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing,5(2), 220–232.
Zhu, Y., Ahn, G. J., Hu, H., Yau, S. S., An, H. G., & Chen, S. (2013). Dynamic audit services for outsourced storage in clouds. IEEE Transactions on Services Computing,6, 227–238.
Balkrishnan, S., Saranya, G., Shobana, S., & Karthikeyan, S. (2012). Introducing effective third party auditing (TPA) for data storage security in cloud. International Journal of computer science and Technology, 2(2). ISSN 2229-4333 (Print)|ISSN: 0976-8491 (online).
Jachak, K. B., Korde, S. K., Ghorpade, P. P., & Gagare, G. J. (2012). Homomorphic Authentication with random masking technique ensuring privacy and security in cloud computing. BioinfoSecurity Informatics 2–2, 49–52. ISSN 2249-9423, 12.
Yuan, J., & Yu, S. (2013). Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of ACM ASIACCS-SCC’13.
Libert, B., & Vergnaud, D. (2011). Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Transactions on Information Theory,57(3), 1786–1802.
Chu, K., Chow, S. S. M., Tzeng, W.-G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems,25(2), 468–477.
Latha, K., & Sheela, T. (2019). Block based data security and data distribution on multi cloud environment. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01395-y.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Latha, K., Sheela, T. Security Scheme in Cloud System Using Hyper Elliptic Curve and SIFT Technique with QR Code. Wireless Pers Commun 111, 1327–1340 (2020). https://doi.org/10.1007/s11277-019-06917-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06917-7