Skip to main content
Log in

Security Scheme in Cloud System Using Hyper Elliptic Curve and SIFT Technique with QR Code

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

When concerned about cloud the security has to be the major factor considered by providers of service. Double encryption is a tool used by the storage server to transfer data by the sender and enhancing the security. The first key performs the identification of the receiver or public key at sender side to generate first-level cipher-text. The other key is stored in the security device issued by SDI (security device issuer) shared with cloud storage systems to originate second-level cipher-text. In the proposed scheme, a file in the cloud is uploaded by the sender and encrypts using the public key, and stores it in the cloud. File in the cloud is visible to the people. Only after the execution of two-step process receiver will be able to access the file. When the user has logged into the application by scanning the QR code in the cloud, the data is sent to the mobile application. As the user passes these step, the shared document is decrypted using a key generated by key generator and user can download the shared file. For each step utmost three attempts are provided, the user will be locked if the user is unable to login during these attempts. A notification facility which enables the user to notify an alert message through e-mail to the concerned user if they exceed more than two attempts or any intruder is trying to access the file is provided. Performance of the system in the cloud environment is analyzed. We present that, encrypted message is sent by a sender to a receiver such that only the receiver’s identity is known by the sender and no other information regarding the data to be accessed. To decrypt the cipher text receiver should perform two-steps. User’s secret key is in the computer and personal security device is connected to it. It is tedious to handle with decrypting the cipher text without either of the above two. This device is revoked In case the security of device is breached. It is not possible to decrypt the cipher text by cloud server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers,65(6), 1992–2004.

    Article  MathSciNet  Google Scholar 

  2. Wang, H., He, D., & Tang, S. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transactions on Information Forensics and Security,11(6), 1165–1176.

    Article  Google Scholar 

  3. Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484–497 (2016).

    Article  Google Scholar 

  4. Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security,11(6), 1265–1277.

    Article  Google Scholar 

  5. Tang, S., Li, X., Huang, X., Xiang, Y., & Xu, L. (2016). Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Transactions on Computers,65(7), 2325–2331.

    Article  MathSciNet  Google Scholar 

  6. Bhavana, A., Alekhya, V., Deepak, K., & Sreenivas, V. (2013). Password authentication system for cloud environment. International Journal of Advanced Computer Science and Information Technology, 2(1), 29–33.

    Google Scholar 

  7. Dinesha, H. A., & Agrawal, V. K. (2012). Multi-dimensional password generation technique for accessing cloud services. International Journal on Cloud Computing: Services and Architecture, 2(3), 31–39.

    Google Scholar 

  8. Mhatre, M. V., & Shaikh, M. Z. (2015). Key-aggregate cryptosystem for scalable data sharing in cloud storage. International Journal of Advanced Research in Computer Science and Software Engineering, 5(7), 1280–1284.

    Google Scholar 

  9. Panse, D., & Haritha, P. (2014). Multi-factor authentication in cloud computing for data storage security. International Journal of Advanced Research in Computer Science and Software Engineering, 4(8), 629–634.

    Google Scholar 

  10. Wang, C., Wang, Q., Ren, K., & Lou, W. (2011). Towards secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing,5(2), 220–232.

    Article  Google Scholar 

  11. Zhu, Y., Ahn, G. J., Hu, H., Yau, S. S., An, H. G., & Chen, S. (2013). Dynamic audit services for outsourced storage in clouds. IEEE Transactions on Services Computing,6, 227–238.

    Article  Google Scholar 

  12. Balkrishnan, S., Saranya, G., Shobana, S., & Karthikeyan, S. (2012). Introducing effective third party auditing (TPA) for data storage security in cloud. International Journal of computer science and Technology, 2(2). ISSN 2229-4333 (Print)|ISSN: 0976-8491 (online).

  13. Jachak, K. B., Korde, S. K., Ghorpade, P. P., & Gagare, G. J. (2012). Homomorphic Authentication with random masking technique ensuring privacy and security in cloud computing. BioinfoSecurity Informatics 2–2, 49–52. ISSN 2249-9423, 12.

  14. Yuan, J., & Yu, S. (2013). Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of ACM ASIACCS-SCC’13.

  15. Libert, B., & Vergnaud, D. (2011). Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Transactions on Information Theory,57(3), 1786–1802.

    Article  MathSciNet  Google Scholar 

  16. Chu, K., Chow, S. S. M., Tzeng, W.-G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems,25(2), 468–477.

    Article  Google Scholar 

  17. Latha, K., & Sheela, T. (2019). Block based data security and data distribution on multi cloud environment. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01395-y.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Latha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Latha, K., Sheela, T. Security Scheme in Cloud System Using Hyper Elliptic Curve and SIFT Technique with QR Code. Wireless Pers Commun 111, 1327–1340 (2020). https://doi.org/10.1007/s11277-019-06917-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06917-7

Keywords

Navigation