Enhancing cloud storage security through blockchain-integrated access control and optimized cryptographic techniques
R.S.Kanakasabapathi and J.E.Judith
Abstract
In the ever-changing landscape of technological innovation and the growing security concerns associated with cloud storage, this research focuses on the critical topic of improving cloud record security. The study introduces a paradigm for access control that integrates with the Ethereum blockchain. To enhance security, an improved salp swarm optimization (ISSO) technique is employed to generate the crucial random numbers required for secret key generation. Additionally, the research utilizes two more encryption algorithms: the Paillier federated multi-layer perceptron (PF-MLP) model and the homomorphic encryption standard (HES), to further protect the original health tweet dataset's privacy. The study evaluates the security constraints and efficacy of various encryption methods, guiding the selection of the strongest framework to safeguard the health tweets dataset. The ISSO technique streamlines key pair generation, making it more challenging for potential attackers to access the original data. The proposed encryption-decryption method demonstrates superior speed, with encryption times of 800 ms and 900 ms, respectively, outperforming both the Rivest–Shamir–Adleman (RSA) algorithm and elliptic curve cryptography (ECC). Additionally, the approach surpasses ECC and RSA in upload and download speeds, with times of 4 ms and 6 ms, respectively. With a processing time of 1500 ms, the proposed method significantly outperforms previous approaches, showcasing its efficiency and superiority in cryptographic operations. This work combines access control, blockchain technology, and advanced cryptographic techniques to address pressing security issues related to cloud storage. By enhancing data safety and confidentiality, the integrated framework represents a significant advancement in the security of data outsourced to cloud platforms.
Keyword
Data security, Salp swarm optimization, Homomorphic encryption standard, Cloud computing, Paillier federated learning, Ethereum blockchain.
Cite this article
R.S.KanakasabapathiJ.E.Judith.Enhancing cloud storage security through blockchain-integrated access control and optimized cryptographic techniques. International Journal of Advanced Technology and Engineering Exploration. 2024;11(117):1183-1197. DOI:10.19101/IJATEE.2023.10101660
Refference
[1]Groom FM, Jones SS. Enterprise cloud computing for non-engineers. CRC Press; 2018.
[2]Thabit F, Alhomdy SA, Alahdal A, Jagtap SB. Exploration of security challenges in cloud computing: issues, threats, and attacks with their alleviating techniques. Journal of Information and Computational Science. 2020; 12(10).
[3]Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM. Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Advances in Engineering Software. 2017; 114:163-91.
[4]C. Thomas, Data Mining. BoD-Books on Demand; 2018.
[5]Rachmat N, Samsuryadi. Performance analysis of 256-bit AES encryption algorithm on android smartphone. In journal of physics: conference series 2019 (pp. 1-6). IOP Publishing.
[6]Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security. 2005; 8(2):228-58.
[7]Singh S, Jeong YS, Park JH. A survey on cloud computing security: issues, threats, and solutions. Journal of Network and Computer Applications. 2016; 75:200-22.
[8]Sagar RG, Kumar NA. Encryption based framework for cloud databases using AES algorithm. International Journal of Research Studies in Computer Science and Engineering. 2015.
[9]Goodfellow I. Deep learning. MIT Press; 2016.
[10]Gu J, Wang Z, Kuen J, Ma L, Shahroudy A, Shuai B, et al. Recent advances in convolutional neural networks. Pattern Recognition. 2018; 77:354-77.
[11]Rivest RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms. Foundations of Secure Computation. 1978; 4(11):169-80.
[12]Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978; 21(2):120-6.
[13]Migliore V, Bonnoron G, Fontaine C. Practical parameters for somewhat homomorphic encryption schemes on binary circuits. IEEE Transactions on Computers. 2018; 67(11):1550-60.
[14]Mojisola FO, Misra S, Febisola CF, Abayomi-alli O, Sengul G. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA). Egyptian Informatics Journal. 2022; 23(2):291-301.
[15]Shinde MR, Taur RD. Encryption algorithm for data security and privacy in cloud storage. American Journal of Computer Science and Engineering Survey. 2015; 3(1):34-9.
[16]Sangeetha SK, Vanithadevi V, Rathika SK. Enhancing cloud security through efficient fragment based encryption. International Journal of Pure and Applied Mathematics. 2018; 118(18):2425-36.
[17]Arockiam L, Monikandan S. Data security and privacy in cloud storage using hybrid symmetric encryption algorithm. International Journal of Advanced Research in Computer and Communication Engineering. 2013; 2(8):3064-70.
[18]Wang C, Ren K, Wang J. Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Transactions on Computers. 2015; 65(1):216-29.
[19]George GM, Jayashree LS. Ethereum blockchain-based authentication approach for data sharing in cloud storage model. Cybernetics and Systems. 2023; 54(6):961-84.
[20]Sheeba TB, Hemanth SV, Devaraj V, Arularasan AN, Gopianand M. Digital hash data encryption for iot financial transactions using blockchain security in the cloud. International Journal on Recent and Innovation Trends in Computing and Communication. 2023; 11:129-34.
[21]Panda SK, Mishra V, Dash SP, Pani AK. Recent advances in blockchain technology: real-world applications. Springer Nature; 2023.
[22]Dule CS, Roopashree HR. Privacy preservation modelling for securing image data using novel ethereum-based ecosystem. International Journal of Advanced Computer Science and Applications. 2023;14(2):126-35.
[23]Antony SM, Samiappan D. IPFS based file storage access control and authentication model for secure data transfer using block chain technique. Concurrency and Computation: Practice and Experience. 2023; 35(2):e7485.
[24]Sucharitha G, Sitharamulu V, Mohanty SN, Matta A, Jose D. Enhancing secure communication in the cloud through blockchain assisted-CP-DABE. IEEE Access. 2023; 11: 99005-15.
[25]Mahajan H, Reddy KT. Secure gene profile data processing using lightweight cryptography and blockchain. Cluster Computing. 2024; 27(3):2785-803.
[26]Almasian M, Shafieinejad A. Secure cloud file sharing scheme using blockchain and attribute-based encryption. Computer Standards & Interfaces. 2024; 87:103745.
[27]Kallapu B, Dodmane R, Thota S, Sahu AK. Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption. Electronics. 2023; 12(18):1-15.
[28]Verma G, Kanrar S. Secure document sharing model based on blockchain technology and attribute-based encryption. Multimedia Tools and Applications. 2024; 83(6):16377-94.
[29]Sajay KR, Babu SS, Vijayalakshmi Y. Enhancing the security of cloud data using hybrid encryption algorithm. Journal of Ambient Intelligence and Humanized Computing. 2019:1-10.
[30]Zhao F, Li C, Liu CF. A cloud computing security solution based on fully homomorphic encryption. In 16th international conference on advanced communication technology 2014 (pp. 485-8). IEEE.
[31]Das D. Secure cloud computing algorithm using homomorphic encryption and multi-party computation. In international conference on information networking 2018 (pp. 391-6). IEEE.
[32]Joseph M, Mohan G. Design a hybrid optimization and homomorphic encryption for securing data in a cloud environment. International Journal of Computer Networks and Applications. 2022; 9(4):387-95.
[33]Kumar KS, Nair SA, Roy DG, Rajalingam B, Kumar RS. Security and privacy-aware artificial intrusion detection system using federated machine learning. Computers & Electrical Engineering. 2021; 96:107440.
[34]Dumbere DM, Ambhaikar A. An ML bio-inspired model for improving security and speed of FHE for cybersecurity. In IEEE international conference on technology, research, and innovation for betterment of society 2021 (pp. 1-8). IEEE.
[35]Soykan EU, Karacay L, Karakoc F, Tomur E. A survey and guideline on privacy enhancing technologies for collaborative machine learning. IEEE Access. 2022; 10:97495-519.
[36]Loftus TJ, Ruppert MM, Shickel B, Ozrazgat-Baslanti T, Balch JA, Efron PA, et al. Federated learning for preserving data privacy in collaborative healthcare research. Digital Health. 2022: 20552076221134455.
[37]Harasic M, Keese FS, Mattern D, Paschke A. Recent advances and future challenges in federated recommender systems. International Journal of Data Science and Analytics. 2024; 17(4):337-57.
[38]Gentry C, Halevi S. Implementing gentrys fully-homomorphic encryption scheme. In annual international conference on the theory and applications of cryptographic techniques 2011 (pp. 129-48). Berlin, Heidelberg: Springer Berlin Heidelberg.
[39]Ahmed EY, Elkettani MD. Fully homomorphic encryption: state of art and comparison. International Journal of Computer Science and Information Security. 2016; 14(4):159-67.
[40]Henschke N, Everett JD, Richardson AJ, Suthers IM. Rethinking the role of salps in the ocean. Trends in Ecology & Evolution. 2016; 31(9):720-33.
[41]Anderson PA, Bone Q. Communication between individuals in salp chains. II. physiology. Proceedings of the Royal Society of London. Series B. Biological Sciences. 1980; 210(1181):559-74.
[42]Sutherland KR, Weihs D. Hydrodynamic advantages of swimming by salp chains. Journal of The Royal Society Interface. 2017; 14(133):20170298.
[43]Christo MS, Jesi VE, Priyadarsini U, Anbarasu V, Venugopal H, Karuppiah M. Ensuring improved security in medical data using ECC and blockchain technology with edge devices. Security and Communication Networks. 2021; 2021(1):6966206.
[44]Ge C, Liu Z, Fang L. A blockchain based decentralized data security mechanism for the internet of things. Journal of Parallel and Distributed Computing. 2020; 141:1-9.