Advertisement

Security Scheme in Cloud System Using Hyper Elliptic Curve and SIFT Technique with QR Code

  • K. LathaEmail author
  • T. Sheela
Article
  • 12 Downloads

Abstract

When concerned about cloud the security has to be the major factor considered by providers of service. Double encryption is a tool used by the storage server to transfer data by the sender and enhancing the security. The first key performs the identification of the receiver or public key at sender side to generate first-level cipher-text. The other key is stored in the security device issued by SDI (security device issuer) shared with cloud storage systems to originate second-level cipher-text. In the proposed scheme, a file in the cloud is uploaded by the sender and encrypts using the public key, and stores it in the cloud. File in the cloud is visible to the people. Only after the execution of two-step process receiver will be able to access the file. When the user has logged into the application by scanning the QR code in the cloud, the data is sent to the mobile application. As the user passes these step, the shared document is decrypted using a key generated by key generator and user can download the shared file. For each step utmost three attempts are provided, the user will be locked if the user is unable to login during these attempts. A notification facility which enables the user to notify an alert message through e-mail to the concerned user if they exceed more than two attempts or any intruder is trying to access the file is provided. Performance of the system in the cloud environment is analyzed. We present that, encrypted message is sent by a sender to a receiver such that only the receiver’s identity is known by the sender and no other information regarding the data to be accessed. To decrypt the cipher text receiver should perform two-steps. User’s secret key is in the computer and personal security device is connected to it. It is tedious to handle with decrypting the cipher text without either of the above two. This device is revoked In case the security of device is breached. It is not possible to decrypt the cipher text by cloud server.

Keywords

QR code Encrypted Decrypted Key generator Performance 

Notes

References

  1. 1.
    Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers,65(6), 1992–2004.MathSciNetCrossRefGoogle Scholar
  2. 2.
    Wang, H., He, D., & Tang, S. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transactions on Information Forensics and Security,11(6), 1165–1176.CrossRefGoogle Scholar
  3. 3.
    Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484–497 (2016).CrossRefGoogle Scholar
  4. 4.
    Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security,11(6), 1265–1277.CrossRefGoogle Scholar
  5. 5.
    Tang, S., Li, X., Huang, X., Xiang, Y., & Xu, L. (2016). Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Transactions on Computers,65(7), 2325–2331.MathSciNetCrossRefGoogle Scholar
  6. 6.
    Bhavana, A., Alekhya, V., Deepak, K., & Sreenivas, V. (2013). Password authentication system for cloud environment. International Journal of Advanced Computer Science and Information Technology, 2(1), 29–33.Google Scholar
  7. 7.
    Dinesha, H. A., & Agrawal, V. K. (2012). Multi-dimensional password generation technique for accessing cloud services. International Journal on Cloud Computing: Services and Architecture, 2(3), 31–39.Google Scholar
  8. 8.
    Mhatre, M. V., & Shaikh, M. Z. (2015). Key-aggregate cryptosystem for scalable data sharing in cloud storage. International Journal of Advanced Research in Computer Science and Software Engineering, 5(7), 1280–1284.Google Scholar
  9. 9.
    Panse, D., & Haritha, P. (2014). Multi-factor authentication in cloud computing for data storage security. International Journal of Advanced Research in Computer Science and Software Engineering, 4(8), 629–634.Google Scholar
  10. 10.
    Wang, C., Wang, Q., Ren, K., & Lou, W. (2011). Towards secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing,5(2), 220–232.CrossRefGoogle Scholar
  11. 11.
    Zhu, Y., Ahn, G. J., Hu, H., Yau, S. S., An, H. G., & Chen, S. (2013). Dynamic audit services for outsourced storage in clouds. IEEE Transactions on Services Computing,6, 227–238.CrossRefGoogle Scholar
  12. 12.
    Balkrishnan, S., Saranya, G., Shobana, S., & Karthikeyan, S. (2012). Introducing effective third party auditing (TPA) for data storage security in cloud. International Journal of computer science and Technology, 2(2). ISSN 2229-4333 (Print)|ISSN: 0976-8491 (online).Google Scholar
  13. 13.
    Jachak, K. B., Korde, S. K., Ghorpade, P. P., & Gagare, G. J. (2012). Homomorphic Authentication with random masking technique ensuring privacy and security in cloud computing. BioinfoSecurity Informatics 2–2, 49–52. ISSN 2249-9423, 12.Google Scholar
  14. 14.
    Yuan, J., & Yu, S. (2013). Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of ACM ASIACCS-SCC’13.Google Scholar
  15. 15.
    Libert, B., & Vergnaud, D. (2011). Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Transactions on Information Theory,57(3), 1786–1802.MathSciNetCrossRefGoogle Scholar
  16. 16.
    Chu, K., Chow, S. S. M., Tzeng, W.-G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems,25(2), 468–477.CrossRefGoogle Scholar
  17. 17.
    Latha, K., & Sheela, T. (2019). Block based data security and data distribution on multi cloud environment. Journal of Ambient Intelligence and Humanized Computing.  https://doi.org/10.1007/s12652-019-01395-y.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of Computer Science and EngineeringSathyabama Institute of Science and TechnologyChennaiIndia
  2. 2.Department of Computer Science and EngineeringSri Sai Ram Engineering CollegeChennaiIndia
  3. 3.Department of ITSri Sai Ram Engineering CollegeChennaiIndia

Personalised recommendations