Rubik’s Cube Encryption for Securing Cloud Stored Data

  • T. T. AnusreeEmail author
  • K. P. Swaraj
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 44)


Cloud storage is an efficient solution for storage needs of organizations and individuals. But the data outsourcing and data transfer using the same network makes the cloud data more sensitive for attacks. Hence providing security to the cloud data while in storage or transit requires a prime concern. The denial of access to a third party also must be ensured for the confidentiality of stored data. In this paper, Rubik’s cube based encryption with data spitting technique is introduced to securely storing and transferring cloud stored medical records. And the role of the third party auditor also limited to verifying the user only. The multiple number of encryption and denial of access to the third party ensure that the data is protected in the cloud.


Cloud computing Rubik’s cube encryption Data analysis Data splitting Medical record 


  1. 1.
    Lenka, S.R., Nayak, B.: Enhancing data security in cloud computing using RSA encryption and MD5 algorithm 2(3), 6064 (2014)Google Scholar
  2. 2.
    Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage. Syst. IEEE Trans. Comput. 65(6), 1992–2004 (2016)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Akhil, K.M., Praveen Kumar, M., Pushpa, B.R.: Enhanced cloud data security using AES algorithm. In: 2017 IEEE International Conference on Intelligent Computing and Control (2017)Google Scholar
  4. 4.
    Cheng, H., Qian, M., Yu, S.: Securing cloud data using a pirate scheme. Chin. J. Electron. 26(6), 1289–1296 (2017)CrossRefGoogle Scholar
  5. 5.
    Bakibayev, N., Olteanu, D., Zavodny, J.: Big data analytics for security intelligence. In: Cloud Security Alliance Business White Paper (2013)Google Scholar
  6. 6.
    Vijayanad, K.S., Mala, T.: Ecids Elliptic curve inspired data scrambling method for securing data in hybrid cloud using N cloud architecture. Asian J. Inf. Technol. (2016)Google Scholar
  7. 7.
    Zhu, Z.-L., Wang, C., Chai, H., Yu, H.: A chaotic image encryption scheme based on magic cube transformation. In: Proceedings of the 4th International Workshop on Chaos-Fractals Theories and Applications (IWCFTA 2011) (2011)Google Scholar
  8. 8.
    Zhang, L., TiaN, X., Xia, S.: Scrambling algorithm of image encryption based on Rubik’s cube rotation and logistic sequence. In: Proceedings of the International Conference on Multimedia and Signal Processing (CMSP 2011), Guilin, China, May 2011, pp. 312–315 (2011)Google Scholar
  9. 9.
    Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: A secure image encryption algorithm based on Rubik’s cube principle. J. Electr. Comput. Eng. 2012, 13 (2012). Article ID173931Google Scholar
  10. 10.
    Diaconu, A.V., Loukhaoukha, K.: An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher. Math. Probl. Eng. 2013, 10 (2013). Article ID 848392Google Scholar
  11. 11.
    Rajavel, D., Shantharajah, S.P.: Cubical key generation and encryption algorithm based on hybrid cube’s rotation. In: International Conference on Pattern Recognition, Informatics and Medical Engineering. IEEE (2012)Google Scholar
  12. 12.
    Rajavel, D., Shantharajah, S.P.: Scrambling algorithm for encryption of text using cube rotation artificial intelligence technique. Biomed. Res. (2016). Special Issue: S251-S256Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGovernment Engineering CollegeThrissurIndia

Personalised recommendations