Skip to main content

Clustering Based Cybersecurity Model for Cloud Data

  • Chapter
  • First Online:
Book cover Cybersecurity and Secure Information Systems

Abstract

Due to the inexorable notoriety of ubiquitous mobile devices and cloud processing, storing of data (for example photographs, recordings, messages, and texts) in the cloud has turned into a pattern among individual and hierarchical clients. Be that as it may, cloud service providers can’t be trusted entirely to guarantee the accessibility or honesty of client data re-appropriated/transferred to the cloud. Consequently, to enhance the cybersecurity level of cloud data, a new security model is introduced along with optimal key selection. In the proposed study, first cluster the secret information which we are taken using K-Mediod clustering algorithm based on a data distance measure. Then, the clustered data are encrypted using Blowfish Encryption (BE) and stored in the cloud. To improve the cybersecurity level, the optimal key is chosen based on the maximum key breaking time; for that, we presented a technique called Improved Dragonfly Algorithm (IDA). The result demonstrates that the optimal blowfish algorithm improves the accuracy of cybersecurity for all secret information compared to existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yong P, Wei Z, Feng X, Dai ZH, Yang G, Chen DQ (2012) Secure cloud storage based on cryptographic techniques. J China Univ Posts Telecommun 19:182–189

    Article  Google Scholar 

  2. Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2017) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 1–26

    Google Scholar 

  3. Yan Z, Deng RH, Varadharajan V (2017) Cryptography and data security in cloud computing. Inf Sci 100(387):53–55

    Article  Google Scholar 

  4. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

    Article  Google Scholar 

  5. Beulah S, Dhanaseelan FR (2016) Survey on security issues and existing solutions in cloud storage. Indian J Sci Technol 9(13):1–13

    Article  Google Scholar 

  6. Sathesh Kumar K, Shankar K, Ilayaraja M, Rajesh M (2017) sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 9:2888–2899

    Google Scholar 

  7. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. In: Neural computing and applications, pp 1–15. https://doi.org/10.1007/s00521-018-3801-x

  8. Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput 1–13. https://doi.org/10.1007/s12652-018-1161-0

  9. Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208

    Article  Google Scholar 

  10. Shankar K, Lakshmanaprabu SK, Gupta D, Khanna A, de Albuquerque VHC Adaptive optimal multi key based encryption for digital image security. In: Concurrency and computation: practice and experience, p e5122. https://doi.org/10.1002/cpe.5122

  11. Yu Y, Miyaji A, Au MH, Susilo W (2017) Cloud computing security and privacy: standards and regulations, pp 1–2

    Article  Google Scholar 

  12. Wang D, Mei Y, Ma CG, Cui ZS (2012) Comments on an advanced dynamic ID-based authentication scheme for cloud computing. In: International conference on web information systems and mining. Springer, Berlin, Heidelberg, pp 246–253

    Chapter  Google Scholar 

  13. Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154

    Article  Google Scholar 

  14. Basu A, Sengupta I, Sing JK (2011) Secured cloud storage scheme using ECC based key management in user hierarchy. In: International conference on information systems security. Springer, Berlin, Heidelberg, pp 175–189

    Chapter  Google Scholar 

  15. Dhote CA (2016) Homomorphic encryption for security of cloud data. Procedia Comput Sci 79:175–181

    Article  Google Scholar 

  16. Arockia Panimalar S, Dharani N, Pavithra S, Aiswarya R (2017) Cloud data security using elliptic curve cryptography. J Eng Technol 4(9):32–36

    Google Scholar 

  17. Yellamma P, Narasimham C, Sreenivas V (2013) Data security in cloud using RSA. IEEE

    Google Scholar 

  18. Lee BH, Dewi EK, Wajdi MF (2018) Data security in cloud computing using AES under HEROKU cloud. In: 2018 27th Wireless and optical communication conference (WOCC). IEEE, pp 1–5

    Google Scholar 

  19. Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security algorithms for cloud computing. Procedia Comput Sci 85:535–542

    Article  Google Scholar 

  20. Mafarja MM, Eleyan D, Jaber I, Hammouri A, Mirjalili S (2017) Binary dragonfly algorithm for feature selection. In: 2017 International conference on new trends in computing sciences (ICTCS). IEEE, pp 12–17

    Google Scholar 

  21. Aminudin N, Maseleno A, Shankar K, Hemalatha S, Sathesh kumar K, Fauzi, Irviani R, Muslihudin M (2018) Nur algorithm on data encryption and decryption. Int J Eng Technol 7(Issue-2.26):109–118

    Article  Google Scholar 

  22. Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(9):22–27

    Google Scholar 

  23. Ramya Princess Mary I, Eswaran P, Shankar K (2018) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398

    Google Scholar 

  24. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  25. Shankar K, Eswaran P (2016) RGB based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bhuvaneshwaran, A., Manickam, P., Ilayaraja, M., Sathesh Kumar, K., Shankar, K. (2019). Clustering Based Cybersecurity Model for Cloud Data. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16837-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16836-0

  • Online ISBN: 978-3-030-16837-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics