Abstract
Due to the inexorable notoriety of ubiquitous mobile devices and cloud processing, storing of data (for example photographs, recordings, messages, and texts) in the cloud has turned into a pattern among individual and hierarchical clients. Be that as it may, cloud service providers can’t be trusted entirely to guarantee the accessibility or honesty of client data re-appropriated/transferred to the cloud. Consequently, to enhance the cybersecurity level of cloud data, a new security model is introduced along with optimal key selection. In the proposed study, first cluster the secret information which we are taken using K-Mediod clustering algorithm based on a data distance measure. Then, the clustered data are encrypted using Blowfish Encryption (BE) and stored in the cloud. To improve the cybersecurity level, the optimal key is chosen based on the maximum key breaking time; for that, we presented a technique called Improved Dragonfly Algorithm (IDA). The result demonstrates that the optimal blowfish algorithm improves the accuracy of cybersecurity for all secret information compared to existing algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yong P, Wei Z, Feng X, Dai ZH, Yang G, Chen DQ (2012) Secure cloud storage based on cryptographic techniques. J China Univ Posts Telecommun 19:182–189
Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2017) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 1–26
Yan Z, Deng RH, Varadharajan V (2017) Cryptography and data security in cloud computing. Inf Sci 100(387):53–55
Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115
Beulah S, Dhanaseelan FR (2016) Survey on security issues and existing solutions in cloud storage. Indian J Sci Technol 9(13):1–13
Sathesh Kumar K, Shankar K, Ilayaraja M, Rajesh M (2017) sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 9:2888–2899
Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. In: Neural computing and applications, pp 1–15. https://doi.org/10.1007/s00521-018-3801-x
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput 1–13. https://doi.org/10.1007/s12652-018-1161-0
Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208
Shankar K, Lakshmanaprabu SK, Gupta D, Khanna A, de Albuquerque VHC Adaptive optimal multi key based encryption for digital image security. In: Concurrency and computation: practice and experience, p e5122. https://doi.org/10.1002/cpe.5122
Yu Y, Miyaji A, Au MH, Susilo W (2017) Cloud computing security and privacy: standards and regulations, pp 1–2
Wang D, Mei Y, Ma CG, Cui ZS (2012) Comments on an advanced dynamic ID-based authentication scheme for cloud computing. In: International conference on web information systems and mining. Springer, Berlin, Heidelberg, pp 246–253
Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145–77154
Basu A, Sengupta I, Sing JK (2011) Secured cloud storage scheme using ECC based key management in user hierarchy. In: International conference on information systems security. Springer, Berlin, Heidelberg, pp 175–189
Dhote CA (2016) Homomorphic encryption for security of cloud data. Procedia Comput Sci 79:175–181
Arockia Panimalar S, Dharani N, Pavithra S, Aiswarya R (2017) Cloud data security using elliptic curve cryptography. J Eng Technol 4(9):32–36
Yellamma P, Narasimham C, Sreenivas V (2013) Data security in cloud using RSA. IEEE
Lee BH, Dewi EK, Wajdi MF (2018) Data security in cloud computing using AES under HEROKU cloud. In: 2018 27th Wireless and optical communication conference (WOCC). IEEE, pp 1–5
Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security algorithms for cloud computing. Procedia Comput Sci 85:535–542
Mafarja MM, Eleyan D, Jaber I, Hammouri A, Mirjalili S (2017) Binary dragonfly algorithm for feature selection. In: 2017 International conference on new trends in computing sciences (ICTCS). IEEE, pp 12–17
Aminudin N, Maseleno A, Shankar K, Hemalatha S, Sathesh kumar K, Fauzi, Irviani R, Muslihudin M (2018) Nur algorithm on data encryption and decryption. Int J Eng Technol 7(Issue-2.26):109–118
Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(9):22–27
Ramya Princess Mary I, Eswaran P, Shankar K (2018) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398
Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130
Shankar K, Eswaran P (2016) RGB based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bhuvaneshwaran, A., Manickam, P., Ilayaraja, M., Sathesh Kumar, K., Shankar, K. (2019). Clustering Based Cybersecurity Model for Cloud Data. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-16837-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16836-0
Online ISBN: 978-3-030-16837-7
eBook Packages: Computer ScienceComputer Science (R0)