Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm

Cloud computing is currently playing an important role in the information technology industry because of its improved efficiency, wide access, low cost, and many benefits. It also provides more space for storing data and transmitting data from one location to another faster for different users on the Internet. Due to large storage, cloud customers can save huge capital investment on IT infrastructure and focus on their own core business. Therefore, many companies or organizations are moving their business to the cloud. However, many customers are reluctant to use the cloud due to security and privacy concerns. To tackle this problem, in this paper, efficient secure data retrieval is developed with the help of multi-stage authentication (MSA) and optimized blowfish algorithm (OBA). The proposed system consists of three modules namely, MSA, data security, and data retrieval. Initially, the cloud users register their information on cloud based on a multi-authentication procedure. After the registration process, the data are encrypted with the help of OBA. To increase the security of the system, the key value is optimally selected with the help of a binary crow search algorithm. After the encryption process, MSA based data retrieval process is performed. This will avoid, un-authorized person to attack the data. The performance of the proposed methodology is implemented in JAVA and performances are analyzed in terms of different metrics.

[1]  P. G. Student,et al.  Data Security in Federated Cloud Environment using Homomorphic Encryption Technique , 2015 .

[2]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[3]  Pin-Chang Su,et al.  The application of multi-server authentication scheme in internet banking transaction environments , 2020, Information Systems and e-Business Management.

[4]  S. Albert Rabara,et al.  Elliptic Curve Cryptography Based Security Framework for Internet of Things (IoT) Enabled Smart Card , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).

[5]  V. Vasudevan,et al.  A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data , 2018, Cluster Computing.

[6]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .

[7]  S. Sathappan,et al.  A Secure Cloud Data Storage Combining DNA Structure and Multi-aspect Time-Integrated Cut-off Potential , 2018 .

[8]  V. D. Shinde,et al.  Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI , 2015 .

[9]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[10]  Mohammad E. Khodayar,et al.  Energy-aware cloud computing , 2018 .

[11]  Abdelrahman M. Helmi,et al.  A framework for integrating geospatial information systems and hybrid cloud computing , 2018, Comput. Electr. Eng..

[12]  P. Vijaya Karthick,et al.  Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique , 2020 .

[13]  S. Sangeetha,et al.  A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography , 2020, Complex & Intelligent Systems.

[14]  R.K. Meyers,et al.  An Implementation of the Blowfish Cryptosystem , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.

[15]  Gopal Sarma Pingali,et al.  Industry Cloud - Effective Adoption of Cloud Computing for Industry Solutions , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[16]  Rayapati Venkata Sudhakar,et al.  Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications , 2020, Cluster Computing.

[17]  Mohit Kumar,et al.  A comprehensive survey for scheduling techniques in cloud computing , 2019, J. Netw. Comput. Appl..

[18]  Javier Bajo,et al.  Survey of agent-based cloud computing applications , 2019, Future Gener. Comput. Syst..

[19]  Giancarlo Fortino,et al.  Secure distributed adaptive bin packing algorithm for cloud storage , 2019, Future Gener. Comput. Syst..

[20]  Kanika Lakhani,et al.  Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[21]  Rongfang Bie,et al.  Blockchain-enabled digital rights management for multimedia resources of online education , 2019, Multimedia Tools and Applications.

[22]  G. Mahadevan,et al.  Authorization for secured cloud storage through SHA-256 , 2019 .

[23]  Yaghoub Farjami,et al.  MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.

[24]  Diego F. Aranha,et al.  PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking , 2015, LightSec.

[25]  P. Varalakshmi,et al.  Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud , 2018, Cluster Computing.

[26]  Chunming Rong,et al.  Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption , 2018, IEEE Access.

[27]  Choong Seon Hong,et al.  Defense technique against spoofing attacks using reliable ARP table in cloud computing environment , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[28]  Shaji Ramaswamy Swarnammal,et al.  A secure transaction of cloud data using conditional source trust attributes encryption mechanism , 2018, Soft Comput..

[29]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[30]  Subash Chandra Bose,et al.  Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain , 2019 .