A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data

As a result of the limited resources available in IoT local devices, the large scale cloud consumer’s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and data may be leaked. Because cloud-data and grid infrastructure are both growing exponentially, there is an urgent need to explore computational sources and cloud large-data protection. Numerous cloud service categories are assimilated into numerous fields, such as defense systems and pharmaceutical databases, to compute information space and allocation of resources. Attribute Based Encryption (ABE) is a sophisticated approach which can permit employees to specify a higher level of security for data stored in cloud storage facilities. Numerous obsolete ABE techniques are practical when applied to small data sets to generate cryptograms with restricted computational properties; their properties are used to generate the key, encrypt it, and decrypt it. To address the current concerns, a dynamic non-linear polynomial chaotic quantum hash technique on top of secure block chain model can be used for enhancing cloud data security while maintaining user privacy. In the proposed method, customer attributes are guaranteed by using a dynamic non- polynomial chaotic map function for the key initialization, encryption, and decryption. In the proposed model, both organized and unorganized massive clinical data are considered to be inputs for reliable corroboration and encoding. Compared to existing models, the real-time simulation results demonstrate that the stated standard is more precise than 90% in terms of bit change and more precise than 95% in terms of dynamic key generation, encipherment, and decipherment time.

[1]  E. Poovammal,et al.  Linear Elliptical Curve Digital Signature (LECDS) With Blockchain Approach for Enhanced Security on Cloud Server , 2021, IEEE Access.

[2]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[3]  Kranthi Kumar Singamaneni,et al.  Secure key management in cloud environment using quantum cryptography , 2018, Ingénierie des Systèmes d Inf..

[4]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[5]  Jia Xu,et al.  Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.

[6]  Shaoyong Guo,et al.  Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain , 2020 .

[7]  G. Niranjana,et al.  Low Energy Interleaved Chaotic Secure Image Coding Scheme for Visual Sensor Networks Using Pascal’s Triangle Transform , 2021, IEEE Access.

[8]  Borja Bordel,et al.  Trust Provision in the Internet of Things using Transversal Blockchain Networks , 2018 .

[9]  Kenli Li,et al.  A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users , 2017, IEEE Transactions on Cloud Computing.

[10]  Mary Subaja Christo,et al.  An Efficient Data Security in Medical Report using Block Chain Technology , 2019, 2019 International Conference on Communication and Signal Processing (ICCSP).

[11]  R. Sherratt,et al.  Blockchain-Based Data Storage Mechanism for Industrial Internet of Things , 2020, Intelligent Automation & Soft Computing.

[12]  Gaurav Dhiman,et al.  A survey on applications and security issues of blockchain technology in business sectors , 2021 .

[13]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[14]  E. O. Kiktenko,et al.  Quantum-secured blockchain , 2017, Quantum Science and Technology.

[15]  Kranthi Kumar Singamaneni,et al.  IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing , 2019, Rev. d'Intelligence Artif..

[16]  Moni Naor,et al.  The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[17]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.

[18]  Jian Shen,et al.  Quantum Cryptography for the Future Internet and the Security Analysis , 2018, Secur. Commun. Networks.

[19]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[20]  Michal Pluhacek,et al.  Preliminary Study on the Randomization and Sequencing for the Chaos Embedded Heuristic , 2015, AECIA.

[21]  Kranthi Kumar Singamaneni,et al.  Efficient quantum cryptography technique for key distribution , 2018 .

[22]  Rajit Nair,et al.  An approach to minimize the energy consumption during blockchain transaction , 2020 .

[23]  E. Laxmi Lydia,et al.  Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data , 2020 .

[24]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[25]  Natalia Kryvinska,et al.  A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree. , 2021, Mathematical biosciences and engineering : MBE.

[26]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[27]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[28]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[29]  Im-Yeong Lee,et al.  A Key Recovery System Based on Password-protected Secret Sharing in a Permissioned Blockchain , 2020 .

[30]  Yuvaraj Natarajan,et al.  Task Scheduling in cloud using ACO , 2020 .

[31]  Michael K. Reiter,et al.  Space-Efficient Block Storage Integrity , 2005, NDSS.

[32]  Nashaat Elkhameesy,et al.  Biometrics template security on cloud computing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[33]  Yimin Zhao,et al.  A Novel Secure Data Transmission Scheme Using Chaotic Compressed Sensing , 2018, IEEE Access.

[34]  Yan Yang,et al.  Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing , 2018, IEEE Access.

[35]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[36]  Kenli Li,et al.  Profit Maximization for Cloud Brokers in Cloud Computing , 2019, IEEE Transactions on Parallel and Distributed Systems.

[37]  Mohamed Hamdi,et al.  A new biometric-based security framework for cloud storage , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).