Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique

The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Arabian journal for science and engineering (2011) 2022-08, Vol.47 (8), p.10381-10394
Hauptverfasser: Devmane, Vidyullata, Lande, B. K., Joglekar, Jyoti, Hiran, Dilendra
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10394
container_issue 8
container_start_page 10381
container_title Arabian journal for science and engineering (2011)
container_volume 47
creator Devmane, Vidyullata
Lande, B. K.
Joglekar, Jyoti
Hiran, Dilendra
description The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.
doi_str_mv 10.1007/s13369-021-06347-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2700353213</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2700353213</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</originalsourceid><addsrcrecordid>eNp9kM9LwzAUx4MoOOb-AU8Bz9W8Jmmb45zTCQMFN_AW0zTdols6k3aw_95sFbzJO7z34PsDPghdA7kFQvK7AJRmIiEpJCSjLE_oGRqkICBhaQHnp5smPMvfL9EoBFsSVlDBAegAfbx6E4zfW7fCD6pV-M3oztv2gK3Dk03TVXjq9tY3bmtci5fhKFQOjyu1a-3e4FmzjeN3a6vx_abRX3qtonVh9NrZ785coYtabYIZ_e4hWj5OF5NZMn95ep6M54mmINrEEKgKwU0h4l_qShDCs5RzKDSrOa9LrXJeFyzPWFECkFykBBgBzVRNaM7oEN30uTvfxNrQys-m8y5WyjQnhHKaRkxDlPYq7ZsQvKnlztut8gcJRB5hyh6mjDDlCaY8mmhvClHsVsb_Rf_j-gFakXaj</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2700353213</pqid></control><display><type>article</type><title>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</title><source>SpringerLink Journals - AutoHoldings</source><creator>Devmane, Vidyullata ; Lande, B. K. ; Joglekar, Jyoti ; Hiran, Dilendra</creator><creatorcontrib>Devmane, Vidyullata ; Lande, B. K. ; Joglekar, Jyoti ; Hiran, Dilendra</creatorcontrib><description>The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.</description><identifier>ISSN: 2193-567X</identifier><identifier>ISSN: 1319-8025</identifier><identifier>EISSN: 2191-4281</identifier><identifier>DOI: 10.1007/s13369-021-06347-3</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Blockchain ; Cloud computing ; Computer systems ; Cryptography ; Cybersecurity ; Data storage ; Encryption ; Engineering ; Humanities and Social Sciences ; multidisciplinary ; Research Article-Computer Engineering and Computer Science ; Science</subject><ispartof>Arabian journal for science and engineering (2011), 2022-08, Vol.47 (8), p.10381-10394</ispartof><rights>King Fahd University of Petroleum &amp; Minerals 2022</rights><rights>King Fahd University of Petroleum &amp; Minerals 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</citedby><cites>FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</cites><orcidid>0000-0002-3073-8343</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13369-021-06347-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13369-021-06347-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, B. K.</creatorcontrib><creatorcontrib>Joglekar, Jyoti</creatorcontrib><creatorcontrib>Hiran, Dilendra</creatorcontrib><title>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</title><title>Arabian journal for science and engineering (2011)</title><addtitle>Arab J Sci Eng</addtitle><description>The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.</description><subject>Algorithms</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data storage</subject><subject>Encryption</subject><subject>Engineering</subject><subject>Humanities and Social Sciences</subject><subject>multidisciplinary</subject><subject>Research Article-Computer Engineering and Computer Science</subject><subject>Science</subject><issn>2193-567X</issn><issn>1319-8025</issn><issn>2191-4281</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kM9LwzAUx4MoOOb-AU8Bz9W8Jmmb45zTCQMFN_AW0zTdols6k3aw_95sFbzJO7z34PsDPghdA7kFQvK7AJRmIiEpJCSjLE_oGRqkICBhaQHnp5smPMvfL9EoBFsSVlDBAegAfbx6E4zfW7fCD6pV-M3oztv2gK3Dk03TVXjq9tY3bmtci5fhKFQOjyu1a-3e4FmzjeN3a6vx_abRX3qtonVh9NrZ785coYtabYIZ_e4hWj5OF5NZMn95ep6M54mmINrEEKgKwU0h4l_qShDCs5RzKDSrOa9LrXJeFyzPWFECkFykBBgBzVRNaM7oEN30uTvfxNrQys-m8y5WyjQnhHKaRkxDlPYq7ZsQvKnlztut8gcJRB5hyh6mjDDlCaY8mmhvClHsVsb_Rf_j-gFakXaj</recordid><startdate>20220801</startdate><enddate>20220801</enddate><creator>Devmane, Vidyullata</creator><creator>Lande, B. K.</creator><creator>Joglekar, Jyoti</creator><creator>Hiran, Dilendra</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3073-8343</orcidid></search><sort><creationdate>20220801</creationdate><title>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</title><author>Devmane, Vidyullata ; Lande, B. K. ; Joglekar, Jyoti ; Hiran, Dilendra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data storage</topic><topic>Encryption</topic><topic>Engineering</topic><topic>Humanities and Social Sciences</topic><topic>multidisciplinary</topic><topic>Research Article-Computer Engineering and Computer Science</topic><topic>Science</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, B. K.</creatorcontrib><creatorcontrib>Joglekar, Jyoti</creatorcontrib><creatorcontrib>Hiran, Dilendra</creatorcontrib><collection>CrossRef</collection><jtitle>Arabian journal for science and engineering (2011)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Devmane, Vidyullata</au><au>Lande, B. K.</au><au>Joglekar, Jyoti</au><au>Hiran, Dilendra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</atitle><jtitle>Arabian journal for science and engineering (2011)</jtitle><stitle>Arab J Sci Eng</stitle><date>2022-08-01</date><risdate>2022</risdate><volume>47</volume><issue>8</issue><spage>10381</spage><epage>10394</epage><pages>10381-10394</pages><issn>2193-567X</issn><issn>1319-8025</issn><eissn>2191-4281</eissn><abstract>The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13369-021-06347-3</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-3073-8343</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2193-567X
ispartof Arabian journal for science and engineering (2011), 2022-08, Vol.47 (8), p.10381-10394
issn 2193-567X
1319-8025
2191-4281
language eng
recordid cdi_proquest_journals_2700353213
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Blockchain
Cloud computing
Computer systems
Cryptography
Cybersecurity
Data storage
Encryption
Engineering
Humanities and Social Sciences
multidisciplinary
Research Article-Computer Engineering and Computer Science
Science
title Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T13%3A14%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Preserving%20Data%20Security%20in%20Cloud%20Environment%20Using%20an%20Adaptive%20Homomorphic%20Blockchain%20Technique&rft.jtitle=Arabian%20journal%20for%20science%20and%20engineering%20(2011)&rft.au=Devmane,%20Vidyullata&rft.date=2022-08-01&rft.volume=47&rft.issue=8&rft.spage=10381&rft.epage=10394&rft.pages=10381-10394&rft.issn=2193-567X&rft.eissn=2191-4281&rft_id=info:doi/10.1007/s13369-021-06347-3&rft_dat=%3Cproquest_cross%3E2700353213%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2700353213&rft_id=info:pmid/&rfr_iscdi=true