Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique
The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult...
Gespeichert in:
Veröffentlicht in: | Arabian journal for science and engineering (2011) 2022-08, Vol.47 (8), p.10381-10394 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10394 |
---|---|
container_issue | 8 |
container_start_page | 10381 |
container_title | Arabian journal for science and engineering (2011) |
container_volume | 47 |
creator | Devmane, Vidyullata Lande, B. K. Joglekar, Jyoti Hiran, Dilendra |
description | The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate. |
doi_str_mv | 10.1007/s13369-021-06347-3 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2700353213</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2700353213</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</originalsourceid><addsrcrecordid>eNp9kM9LwzAUx4MoOOb-AU8Bz9W8Jmmb45zTCQMFN_AW0zTdols6k3aw_95sFbzJO7z34PsDPghdA7kFQvK7AJRmIiEpJCSjLE_oGRqkICBhaQHnp5smPMvfL9EoBFsSVlDBAegAfbx6E4zfW7fCD6pV-M3oztv2gK3Dk03TVXjq9tY3bmtci5fhKFQOjyu1a-3e4FmzjeN3a6vx_abRX3qtonVh9NrZ785coYtabYIZ_e4hWj5OF5NZMn95ep6M54mmINrEEKgKwU0h4l_qShDCs5RzKDSrOa9LrXJeFyzPWFECkFykBBgBzVRNaM7oEN30uTvfxNrQys-m8y5WyjQnhHKaRkxDlPYq7ZsQvKnlztut8gcJRB5hyh6mjDDlCaY8mmhvClHsVsb_Rf_j-gFakXaj</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2700353213</pqid></control><display><type>article</type><title>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</title><source>SpringerLink Journals - AutoHoldings</source><creator>Devmane, Vidyullata ; Lande, B. K. ; Joglekar, Jyoti ; Hiran, Dilendra</creator><creatorcontrib>Devmane, Vidyullata ; Lande, B. K. ; Joglekar, Jyoti ; Hiran, Dilendra</creatorcontrib><description>The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.</description><identifier>ISSN: 2193-567X</identifier><identifier>ISSN: 1319-8025</identifier><identifier>EISSN: 2191-4281</identifier><identifier>DOI: 10.1007/s13369-021-06347-3</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Blockchain ; Cloud computing ; Computer systems ; Cryptography ; Cybersecurity ; Data storage ; Encryption ; Engineering ; Humanities and Social Sciences ; multidisciplinary ; Research Article-Computer Engineering and Computer Science ; Science</subject><ispartof>Arabian journal for science and engineering (2011), 2022-08, Vol.47 (8), p.10381-10394</ispartof><rights>King Fahd University of Petroleum & Minerals 2022</rights><rights>King Fahd University of Petroleum & Minerals 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</citedby><cites>FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</cites><orcidid>0000-0002-3073-8343</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13369-021-06347-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13369-021-06347-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, B. K.</creatorcontrib><creatorcontrib>Joglekar, Jyoti</creatorcontrib><creatorcontrib>Hiran, Dilendra</creatorcontrib><title>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</title><title>Arabian journal for science and engineering (2011)</title><addtitle>Arab J Sci Eng</addtitle><description>The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.</description><subject>Algorithms</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data storage</subject><subject>Encryption</subject><subject>Engineering</subject><subject>Humanities and Social Sciences</subject><subject>multidisciplinary</subject><subject>Research Article-Computer Engineering and Computer Science</subject><subject>Science</subject><issn>2193-567X</issn><issn>1319-8025</issn><issn>2191-4281</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kM9LwzAUx4MoOOb-AU8Bz9W8Jmmb45zTCQMFN_AW0zTdols6k3aw_95sFbzJO7z34PsDPghdA7kFQvK7AJRmIiEpJCSjLE_oGRqkICBhaQHnp5smPMvfL9EoBFsSVlDBAegAfbx6E4zfW7fCD6pV-M3oztv2gK3Dk03TVXjq9tY3bmtci5fhKFQOjyu1a-3e4FmzjeN3a6vx_abRX3qtonVh9NrZ785coYtabYIZ_e4hWj5OF5NZMn95ep6M54mmINrEEKgKwU0h4l_qShDCs5RzKDSrOa9LrXJeFyzPWFECkFykBBgBzVRNaM7oEN30uTvfxNrQys-m8y5WyjQnhHKaRkxDlPYq7ZsQvKnlztut8gcJRB5hyh6mjDDlCaY8mmhvClHsVsb_Rf_j-gFakXaj</recordid><startdate>20220801</startdate><enddate>20220801</enddate><creator>Devmane, Vidyullata</creator><creator>Lande, B. K.</creator><creator>Joglekar, Jyoti</creator><creator>Hiran, Dilendra</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3073-8343</orcidid></search><sort><creationdate>20220801</creationdate><title>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</title><author>Devmane, Vidyullata ; Lande, B. K. ; Joglekar, Jyoti ; Hiran, Dilendra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-e01d895e89c31bcd9005625518c4f55fbca75f847648b11079201401c4af03743</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data storage</topic><topic>Encryption</topic><topic>Engineering</topic><topic>Humanities and Social Sciences</topic><topic>multidisciplinary</topic><topic>Research Article-Computer Engineering and Computer Science</topic><topic>Science</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Devmane, Vidyullata</creatorcontrib><creatorcontrib>Lande, B. K.</creatorcontrib><creatorcontrib>Joglekar, Jyoti</creatorcontrib><creatorcontrib>Hiran, Dilendra</creatorcontrib><collection>CrossRef</collection><jtitle>Arabian journal for science and engineering (2011)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Devmane, Vidyullata</au><au>Lande, B. K.</au><au>Joglekar, Jyoti</au><au>Hiran, Dilendra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique</atitle><jtitle>Arabian journal for science and engineering (2011)</jtitle><stitle>Arab J Sci Eng</stitle><date>2022-08-01</date><risdate>2022</risdate><volume>47</volume><issue>8</issue><spage>10381</spage><epage>10394</epage><pages>10381-10394</pages><issn>2193-567X</issn><issn>1319-8025</issn><eissn>2191-4281</eissn><abstract>The digital cloud platform is vulnerable to harmful activities; therefore, developing a security model is an important paradigm to secure the data in cloud storage. For this, several crypto algorithms have been designed but still securing the huge data using conventional cryptosystems is a difficult task. Hence, a blockchain strategy was applied to large data transactions; however, offering protection for large data has become a complicated target. Also, it demands more time duration for the encryption and decryption process. To address this issue, the current research has developed a Ring Character Hash (RCH) with Ring Elliptical Curve Cryptography (RECC) Homomorphic model. This proposed model can encrypt and decrypt large-sized files at a time. Consequently, the proposed model’s efficiency is determined by estimating the cryptanalysis property for the proposed algorithm. Finally, some important metrics of the presented model are compared with recent existing approaches thus achieving better results with less processing time and error rate.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13369-021-06347-3</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-3073-8343</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2193-567X |
ispartof | Arabian journal for science and engineering (2011), 2022-08, Vol.47 (8), p.10381-10394 |
issn | 2193-567X 1319-8025 2191-4281 |
language | eng |
recordid | cdi_proquest_journals_2700353213 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Blockchain Cloud computing Computer systems Cryptography Cybersecurity Data storage Encryption Engineering Humanities and Social Sciences multidisciplinary Research Article-Computer Engineering and Computer Science Science |
title | Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T13%3A14%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Preserving%20Data%20Security%20in%20Cloud%20Environment%20Using%20an%20Adaptive%20Homomorphic%20Blockchain%20Technique&rft.jtitle=Arabian%20journal%20for%20science%20and%20engineering%20(2011)&rft.au=Devmane,%20Vidyullata&rft.date=2022-08-01&rft.volume=47&rft.issue=8&rft.spage=10381&rft.epage=10394&rft.pages=10381-10394&rft.issn=2193-567X&rft.eissn=2191-4281&rft_id=info:doi/10.1007/s13369-021-06347-3&rft_dat=%3Cproquest_cross%3E2700353213%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2700353213&rft_id=info:pmid/&rfr_iscdi=true |