ArticlePublisher preview available

Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Cloud computing is currently playing an important role in the information technology industry because of its improved efficiency, wide access, low cost, and many benefits. It also provides more space for storing data and transmitting data from one location to another faster for different users on the Internet. Due to large storage, cloud customers can save huge capital investment on IT infrastructure and focus on their own core business. Therefore, many companies or organizations are moving their business to the cloud. However, many customers are reluctant to use the cloud due to security and privacy concerns. To tackle this problem, in this paper, efficient secure data retrieval is developed with the help of multi-stage authentication (MSA) and optimized blowfish algorithm (OBA). The proposed system consists of three modules namely, MSA, data security, and data retrieval. Initially, the cloud users register their information on cloud based on a multi-authentication procedure. After the registration process, the data are encrypted with the help of OBA. To increase the security of the system, the key value is optimally selected with the help of a binary crow search algorithm. After the encryption process, MSA based data retrieval process is performed. This will avoid, un-authorized person to attack the data. The performance of the proposed methodology is implemented in JAVA and performances are analyzed in terms of different metrics.
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
1 3
Journal of Ambient Intelligence and Humanized Computing (2022) 13:151–163
https://doi.org/10.1007/s12652-021-02893-8
ORIGINAL RESEARCH
Efficient secure data retrieval oncloud using multi‑stage
authentication andoptimized blowfish algorithm
S.ImmaculateShyla1· S.S.Sujatha2
Received: 6 March 2020 / Accepted: 8 January 2021 / Published online: 19 March 2021
© The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021
Abstract
Cloud computing is currently playing an important role in the information technology industry because of its improved
efficiency, wide access, low cost, and many benefits. It also provides more space for storing data and transmitting data from
one location to another faster for different users on the Internet. Due to large storage, cloud customers can save huge capital
investment on IT infrastructure and focus on their own core business. Therefore, many companies or organizations are moving
their business to the cloud. However, many customers are reluctant to use the cloud due to security and privacy concerns.
To tackle this problem, in this paper, efficient secure data retrieval is developed with the help of multi-stage authentication
(MSA) and optimized blowfish algorithm (OBA). The proposed system consists of three modules namely, MSA, data security,
and data retrieval. Initially, the cloud users register their information on cloud based on a multi-authentication procedure.
After the registration process, the data are encrypted with the help of OBA. To increase the security of the system, the key
value is optimally selected with the help of a binary crow search algorithm. After the encryption process, MSA based data
retrieval process is performed. This will avoid, un-authorized person to attack the data. The performance of the proposed
methodology is implemented in JAVA and performances are analyzed in terms of different metrics.
Keywords Cloud computing· Multi-stage authentication· Optimized blowfish algorithm· Registration· Binary crow
search algorithm
1 Introduction
In recent years, cloud computing (CC) has made great strides
in the technology industry and the scientific community (De
la Prieta etal. 2019). CC is a computing model that can be
used anywhere, anytime. They only pay the amount based on
usage. This method is called pay-as-you-go fashion (Kumar
etal. 2019). Storage is one of the most influential and needed
computing resources in the current digital era. It is one of
the most popular services in the CC industry (Helmi etal.
2018). Due to a large amount of storage, a lot of organiza-
tions and industries store their data on the cloud. Amazon’s
Elastic Compute Cloud (EC2) and Amazon Simple Storage
Service (S3) and apple icloud are well-known examples of
cloud data storage. However, security is a major issue in
cloud computing. To overcome the security problem, a lot
of cryptography algorithms and access control mechanisms
are introduced. Security goals are set at three points namely,
confidentiality, integrity, and availability. Cryptography is
concerned with the confidentiality of data in the cloud.
To access the cloud storage data, the access control
mechanism is utilized. Access control technology can
not only ensure the valid access requests of valid users
but also prevent the invasion of unauthorized users, as
well as address security issues caused by the misuse of
valid users. Traditional access control is identity-based
authentication technology and operates within the con-
fines of a unified security domain (Vafamehr and Khoda-
yar 2018; Li etal. 2009). For access control mechanisms,
single authentication, biometric authentication, and multi-
authentications methods are developed. The single-stage
authentication approach may steal. Bio-metric authentica-
tion namely, fingerprints, palm prints, hand geometry, face
recognition, voice recognition, iris recognition, and retina
* S. Immaculate Shyla
immaculateshylas1918@gmail.com
1 Department ofComputer Science, St.Alphonsa College
ofArts andScience, Affiliated toManonmaniam Sundaranar
University, Tirunelveli, Nagercoil, India
2 Department ofComputer Applications, S. T. Hindu College,
Manonmaniam Sundaranar University, Tirunelveli, India
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... In order to avoid the interference caused by the rapid change of the scene during the monitoring process, it is necessary to segment the visual image pixels in the area of abnormal conditions of the personnel in the prison and replace the traditional features with small features to meet the requirements of real time [33]. The method is as follows: according to the characteristic analysis of the intelligent monitoring and tracking image of the personnel monitoring area, the probability that a person's body pixel in the image belongs to the background value [34,35]. ...
Article
Full-text available
In order to realize the security of prison perimeter, a prison perimeter intelligent monitoring system based on cloud intelligence technology is designed. Based on the multisupply chain collaboration framework, the prison network interface submodule and sniffer monitoring structure are connected on demand to complete the hardware execution environment of the prison perimeter intelligent monitoring system. Analyze the specific service mode of the cloud smart technology host, set the necessary cloud smart technology service monitoring protocol, judge the processing information parameters, select the prison perimeter remote communication port number, set the prison perimeter network IP address and password program, complete the construction of the software execution environment of the monitoring system, and intelligently monitor and track the abnormal conditions around the prison; combined with the relevant hardware and software structure, the design of prison perimeter intelligent monitoring system based on cloud intelligence technology is realized. The experimental results show that the DPI index of the designed system has an obvious upward trend, and the processing results are close to the original image results to avoid the impact caused by the change of monitoring scene.
... In this manuscript, the AES encryption algorithm is utilized to encrypt the data files by the data owners. By doing so, searching over EncDta files is a tedious operation [10]- [15]. Upon receiving the request from the data, the user administration server authenticates the user. ...
Article
Full-text available
The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume of data from a wide range of sources must be stored on a safe platform. Maintaining such a large volume of data on a single computer or hard drive is impracticable. As a result, the cloud is the ideal platform for storing any quantity of data. An advantage of storing data in the cloud is that it may be accessed at any time and from any device. However, the security of data stored in the cloud is a big concern. Because of this, despite the benefits, most users are reluctant to move their papers to the cloud. The data should be encrypted before sending it off to the cloud service provider to avoid this issue. It's a great way to increase the security of your papers. According to a new technique presented in the system, data may be searched across encrypted files without compromising the privacy and security of various data owners. Implementing the pallier homomorphic encryption method makes it possible to perform computations on encrypted data without decryption.
... Assuming that the retrieval time of the data elements in each data bucket obtained from the division of Wushu teaching data is X, the calculation formula of the mathematical expected value E(X) B of the random variable is as follows [11,12]: ...
Article
Full-text available
The existing teaching quality evaluation methods cannot calculate the distance between the data points of teaching dataset and the center points of the large density grid, which leads to the poor classification of teaching data and the low accuracy of teaching quality evaluation. Therefore, a method of teaching quality evaluation of Wushu based on fuzzy clustering is proposed. In order to improve the comprehensiveness of teaching quality evaluation, the lost data of teaching resources were recovered. Based on this, the grid index of martial arts teaching data is established, and the relationship model between teaching quality and martial arts achievement is constructed. Based on the characteristics of Wushu teaching resources, the fuzzy clustering method is introduced to calculate the distance between each data point and the grid center with high data density. The experimental results show that the evaluation accuracy of the teaching quality is high, and the lost data can be accurately recovered. The evaluation efficiency, reliability, and stability of Wushu teaching quality are ideal.
... Günümüzde işletmeler geleneksel yazılım veya uygulamaların yerine CC'yi faaliyetlerine ekleyerek, daha uygun maliyet, hızlı erişim ve kolay kurulum olanağı sağlamaktadır (Çark, 2020b). Literatür incelendiğinde muhasebe alanında bulut bilişimin kullanılması "bulut muhasebe" olarak ifade edilmektedir (Khanom, 2017;Aksu, 2017;Buyruk-Akbaba, 2019;Arslan, 2020;Allahverdi, 2017;Arsenie-Samoil, 2011;Ionescu, Ionescu, Bendovschi & Tudoran, 2013;Dimitria & Matei, 2015;Kırlı, Ersöz, Kulu & Tokmak, 2017;Uslu, Gür, Eren & Özcan, 2020;Weir, Aßmuth, Whittington & Duncan, 2017;Aini, Rahardja, Arribathi & Santoso, 2019;Nanyun & Xu, 2021;Ou & Zhang, 2021;Li & Sun, 2021;Shyla & Sujatha, 2021). Başka bir ifadeyle, muhasebe yazılım işletmelerinin bulut bilişim teknolojisini kullanması sonucu bulut muhasebe kavramı ortaya çıkmıştır (Aksu, 2017:87). ...
Preprint
Full-text available
Cloud computing is becoming increasingly popular in the IT business because of its higher performance, widespread access, cheap cost, and other benefits. It is also a pay-as-you-go approach; hence, anyone can access cloud data from anywhere, and it is employed in education platforms for online classes due to its ease of use. However, many educational institutions hesitate to use the cloud educational platform due to security and privacy issues. Hence in this study, the performance analysis of various cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Advanced encryption standard (AES), Two Fish, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (TDES) and role-based access control (RBAC) was analyzed and compared with each other in a view to ensuring the protection of cloud data storage used for educational purpose in the NPTEL database. Encryption time, decryption time, and retrieval time with different data sizes were used as performance evaluation factors to figure out the best End-To-End Encryption security in a network system. Moreover, an ElGamal SBO with Delta Competitive NN Cryptography has been proposed in which ElGamal Stag beetle optimization performs ElGamal encryption with the generation of an optimized key with low execution time, thereby allowing only authorized users to access the educational data in the cloud and the data transmission has been secured using Delta Competitive NN that minimizes vulnerable attacks while controlling the decryption activity. Results showed that the proposed ElGamal SBO with Delta Competitive NN Cryptography performs better than all other techniques in terms of retrieval time, encryption time, communication cost, computational overhead and decryption time and hence when applied in a security scenario, it can improve the encryption effectiveness.
Article
Full-text available
Many encryption strategies have been applied to ensure data confidentiality and improve cloud security. The most recent cryptosystems are based on homomorphic (HE), attribute-based (ABE), and hybrid encryption. However, most of them suffer from numerous drawbacks: high time consumption, encrypted message size, and some vulnerabilities. Hence, a secure method is highly required to get a satisfying security level while keeping the computational complexity reduced. This paper outlines a novel technique that combines elliptic curve cryptography (ECC) and Blockchain technology. The data is first encoded using the Elliptic Curve Integrated Encryption Scheme, then signed using signed using the Elliptic Curve Digital Signature Algorithm, and finally confirmed by the blockchain network before being stored in the cloud. The performance evaluation results prove that the proposed system is highly resistant to man-in-the-middle and replay attacks and performs better than a set of existing solutions in terms of cryptography cost, encryption/decryption time, and algortithm complexity.
Article
This paper designs a new batching program to extract the original data, which helps to traverse the entire sample space quickly and provides a new approach for data extraction based on the motion stroke diagram. The designed program can read thousands of files out of many folders instantly and automatically. Meanwhile, thousands of time nodes are calculated based on the proportional coefficients. Finally, experimental data of many folders are separated into sample space easily and rapidly. The original data, the extracted stroke data, and the name and address of every folder and file are output in the result. The program designed in this paper at the maximum processing speed needs only 0.015 seconds to read, compute, and extract the correlative data information from one file (s/f), and the average time threshold is 0.0866 seconds. The Linear Theory (LT), optimizing Sparrow Search Algorithm (OSSA), and the automatic batch read file method can be employed to obtain the optimal result of data extraction. Through 744 rounds of nine experiments, the Average Processing Speed (APS) is less than 0.110 seconds per second data segment (s/ess). The APS is increased by 79.73%. The accuracy of fault classification and forecast of the eigenvalue extracted from the Automatic Batch Reading File (ABRF) and the Ensemble Empirical Mode Decomposition (EEMD) method is improved by 9% and 13% by Self-Organized Mapping (SOM). It is validated that our proposed data extraction method is faster and more progressive than the existing ones.
Article
Full-text available
Information and communication technology has altered businesses’ operations, with a host of established and new banks launching online banking products and services. Banks encourage their customers to use online banking facilities because these facilities reduce transaction costs, improve customer retention, increase the customer share of wallet, and enhance customer services. Many customers also prefer Internet banking channels because of their convenience and the freedom they offer. Although Internet banking offers substantial benefits and opportunities, it does involve security risks associated with sensitive transactions and accessing critical information over public networks. To secure Internet banking activities and maintain the trust and confidence of customers, numerous banks have adopted technical countermeasures, such as two-factor or multi-factor authentication, to prevent cyberattacks, online fraud, and unauthorized access to bank accounts. However, the use of two-factor authentication is inadequate for protecting customers’ accounts against takeover by cyber criminals. Multi-factor authentication services along with related security techniques lead to two considerable barriers: (1) the high cost of deployment and maintenance and (2) the complex integration between authentication processes and online banking systems. This paper presents an alternative model for the authentication of online banking customers and transactions through use of a hash-based multi-server authentication scheme in conjunction with a smart card. The proposed system provides strong security features and low maintenance costs for financial institutions’ Internet banking platforms. The proposed mechanism can be associated with a customized interface and thus easily integrated into existing banking systems for use in Internet banking applications.
Article
Full-text available
Cloud computing is an eminent technology for providing a data storage facility with efficient storage, maintenance, management and remote backups. Hence, user data are shifted from customary storage to cloud storage. In this transfer, the sensitive attributes are also shifted to cloud storage with high-end security. Current security techniques are processed with high encryption time and provide identical security of entire data with single key dependent. These processes are taking high computational time and leaks entire information if the key is hacked. The proposed Group Key Based Attribute Encryption using Modified Random Fibonacci Cryptographic (MRFC) technique rectifies these issues. Instead of machine learning technique, data owner preference-based attributes segregation is used to divide an input dataset into sensitive and non-sensitive attribute groups. Based on inter-organization usage and data owner’s willingness, sensitive attribute is divided into ‘n + 1′ subgroups and each subgroup is encrypted by ‘n + 1’ group keys. The encrypted sensitive subgroups are merged with non-sensitive attributes and uploaded into a private cloud. The novelties of this paper are, (1) data owner preferred sensitive attribute classification instead of machine learning algorithms, (2) sensitive attribute encryption instead of entire attributes, (3) To reduce encryption time without compromising data owner privacy, (4) To decrypt and access the required subgroup instead of the entire attribute. Our experimental results show that, the proposed method takes minimal processing time, better classification accuracy and minimal memory space with high security to selected attributes as compared to existing classification and security techniques. Hence, sensitive data security and privacy is achieved with minimal processing cost.
Article
Full-text available
The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical entities so that controlling the shared data is not possible for patients at all. The importance of medical data as possessions of people and the system leads us to be concerned about its security, privacy, and accessibility. How to store and controlling access to medical information is of the most important challenges in the electronic health area. The present paper provides a new, secure, and efficient scheme based on blockchain technology and attribute-based encryption entitled “MedSBA” to record and store medical data, indicating that our proposed scheme protects user privacy and allows fine-grain access control of medical patient data based on General Data Protection Regulation (GDPR). Private blockchains are used in MedSBA to improve the right to revoke instant access which is of the attribute-based encryption challenges. The security and functionality of our proposed scheme are proved within a formal model and based on BAN logic, respectively; simulating the MedSBA scheme in the OPNET software as well as examining its computational complexity and storage indicates the efficiency of the present scheme.
Article
Full-text available
Privacy preservation is a major task in cloud based applications. Many applications are built in the cloud for their economic benefits and operational convenience. The obtained information in the cloud is often seen as valuable for individuals through malicious intent. There is a lot of personal information and potentially secure data that people stored on their computers, and this information is generally transferred to the cloud. In this document, we propose an efficient index based quasi- identifier approach to ensure privacy preservation and achieve high data utility over incremental and distributed data sets. The modified Fuzzy C Means algorithm is used to construct the clusters by similarity. Anonymised data is retrieved by means of tuple partitioning in the data sets. Analysis results illustrate that the proposed method is more efficient for preserving privacy on incremental data sets than existing approaches. It is implemented in the working platform of Java.
Article
Full-text available
In recent years, the block chain technology considered as adaptable compared to other techniques. Many of the industry, understanding the block chain technology is utilizing for financial services and its transactions but it also effective in other sectors like healthcare industry. Existing methods are hazardous; where, data stored in outsider servers might be eavesdropped, stolen, or legitimate way. Nevertheless, the trustworthiness of storage server architecture relies upon dependability of single service provider. The security manager’s detect the which are client(s) can get to a specific part of the data. However, the existing method is increasingly failed to maintain access control, record transaction authentications with anonymous interruptions. The paper proposes a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for addressing health record information transaction between the patient, doctor, service providers, and institutions in a privacy-preserving way. The work provides a healthcare sector with block chain technology. In health care, the work enables the patient to control and share their health record into cloud storage easily in a secured manner without any violation of privacy. It provides an effective way to ensure the patient data privately in intelligent health care systems. The paper indicates the system built in a decentralized computing system to assure trusted third party for conducting computation over patient data without violating the privacy. Based on Experimental result, the SEHRTB algorithm reduces 2.05 latency, 1.08 ET (execution time), and improves 30.5% throughput compared than existing approaches.
Article
Full-text available
Nowadays, various online education platforms (such as MOOCs, Coursera, XuetangX and so on) not only provide a broad Internet environment for sharing multimedia learning resources, but also bring a series of challenges in digital rights management, such as the infringement of digital copyrights of multimedia learning resources, the insecurity of digital education certificates, and the low degree of openness of multimedia learning resources. To sovle these issues, we propose a blockchain-enabled digital rights management system, which includes an entirely new network architecture for sharing and managing multimedia resources of online education on the basis of the combination of the public and private blockchains, as well as three specific smart contract schemes for the realization of the recording of multimedia digital rights, the secure storage and the unmediated verification of digital certificates, respectively. The proposed blockchain-enabled digital rights management system has been demonstrated as a promising candidate solution to the blockchain-based multimedia data protection in an online education environment.
Chapter
Modern technological advances have given rise to the popularity and success of cloud in organizations and industries because it provides data storage facility and computing services at minimal cost. Data security is one of the important requirements for outsourced data in a cloud storage environment. It also brings new security vulnerabilities for assuring the data confidentiality, data integrity and data access control. Data security of a cloud system depends heavily on the cloud service provider, data owner and cloud users. So, there needs to be some methodology to monitor security vulnerabilities and providing data security in cloud environment. Now a day’s providing data security in cloud storage is one of the most critical tasks. For the past few years many works have been done to assure data security but they are failed in providing data security such as information leakage, secret-key management, cloud-user authentication, breach of data confidentiality, because of collusion attack and lots of computational activities (because of large number of secret keys).In this paper, we used threshold cryptography technique for providing data security in cloud storage system. Proposed approach addresses the data security issues in cloud system more efficiently. In this Threshold cryptography technique data owner create users in groups based on place or location, project, and department, data owner allocates single secret key to each group of users for decryption of data and every users in the group shares parts or pieces of the secret key. Proposed methodology also uses data access control list to control the data access. Proposed approach provides data security more efficiently, it also increases the performance of the system and also it minimizes the number of secret keys.
Article
In the state of the art, there are very few studies on agent-based Cloud Computing. Nevertheless, this is an emerging trend and the number of studies and applications in this field is beginning to increase. Cloud Computing and Agents are complementary technologies. The features of Cloud Computing can provide advanced computational characteristics to multi-agent systems. In turn, the inclusion of agent systems in the core of the Cloud platform makes it possible to incorporate different functionalities, such as reasoning and learning capabilities. This study analyzes the emerging relationship between both distributed systems. Specifically, this study proposes a new classification from the point of view of Cloud Computing, based on the reference architecture proposed by the National Institute of Standards and Technology and the different responsibilities of each of the roles that participate in the Cloud Computing paradigm as identified in the architecture: Provider, Consumer, Broker, Carrier and Auditor.
Article
Cloud computing delivers highly scalable and flexible computing and storage resources on pay-per-use policy. Cloud Computing's services for computation and storage are getting increasingly popular and many organizations are now moving their data from in-house data centers to the Cloud Storage Providers (CSPs). However, increasing user base and remote storage of data introduces challenges like inefficient usage of resources and insider threat to data at rest in the cloud storage. Time varying workload and data intensive applications are vulnerable to encounter such challenges while using cloud computing services. The consolidation of virtual machines to minimize the total number of active servers is a promising solution to conserve the energy but it requires efficient resource management strategies. Additionally, the encryption strategies and third party auditors to maintain data integrity are still in their developing stage and therefore the data at rest is still a concern for the cloud storage users. In this paper, we designed a distributed storage allocation architecture for fair utilization of storage resources and we also design an integrated end to end security framework for data at rest in cloud storage to eliminate insider threats.