Volume 12 , Issue 2 , PP: 138-149, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Madireddy Swetha 1 * , Kalaivani Kathirvelu 2
Doi: https://doi.org/10.54216/JISIoT.120210
Cloud computing is meant for storing the huge data using third party that ensures that confidential data cannot be accessed by the other users. But with rapid growth of technologies, data in the cloud normally increases which questions its security in storing in the cloud. Hence the protecting the cloud data seeks the strong security levels to counterfeit the different cloud attack. In order to achieve the highest level of security for cloud data, this study suggests a powerful encryption technique that combines chaotic scrolls and logistic maps. The proposed model exhibits the following advantages over the other algorithms: 1) High dynamic key generation 2) ability to counterfeit the multiple attacks 3) High randomness encrypted data which can provide more confusion of hacking from the intruder’s insight. To prove the strength of the proposed model, NIST National Institute of Science and Technology (NIST) is used for significant experiments. in which different statistical tests were carried out to prove the strength of the proposed model. The level of security of the suggested model is also evaluated and investigated using formal analysis using Burrows-Abadi-Needham Logic (BAN). The given model is thoroughly verified using both the Profverif tool and AVISPA. In terms of communication costs and unpredictability, the suggested model's randomness has also been contrasted with that of another existing algorithm. Results demonstrates that the proposed model shows its ability to provide more potent protection to the cloud data than the other existing encryption algorithms.
Cloud Computing, Security , Chaotic Encryption , Scroll and Logistic maps, NIST , Burroes-Abadi-Needham , AVISPA
[1] Ion, M.; Zhang, J.; Schooler, E.M. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-Centric Networking, Hong Kong, China, 12 August 2013; pp. 39–40.
[2] Rahman, Z.; Yi, X.; Khalil, I.; Sumi, M. Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. In Proceedings of the International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Online, 29–30 November 2021; pp. 177–193
[3] Rahaman, Z.; Corraya, A.D.; Sumi, M.A.; Bahar, A.N. A novel structure of advance encryption standard with 3-dimensional dynamic S-Box and key generation matrix. arXiv 2020, arXiv:2005.00157. 7. Ziv, J.; Lempel, A. A universal algorithm for sequential data compression. IEEE Trans. Inf. Theory 1977, 23, 337–343.
[4] Vashi, S.; Ram, J.; Modi, J.; Verma, S.; Prakash, C. Internet of Things (IoT): A vision, architectural elements, and security issues. In Proceedings of the 2017 international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Tamil Nadu, India, 10–11 February 2017; pp. 492–496.
[5] Farooq, U.; Aslam, M.F. Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA. J. King Saud Univ. Comput. Inf. Sci. 2017, 29, 295–302.
[6] Kocarev, L. Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 2001, 1, 6–21.
[7] Mukhopadhyay, S.C.; Suryadevara, N.K. Internet of things: Challenges and opportunities. In Internet of Things; Springer: Berlin/Heidelberg, Germany, 2014; pp. 1–17.
[8] Tausif, M.; Ferzund, J.; Jabbar, S.; Shahzadi, R. Towards designing efficient lightweight ciphers for internet of things. KSII Trans. Internet Inf. Syst. 2017, 11, 4006–4024.
[9] Usman, M.; Ahmed, I.; Aslam, M.I.; Khan, S.; Shah, U.A. SIT: A lightweight encryption algorithm for secure internet of things. arXiv 2017, arXiv:1704.08688.
[10] Indrayani, R.; Nugroho, H.A.; Hidayat, R.; Pratama, I. Increasing the security of mp3 steganography using AES Encryption and MD5 hash function. In Proceedings of the 2016 2nd International Conference on Science and Technology-Computer (ICST), Yogyakarta, Indonesia, 27–28 October 2016; pp. 129–132.
[11] Aljawarneh, S.; Yassein, M.B.; Talafha, W.A. A resource-efficient encryption algorithm for multimedia big data. Multimed. Tools Appl. 2017, 76, 22703–22724
[12] Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C; John Wiley & Sons: Hoboken, NJ, USA, 2007.
[13] M. G. Aruna and K. G. Mohan, "Secured cloud data migration technique by competent probabilistic public key encryption," in China Communications, vol. 17, no. 5, pp. 168-190, May 2020, doi: 10.23919/JCC.2020.05.014.
[14] P. Kanchanadevi, L. Raja, D. Selvapandian and R. Dhanapal, "An Attribute Based Encryption Scheme with Dynamic Attributes Supporting in the Hybrid Cloud," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020, pp. 271-273, doi: 10.1109/I-SMAC49090.2020.9243370.
[15] M. Zeng, H. Qian, J. Chen and K. Zhang, "Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage," in IEEE Transactions on Cloud Computing, vol. 10, no. 1, pp. 426-438, 1 Jan.-March 2022, doi: 10.1109/TCC.2019.2944367.
[16] K. Loganathan and D. Saranya, "An Extensive Web Security Through Cloud Based Double Layer Password Encryption (DLPE) Algorithm for Secured Management Systems," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021, pp. 1-6, doi: 10.1109/ICSCAN53069.2021.9526381.
[17] A. Kumar, "A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020, pp. 198-202, doi: 10.1109/I-SMAC49090.2020.9243340.
[18] H. Li, Y. Yang, Y. Dai, S. Yu and Y. Xiang, "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data," in IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 484-494, 1 April-June 2020, doi: 10.1109/TCC.2017.2769645.
[19] Y. Shin, D. Koo, J. Yun and J. Hur, "Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage," in IEEE Transactions on Services Computing, vol. 13, no. 6, pp. 1021-1033, 1 Nov.-Dec. 2020, doi: 10.1109/TSC.2017.2748594.
[20] Mahmoud Ismail, Naif El-Rashidy, Nabil M. Abdel-aziz, Mobile Cloud Database Security: Problems and Solutions, Journal of Fusion: Practice and Applications, Vol. 7 , No. 1 , (2022) : 15-29 (Doi : https://doi.org/10.54216/FPA.070102)
[21] Faya Safar, Raddad Al King, Data Security in Cloud Computing, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 7 , No. 1 , (2023) : 50-61 (Doi : https://doi.org/10.54216/IJWAC.070105)
[22] D. Chen et al., "Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT," in IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17265-17279, 15 Sept.15, 2022, doi: 10.1109/JIOT.2022.3155355