Skip to main content
Log in

Enhancement of data confidentiality and secure data transaction in cloud storage environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing is a growing trend in many leading sectors. The task that challenges almost every progressing implementation is security and privacy. In earlier days, corporate /IT sectors were facing more security challenges over the data. Especially in a centralized environment, unauthorized users can easily modify the data without the knowledge of the owner, i.e., security breach is unavoidable. So, it becomes mandatory to secure the data. The proposed model follows the decentralized architecture which does not depend on any third party system. In this model, the data security can be enhanced by using cyclic shift transposition algorithm. For a secure data transmission and retrieval, we use quick response code and hash-based timestamp so that the real-time attacks are stopped or prevented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Shahzad, F.: State-of-the-art survey on cloud computing security challenges, approaches and solutions. Sci. Direct Procedia Comput. Sci. 37, 357–362 (2014)

    Article  Google Scholar 

  2. Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)

    Article  Google Scholar 

  3. Bala Krishna, M., Dugar, A.: Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel. Pers. Commun. 90(1), 381–398 (2016)

    Article  Google Scholar 

  4. Divya, R., Muthukumarasamy, S: An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 1 October 2015. ISBN 978-1-4799-6480-2

  5. Baek, J., Vu, Q.H., Liu, J.K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)

    Article  Google Scholar 

  6. Sreenivasa Rao, Y.: Ä secure and efficient cipher text-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)

    Article  Google Scholar 

  7. Umanandhini, D., TamilSelvan, L., Udhayakumar, S., Vijayasingam, T.: Dynamic authentication for consumer supplies in mobile cloud environment. In: IEEE Third International Conference on Computing Communication and Networking Technologies (ICCCNT), 31 December 2012

  8. Chi, P.-W., Lei, C.-L.: Audit-free cloud storage via deniable attribute-based encryption. IEEE Trans. Cloud Comput. doi:10.1109/TCC.2015.2424882 (2015)

  9. Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: IEEE International Conference on Computer Sciences and Convergence Information Technology (ICCIT), 10 February 2011. Electronic ISBN: 978-89-88678-30-5

  10. Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group user via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)

    Article  Google Scholar 

  11. Kalai Selvi, R., Kavitha, V.: Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl. 48(22), ISSN 0975-8887 (2012)

  12. Gomathi, S., Manimegalai, D.: Keyless cryptography in grid computing using cyclic shift transposition algorithm. J. Theor. Appl. Inf. Technol. 63(1), ISSN 1992-8645 (2014)

  13. Oppliger, R.: Contemporary Cryptography, 2nd edn. Artech House Computer Security Series, Norwood (2012)

  14. Denso ADC: QR Code Essentials (2011)

  15. Wu, W.-C.: Subsampling-based image tamper detection and recovery using quick response code. Int. J. Secur. Appl. 9(7), 201–216 (2015)

    Google Scholar 

  16. Liu, Y., Yang, J., Liu, M.: Recognition of QR code with mobile phones. In: IEEE Conference on Chinese Control and Decision, 12 August 2008. Print ISSN: 1948-9439

  17. Guard time. https://guardtime.com/technology/ksi-technology (2016)

  18. Haber, S., Stornetta, S.: How to timestamp a digital document. J. Cryptol. 3(2), 99–111 (1991)

    Article  MATH  Google Scholar 

  19. Gandhi, V.A., Kumbharana, C.K.: Comparative study of Amazon EC2 and Microsoft Azure cloud architecture. Int. J. Adv. Netw. Appl., 117–123. ISSN 0975-0290

  20. Alam Hossain, Md, Biddut Hossain, Md, Shafin Uddin, Md, Imtiaz, SMd: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3), 659–665 (2016)

    Google Scholar 

  21. Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Efficiency of modern encryption algorithms in cloud computing. Int. J. Emerg. Trends Technol. Comput. Sci. 2(6), (2013). www.ijettcs.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. L. Neela.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neela, K.L., Kavitha, V. Enhancement of data confidentiality and secure data transaction in cloud storage environment. Cluster Comput 21, 115–124 (2018). https://doi.org/10.1007/s10586-017-0959-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0959-4

Keywords

Navigation