Abstract
Cloud computing is a growing trend in many leading sectors. The task that challenges almost every progressing implementation is security and privacy. In earlier days, corporate /IT sectors were facing more security challenges over the data. Especially in a centralized environment, unauthorized users can easily modify the data without the knowledge of the owner, i.e., security breach is unavoidable. So, it becomes mandatory to secure the data. The proposed model follows the decentralized architecture which does not depend on any third party system. In this model, the data security can be enhanced by using cyclic shift transposition algorithm. For a secure data transmission and retrieval, we use quick response code and hash-based timestamp so that the real-time attacks are stopped or prevented.
Similar content being viewed by others
References
Shahzad, F.: State-of-the-art survey on cloud computing security challenges, approaches and solutions. Sci. Direct Procedia Comput. Sci. 37, 357–362 (2014)
Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
Bala Krishna, M., Dugar, A.: Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel. Pers. Commun. 90(1), 381–398 (2016)
Divya, R., Muthukumarasamy, S: An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 1 October 2015. ISBN 978-1-4799-6480-2
Baek, J., Vu, Q.H., Liu, J.K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)
Sreenivasa Rao, Y.: Ä secure and efficient cipher text-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)
Umanandhini, D., TamilSelvan, L., Udhayakumar, S., Vijayasingam, T.: Dynamic authentication for consumer supplies in mobile cloud environment. In: IEEE Third International Conference on Computing Communication and Networking Technologies (ICCCNT), 31 December 2012
Chi, P.-W., Lei, C.-L.: Audit-free cloud storage via deniable attribute-based encryption. IEEE Trans. Cloud Comput. doi:10.1109/TCC.2015.2424882 (2015)
Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: IEEE International Conference on Computer Sciences and Convergence Information Technology (ICCIT), 10 February 2011. Electronic ISBN: 978-89-88678-30-5
Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group user via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)
Kalai Selvi, R., Kavitha, V.: Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl. 48(22), ISSN 0975-8887 (2012)
Gomathi, S., Manimegalai, D.: Keyless cryptography in grid computing using cyclic shift transposition algorithm. J. Theor. Appl. Inf. Technol. 63(1), ISSN 1992-8645 (2014)
Oppliger, R.: Contemporary Cryptography, 2nd edn. Artech House Computer Security Series, Norwood (2012)
Denso ADC: QR Code Essentials (2011)
Wu, W.-C.: Subsampling-based image tamper detection and recovery using quick response code. Int. J. Secur. Appl. 9(7), 201–216 (2015)
Liu, Y., Yang, J., Liu, M.: Recognition of QR code with mobile phones. In: IEEE Conference on Chinese Control and Decision, 12 August 2008. Print ISSN: 1948-9439
Guard time. https://guardtime.com/technology/ksi-technology (2016)
Haber, S., Stornetta, S.: How to timestamp a digital document. J. Cryptol. 3(2), 99–111 (1991)
Gandhi, V.A., Kumbharana, C.K.: Comparative study of Amazon EC2 and Microsoft Azure cloud architecture. Int. J. Adv. Netw. Appl., 117–123. ISSN 0975-0290
Alam Hossain, Md, Biddut Hossain, Md, Shafin Uddin, Md, Imtiaz, SMd: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3), 659–665 (2016)
Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Efficiency of modern encryption algorithms in cloud computing. Int. J. Emerg. Trends Technol. Comput. Sci. 2(6), (2013). www.ijettcs.org
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Neela, K.L., Kavitha, V. Enhancement of data confidentiality and secure data transaction in cloud storage environment. Cluster Comput 21, 115–124 (2018). https://doi.org/10.1007/s10586-017-0959-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0959-4