Cluster Computing

, Volume 21, Issue 1, pp 115–124 | Cite as

Enhancement of data confidentiality and secure data transaction in cloud storage environment

  • K. L. NeelaEmail author
  • V. Kavitha


Cloud computing is a growing trend in many leading sectors. The task that challenges almost every progressing implementation is security and privacy. In earlier days, corporate /IT sectors were facing more security challenges over the data. Especially in a centralized environment, unauthorized users can easily modify the data without the knowledge of the owner, i.e., security breach is unavoidable. So, it becomes mandatory to secure the data. The proposed model follows the decentralized architecture which does not depend on any third party system. In this model, the data security can be enhanced by using cyclic shift transposition algorithm. For a secure data transmission and retrieval, we use quick response code and hash-based timestamp so that the real-time attacks are stopped or prevented.


Cyclic shift transposition algorithm Quick response Hash based timestamp Cloud computing Security and privacy One time password 


  1. 1.
    Shahzad, F.: State-of-the-art survey on cloud computing security challenges, approaches and solutions. Sci. Direct Procedia Comput. Sci. 37, 357–362 (2014)CrossRefGoogle Scholar
  2. 2.
    Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)CrossRefGoogle Scholar
  3. 3.
    Bala Krishna, M., Dugar, A.: Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel. Pers. Commun. 90(1), 381–398 (2016)CrossRefGoogle Scholar
  4. 4.
    Divya, R., Muthukumarasamy, S: An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 1 October 2015. ISBN 978-1-4799-6480-2Google Scholar
  5. 5.
    Baek, J., Vu, Q.H., Liu, J.K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)CrossRefGoogle Scholar
  6. 6.
    Sreenivasa Rao, Y.: Ä secure and efficient cipher text-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)CrossRefGoogle Scholar
  7. 7.
    Umanandhini, D., TamilSelvan, L., Udhayakumar, S., Vijayasingam, T.: Dynamic authentication for consumer supplies in mobile cloud environment. In: IEEE Third International Conference on Computing Communication and Networking Technologies (ICCCNT), 31 December 2012Google Scholar
  8. 8.
    Chi, P.-W., Lei, C.-L.: Audit-free cloud storage via deniable attribute-based encryption. IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2015.2424882 (2015)
  9. 9.
    Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: IEEE International Conference on Computer Sciences and Convergence Information Technology (ICCIT), 10 February 2011. Electronic ISBN: 978-89-88678-30-5Google Scholar
  10. 10.
    Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group user via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)CrossRefGoogle Scholar
  11. 11.
    Kalai Selvi, R., Kavitha, V.: Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl. 48(22), ISSN 0975-8887 (2012)Google Scholar
  12. 12.
    Gomathi, S., Manimegalai, D.: Keyless cryptography in grid computing using cyclic shift transposition algorithm. J. Theor. Appl. Inf. Technol. 63(1), ISSN 1992-8645 (2014)Google Scholar
  13. 13.
    Oppliger, R.: Contemporary Cryptography, 2nd edn. Artech House Computer Security Series, Norwood (2012)Google Scholar
  14. 14.
    Denso ADC: QR Code Essentials (2011)Google Scholar
  15. 15.
    Wu, W.-C.: Subsampling-based image tamper detection and recovery using quick response code. Int. J. Secur. Appl. 9(7), 201–216 (2015)Google Scholar
  16. 16.
    Liu, Y., Yang, J., Liu, M.: Recognition of QR code with mobile phones. In: IEEE Conference on Chinese Control and Decision, 12 August 2008. Print ISSN: 1948-9439Google Scholar
  17. 17.
  18. 18.
    Haber, S., Stornetta, S.: How to timestamp a digital document. J. Cryptol. 3(2), 99–111 (1991)CrossRefzbMATHGoogle Scholar
  19. 19.
    Gandhi, V.A., Kumbharana, C.K.: Comparative study of Amazon EC2 and Microsoft Azure cloud architecture. Int. J. Adv. Netw. Appl., 117–123. ISSN 0975-0290Google Scholar
  20. 20.
    Alam Hossain, Md, Biddut Hossain, Md, Shafin Uddin, Md, Imtiaz, SMd: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3), 659–665 (2016)Google Scholar
  21. 21.
    Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Efficiency of modern encryption algorithms in cloud computing. Int. J. Emerg. Trends Technol. Comput. Sci. 2(6), (2013).

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity College of EngineeringNagercoil, KanyakumariIndia
  2. 2.Department of Computer Science and EngineeringUniversity College of EngineeringKanchipuramIndia

Personalised recommendations