Abstract
The ever-increasing use of cloud computing and services has raised questions of securely accessing data. Security concernsare a significant hurdle to storing large-scale data in the cloud while controlling and preventing illegal access to data saved in the cloud remains a challenge. Cloud data is managed and owned by a method known as role-based access control (RBAC). Security in role and privileges of users on data objects in RBAC is a cause for concern. In this paper, Double Diagonal Puzzle Encryption Standard - 512 (DDPES-512) has been proposed using reservoir computing. DDPES-512 works on the principle of Advanced Encryption Standard (AES) in which the encryption keys are generated using a Double Diagonal Puzzle (DDP) scheme. The recommended algorithm, DDPES-512 has been compared with ciphertext-policy attribute-based Encryption (CP-ABE) and CP-ABE with anonymization and signature and it was found that DDPES-512 is the more secure algorithm in terms of time taken to generate a secret key (the interval is decreased by 6.45% and the storage overhead of the cloud server was reduced by 12.90% in the cloud environment).
Similar content being viewed by others
Data Availability
- Data and coding will be shared whenever it is required for the review.
References
Whelan, C.: Understanding the networks. In: Networks and national securitydynamics, effectiveness and organization, vol. 1, Wey Court East, Union Road, Surrey, GU 979PT, England Ed., 1st Wey Court East, Union Road, Surrey, GU979PT, England: Ashgate Publishing Ltd, pp. 11–30. [Online]. (2012) Available: https://books.google.co.in
Chen, W., Javidi, B., Chen, X.: Advances in optical security systems. OSA J. Adv. Opt. Photonics. 6(2), 120–155 (Apr. 2014)
National Research Council: Communication Technology and Tele networking. In: Emerging Needs and Opportunities for Human Factors Research, pp. 177–199. The National Academies Press, Washington, DC (1995) [Online]. Available: https://www.nap.edu/catalog/4940
Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (Jan. 2017)
Yassine, A., Singh, S., Hossain, M.S., Muhammad, G.: Iot big data analytics for smart homes with fog and cloud computing. Futur. Gener. Comput. Syst. 91(1), 563–573 (Feb.2019)
Chonglin, G., Huang, H., Jia, X.: Energy Management for Green Big Data Centers. In: Big data management and processing, Ed., 1st edn, pp. 40–68. CRC Press, Boca Raton (2017, Ch., 2) Available: https://www.taylorfrancis.com/books/e/9781315154008
Ali, O., Soar, J., Shrestha, A.: Perceived potential for value creation from cloud computing: a study of the Australian regional government sector. Behav. Inform. Technol. 37(12), 1157–1176 (2018). https://doi.org/10.1080/0144929X.2018.1488991
Pee, L.G., Kankanhalli, A.: Interactions among factors influencing knowledge management in public-sector organizations: a resource-based view. Gov. Inf. Q. 33(1), 188–199 (Jan.2016). https://doi.org/10.1016/j.giq.2015.06.002
Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. (TISSEC). 2(1), 105–135 (Feb.1999). https://doi.org/10.1145/300830.300839
Ahmed, Q.W., Garg, S.: A Cloud computing-based Advanced Encryption Standard. In: Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 205–210. (2019) https://doi.org/10.1109/I-SMAC47947.2019.9032581
Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir: A Key recovery attacks of practical complexity on AES 256 variants with up to 10 rounds. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 299–319
Hababeh, I., Gharaibeh, A., Nofal, S., Khalil, I.: An integrated methodology for big data classification and security for improving cloud systems data mobility. IEEE Access. 7, 9153–9163 (2019). https://doi.org/10.1109/ACCESS.2018.2890099
Zhu, Y., Hu, H.X., Ahn, G.J., Wang, H.X., Wang, S.B.: Provably secure role-based encryption with revocation mechanism. J. Comput. Sci. Technol. 26(4), 697–710 (2011). https://doi.org/10.1007/s11390-011-1169-9
Kumar, M., Singhal, A.: Efficient Implementation of Advanced Encryption Standard (AES) for ARM based Platforms. In: 1st Int’l Conf. on Recent Advances in Information Technology RAIT, Dhanbad, Jharkhand, India, pp. 23–27 (2012)
Jung, T., Li, X.-Y., Wan, Z., Wan, M.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (Jan.2015). https://doi.org/10.1109/TIFS.2014.2368352
Sultan, N.H., Barbhuiya, F.A.: A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment. In: 2016 IEEE World Congress on Services (SERVICES), pp. 75–80. San Francisco, CA (2016)
Sabitha, S., Rajasree, M.S.: Access control-based privacy preserving secure data sharing with hidden access policies in cloud. J. Syst. Archit. 75, 50–58 (Apr.2017). https://doi.org/10.1016/j.sysarc.2017.03.002
Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (Nov.2013). https://doi.org/10.1109/TKDE.2012.180
Hemalatha, L., Shanmugam, D.B., Vignesh, A.: Secure Data Sharing in cloud-based environment using RSA, AES and time scheduling. Int. J. Res. Anal. Rev. 5(3), 1726x–1730x (Jul.2018)
Tsai, K., Leu, F., You, I., Chang, S., Hu, S., Park, H.: Low-power AES data encryption architecture for a LoRaWAN. IEEE Access. 7, 146348–146357 (2019). https://doi.org/10.1109/ACCESS.2019.2941972
Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., Cheng, H.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494, 192–207 (Aug.2019). https://doi.org/10.1016/j.ins.2019.04.051
Yang, L., Han, Z., Huang, Z., Ma, J.: A remotely keyed file encryption scheme under mobile cloud computing. J. Netw. Comput. Appl. 106, 90–99 (Mar.2018). https://doi.org/10.1016/j.jnca.2017.12.017
Kareem, S.M., Rahma, A.M.S.: New method for improving add round key in the advanced encryption standard algorithm. Inf. Secur. J.: A Global Perspective. 30, 1–13 (Jan 2021)
Xu, Q., Tan, C., Zhu, W., Xiao, Y., Fan, Z., Cheng, F.: Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. Futur. Gener. Comput. Syst. 97, 206–226 (2019). https://doi.org/10.1016/j.future.2019.02.067
Wang, X.A., Xhafa, F., Ma, J., Zheng, Z.: Controlled secure social cloud data sharing based on a novel identity-based proxy re-encryption plus scheme. J. Parallel Distrib. Comput. 130, 153–165 (2019). https://doi.org/10.1016/j.jpdc.2019.03.018
Wang, H., Zhang, Y., Chen, K., Sui, G., Zhao, Y., Huang, X.: Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502, 109–124 (2019). https://doi.org/10.1016/j.ins.2019.06.028
Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516, 515–528 (2020). https://doi.org/10.1016/j.ins.2019.12.063
Prabhu kavin, B., Ganapathy, S.: A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput. Netw. 151, 181–190 (2019). https://doi.org/10.1016/j.comnet.2019.01.032
Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (Dec.2013). https://doi.org/10.1109/TIFS.2013.2286456
Trnka, M., Cerny, T., Stickney, N.: Survey of Authentication and Authorization for the Internet of Things. Secur. Commun. Netw. 2018 (2018, Art. no. 4351603). https://doi.org/10.1155/2018/4351603
Hamedani, K., Liu, L., Atat, R., Wu, J., Yi, Y.: Reservoir computing meets smart grids: attack detection using delayed feedback networks. IEEE Trans. Ind. Inform. 14(2), 734–743 (2017)
Gallicchio, C., Micheli, A., Pedrelli, L.: Deep reservoir computing: a critical experimental analysis. Neurocomputing. 268, 87–99 (2017)
Vlachas, P.R., Pathak, J., Hunt, B.R., Sapsis, T.P., Girvan, M., Ott, E., Koumoutsakos, P.: Backpropagation algorithms and reservoir computing in recurrent neural networks for the forecasting of complex spatiotemporal dynamics. Neural Netw. 126, 191–217 (2020)
Ichimura, T., Nakane, R., Tanaka, G., Hirose, A.: A numerical exploration of signal detector arrangement in a spin-wave reservoir computing device. IEEE Access. 9, 72637–72646 (2021)
Al-Bakri, S.H., Mat Kiah, M.L., Zaidan, A.A., Zaidan, B.B., Alam, G.M.: Securing peer-to-peer mobile communications using public key cryptography: new security strategy. Int. J. Phys. Sci. 6(4), 930–938 (2011)
Korda, D.R., Ansong, E.D., Mawuli, D.K.: Securing Data in the Cloud using the SDC Algorithm. Int. J. Comput. Appl. 975, 8887
Sinaga, M.D., Sembiring, N.S.B., Tambunan, F., Sianturi, C.J.M.: Hybrid cryptography WAKE (word auto key encryption) and binary Caesar cipher method for data security. In 2018 6th international conference on cyber and IT service management (CITSM). IEEE, pp. 1-5 (2018, August)
Vamsi, D., Reddy, P.: Electronic health record security in cloud: medical data protection using homomorphic encryption schemes. Smart Medical Data Sensing and IoT Systems Design in Healthcare. IGI Global, 22–47 (2020)
Author information
Authors and Affiliations
Contributions
- Both the authors are equally contributed their skills and effort to produce this article.
Corresponding author
Ethics declarations
I / We declare that “it is not been submitted anywhere before as well as not been published in other journals”. It does not comprise that is outrageous, indecent, deception, stealing, defamatory, or or else opposing to rules. I/we pursued the Journal’s accepted “Publication ethics and malpractice” declaration provided in website of journal in concern part and responsible for the rightness (or copying) and article genuineness.
Conflict of Interest
- Not Applicable.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ahmed, Q.W., Garg, S. Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment. J Grid Computing 20, 33 (2022). https://doi.org/10.1007/s10723-022-09612-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10723-022-09612-3