Skip to main content
Log in

Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

The ever-increasing use of cloud computing and services has raised questions of securely accessing data. Security concernsare a significant hurdle to storing large-scale data in the cloud while controlling and preventing illegal access to data saved in the cloud remains a challenge. Cloud data is managed and owned by a method known as role-based access control (RBAC). Security in role and privileges of users on data objects in RBAC is a cause for concern. In this paper, Double Diagonal Puzzle Encryption Standard - 512 (DDPES-512) has been proposed using reservoir computing. DDPES-512 works on the principle of Advanced Encryption Standard (AES) in which the encryption keys are generated using a Double Diagonal Puzzle (DDP) scheme. The recommended algorithm, DDPES-512 has been compared with ciphertext-policy attribute-based Encryption (CP-ABE) and CP-ABE with anonymization and signature and it was found that DDPES-512 is the more secure algorithm in terms of time taken to generate a secret key (the interval is decreased by 6.45% and the storage overhead of the cloud server was reduced by 12.90% in the cloud environment).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Data Availability

- Data and coding will be shared whenever it is required for the review.

References

  1. Whelan, C.: Understanding the networks. In: Networks and national securitydynamics, effectiveness and organization, vol. 1, Wey Court East, Union Road, Surrey, GU 979PT, England Ed., 1st Wey Court East, Union Road, Surrey, GU979PT, England: Ashgate Publishing Ltd, pp. 11–30. [Online]. (2012) Available: https://books.google.co.in

  2. Chen, W., Javidi, B., Chen, X.: Advances in optical security systems. OSA J. Adv. Opt. Photonics. 6(2), 120–155 (Apr. 2014)

    Article  Google Scholar 

  3. National Research Council: Communication Technology and Tele networking. In: Emerging Needs and Opportunities for Human Factors Research, pp. 177–199. The National Academies Press, Washington, DC (1995) [Online]. Available: https://www.nap.edu/catalog/4940

  4. Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (Jan. 2017)

    Article  Google Scholar 

  5. Yassine, A., Singh, S., Hossain, M.S., Muhammad, G.: Iot big data analytics for smart homes with fog and cloud computing. Futur. Gener. Comput. Syst. 91(1), 563–573 (Feb.2019)

    Article  Google Scholar 

  6. Chonglin, G., Huang, H., Jia, X.: Energy Management for Green Big Data Centers. In: Big data management and processing, Ed., 1st edn, pp. 40–68. CRC Press, Boca Raton (2017, Ch., 2) Available: https://www.taylorfrancis.com/books/e/9781315154008

  7. Ali, O., Soar, J., Shrestha, A.: Perceived potential for value creation from cloud computing: a study of the Australian regional government sector. Behav. Inform. Technol. 37(12), 1157–1176 (2018). https://doi.org/10.1080/0144929X.2018.1488991

    Article  Google Scholar 

  8. Pee, L.G., Kankanhalli, A.: Interactions among factors influencing knowledge management in public-sector organizations: a resource-based view. Gov. Inf. Q. 33(1), 188–199 (Jan.2016). https://doi.org/10.1016/j.giq.2015.06.002

    Article  Google Scholar 

  9. Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. (TISSEC). 2(1), 105–135 (Feb.1999). https://doi.org/10.1145/300830.300839

    Article  Google Scholar 

  10. Ahmed, Q.W., Garg, S.: A Cloud computing-based Advanced Encryption Standard. In: Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 205–210. (2019) https://doi.org/10.1109/I-SMAC47947.2019.9032581

  11. Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir: A Key recovery attacks of practical complexity on AES 256 variants with up to 10 rounds. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 299–319

  12. Hababeh, I., Gharaibeh, A., Nofal, S., Khalil, I.: An integrated methodology for big data classification and security for improving cloud systems data mobility. IEEE Access. 7, 9153–9163 (2019). https://doi.org/10.1109/ACCESS.2018.2890099

    Article  Google Scholar 

  13. Zhu, Y., Hu, H.X., Ahn, G.J., Wang, H.X., Wang, S.B.: Provably secure role-based encryption with revocation mechanism. J. Comput. Sci. Technol. 26(4), 697–710 (2011). https://doi.org/10.1007/s11390-011-1169-9

    Article  MathSciNet  MATH  Google Scholar 

  14. Kumar, M., Singhal, A.: Efficient Implementation of Advanced Encryption Standard (AES) for ARM based Platforms. In: 1st Int’l Conf. on Recent Advances in Information Technology RAIT, Dhanbad, Jharkhand, India, pp. 23–27 (2012)

  15. Jung, T., Li, X.-Y., Wan, Z., Wan, M.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (Jan.2015). https://doi.org/10.1109/TIFS.2014.2368352

    Article  Google Scholar 

  16. Sultan, N.H., Barbhuiya, F.A.: A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment. In: 2016 IEEE World Congress on Services (SERVICES), pp. 75–80. San Francisco, CA (2016)

  17. Sabitha, S., Rajasree, M.S.: Access control-based privacy preserving secure data sharing with hidden access policies in cloud. J. Syst. Archit. 75, 50–58 (Apr.2017). https://doi.org/10.1016/j.sysarc.2017.03.002

    Article  Google Scholar 

  18. Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (Nov.2013). https://doi.org/10.1109/TKDE.2012.180

    Article  Google Scholar 

  19. Hemalatha, L., Shanmugam, D.B., Vignesh, A.: Secure Data Sharing in cloud-based environment using RSA, AES and time scheduling. Int. J. Res. Anal. Rev. 5(3), 1726x–1730x (Jul.2018)

    Google Scholar 

  20. Tsai, K., Leu, F., You, I., Chang, S., Hu, S., Park, H.: Low-power AES data encryption architecture for a LoRaWAN. IEEE Access. 7, 146348–146357 (2019). https://doi.org/10.1109/ACCESS.2019.2941972

    Article  Google Scholar 

  21. Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., Cheng, H.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494, 192–207 (Aug.2019). https://doi.org/10.1016/j.ins.2019.04.051

    Article  MathSciNet  MATH  Google Scholar 

  22. Yang, L., Han, Z., Huang, Z., Ma, J.: A remotely keyed file encryption scheme under mobile cloud computing. J. Netw. Comput. Appl. 106, 90–99 (Mar.2018). https://doi.org/10.1016/j.jnca.2017.12.017

    Article  Google Scholar 

  23. Kareem, S.M., Rahma, A.M.S.: New method for improving add round key in the advanced encryption standard algorithm. Inf. Secur. J.: A Global Perspective. 30, 1–13 (Jan 2021)

    Google Scholar 

  24. Xu, Q., Tan, C., Zhu, W., Xiao, Y., Fan, Z., Cheng, F.: Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. Futur. Gener. Comput. Syst. 97, 206–226 (2019). https://doi.org/10.1016/j.future.2019.02.067

    Article  Google Scholar 

  25. Wang, X.A., Xhafa, F., Ma, J., Zheng, Z.: Controlled secure social cloud data sharing based on a novel identity-based proxy re-encryption plus scheme. J. Parallel Distrib. Comput. 130, 153–165 (2019). https://doi.org/10.1016/j.jpdc.2019.03.018

    Article  Google Scholar 

  26. Wang, H., Zhang, Y., Chen, K., Sui, G., Zhao, Y., Huang, X.: Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502, 109–124 (2019). https://doi.org/10.1016/j.ins.2019.06.028

    Article  MathSciNet  MATH  Google Scholar 

  27. Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516, 515–528 (2020). https://doi.org/10.1016/j.ins.2019.12.063

    Article  MathSciNet  MATH  Google Scholar 

  28. Prabhu kavin, B., Ganapathy, S.: A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput. Netw. 151, 181–190 (2019). https://doi.org/10.1016/j.comnet.2019.01.032

    Article  Google Scholar 

  29. Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (Dec.2013). https://doi.org/10.1109/TIFS.2013.2286456

    Article  Google Scholar 

  30. Trnka, M., Cerny, T., Stickney, N.: Survey of Authentication and Authorization for the Internet of Things. Secur. Commun. Netw. 2018 (2018, Art. no. 4351603). https://doi.org/10.1155/2018/4351603

  31. Hamedani, K., Liu, L., Atat, R., Wu, J., Yi, Y.: Reservoir computing meets smart grids: attack detection using delayed feedback networks. IEEE Trans. Ind. Inform. 14(2), 734–743 (2017)

    Article  Google Scholar 

  32. Gallicchio, C., Micheli, A., Pedrelli, L.: Deep reservoir computing: a critical experimental analysis. Neurocomputing. 268, 87–99 (2017)

    Article  Google Scholar 

  33. Vlachas, P.R., Pathak, J., Hunt, B.R., Sapsis, T.P., Girvan, M., Ott, E., Koumoutsakos, P.: Backpropagation algorithms and reservoir computing in recurrent neural networks for the forecasting of complex spatiotemporal dynamics. Neural Netw. 126, 191–217 (2020)

    Article  Google Scholar 

  34. Ichimura, T., Nakane, R., Tanaka, G., Hirose, A.: A numerical exploration of signal detector arrangement in a spin-wave reservoir computing device. IEEE Access. 9, 72637–72646 (2021)

    Article  Google Scholar 

  35. Al-Bakri, S.H., Mat Kiah, M.L., Zaidan, A.A., Zaidan, B.B., Alam, G.M.: Securing peer-to-peer mobile communications using public key cryptography: new security strategy. Int. J. Phys. Sci. 6(4), 930–938 (2011)

    Google Scholar 

  36. Korda, D.R., Ansong, E.D., Mawuli, D.K.: Securing Data in the Cloud using the SDC Algorithm. Int. J. Comput. Appl. 975, 8887

  37. Sinaga, M.D., Sembiring, N.S.B., Tambunan, F., Sianturi, C.J.M.: Hybrid cryptography WAKE (word auto key encryption) and binary Caesar cipher method for data security. In 2018 6th international conference on cyber and IT service management (CITSM). IEEE, pp. 1-5 (2018, August)

  38. Vamsi, D., Reddy, P.: Electronic health record security in cloud: medical data protection using homomorphic encryption schemes. Smart Medical Data Sensing and IoT Systems Design in Healthcare. IGI Global, 22–47 (2020)

Download references

Author information

Authors and Affiliations

Authors

Contributions

- Both the authors are equally contributed their skills and effort to produce this article.

Corresponding author

Correspondence to Quazi Warisha Ahmed.

Ethics declarations

I / We declare that “it is not been submitted anywhere before as well as not been published in other journals”. It does not comprise that is outrageous, indecent, deception, stealing, defamatory, or or else opposing to rules. I/we pursued the Journal’s accepted “Publication ethics and malpractice” declaration provided in website of journal in concern part and responsible for the rightness (or copying) and article genuineness.

Conflict of Interest

- Not Applicable.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, Q.W., Garg, S. Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment. J Grid Computing 20, 33 (2022). https://doi.org/10.1007/s10723-022-09612-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10723-022-09612-3

Keywords

Navigation