Skip to main content

Advertisement

Log in

Secured two factor authentication, graph based replication and encryption strategy in cloud computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent times, many innovative techniques are enabled in the real-time business environment and becoming more popular day by day in the cloud platform. The IT platform is expecting a whole new level of development by implementing new innovative technologies to a greater extent without employing additional infrastructure. Security is a critical concern in a shared environment in the current era, and it remains unresolved in the cloud. Data replication is also challenging to sustain performance, including data availability, reliability, scalability, bandwidth, access latency, and storage capacity constraints. Hence, data must be replicated to different nodes to achieve greater performance in the shared environment. Once the data is placed on to the backend storage, no proper encryption method is implemented when data is in motion and rest. This research proposes a new method to secure a one-time password in a two-factor authentication mechanism. The research employs, proves, and ensures strong security. The second method proposed in this research is to place the optimal number of replicas on different nodes to offer high availability. The replication using the packing coloring process is performed over multiple servers and optimizes the replica, which leads a path to space efficiency. The final method is a graph-based data encryption strategy that performs encryption on data in backend Redundant Array of Independent Disk (RAID) storage using crypto keys generated by the packing coloring process. The dynamic keystream considered in the proposed research offers better security. This research offers a novel architecture that proves strong security, improved authentication, and optimal replica placement with minimal cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Banerjee A, Hasan M, Rahman MA, Chapagain R (2017) CLOAK: a stream cipher based encryption protocol for mobile cloud computing. IEEE Access 5:17678–17691

    Article  Google Scholar 

  2. Chen TH, Chang TC, Zhu TL (2021) Security-enhanced cloud-based image secret sharing and authentication using POB number system. Multimed Tools Appl 80: 1901–1924, https://doi.org/10.1007/s11042-020-09484-3

  3. Cheng H, Rong C, Qian M, Wang W (2018) Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882. https://doi.org/10.1109/ACCESS.2018.2851599

    Article  Google Scholar 

  4. Chidambaram N, Raj P, Thenmozhi K, … Amirtharajan R (2019) A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78:33837–33863. https://doi.org/10.1007/s11042-019-08166-z

    Article  Google Scholar 

  5. Guo C, Zhuang R, Su C, Liu CZ, Choo KR (2019) Secure and efficient {k}- nearest neighbor query over encrypted uncertain data in cloud-iot ecosystem. IEEE Int Things J 6(6):9868–9879

    Article  Google Scholar 

  6. Jung KD, Moon SJ, Kim JM (2017) Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage. Multimed Tools Appl 76:19983–19999. https://doi.org/10.1007/s11042-016-4016-8

    Article  Google Scholar 

  7. Li J (2019) An efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Indust Inform 15(12):6500–6509

    Article  Google Scholar 

  8. Liu P (2020) Public key encryption secure against related randomness attacks for improved end-to-end security of cloud/edge computing. IEEE Access 8:16750–16759

    Article  Google Scholar 

  9. Liu C, Zhu L, Chen J (2017) Graph encryption for top-k nearest keyword search queries on cloud. IEEE Trans Sustain Comput 2(4):371–381

    Article  Google Scholar 

  10. Mishra K, Obaidat MS, Puthal D, TripathyAK, Choo KR (2018) Graph-based symmetric crypto-system for data confidentiality. IEEE Global Commun Conf (GLOBECOM). 1–6,

  11. Singh JP, Mamta, Kumar S (2015) Authentication and encryption in cloud computing. 2015 Int Conf Smart Technol Manag Comput, Commun, Controls, Energy Mat (ICSTM). : 216–219

  12. Su Y, Wang J, Wang Y, Miao M (2019) Efficient verifiable multi-key searchable encryption in cloud computing. IEEE Access 7:141352–141362

    Article  Google Scholar 

  13. Tseng Y, Tsai T, Huang S, Huang C (2018) Identity-based encryption with cloud revocation authority and its applications. IEEE Trans Cloud Comput 6(4):1041–1053

    Article  Google Scholar 

  14. Wei J, Liu W, Hu X (2018) Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans Cloud Comput 6(4):1136–1148

    Article  Google Scholar 

  15. Xiong H, Sun J (2017) Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Depend Secure Comput 14(4):461–462

    Article  Google Scholar 

  16. Xu D, Fu C, Li G, Zou D, Zhang H, Liu X (2017) Virtualization of the encryption card for trust access in cloud computing. IEEE Access 5:20652–20667

    Article  Google Scholar 

  17. Xue-Zhou (2015) Network data encryption strategy for cloud computing. 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation. Nanchang. 693–697

  18. Zeng P, Choo KR (2018) A new kind of conditional proxy re-encryption for secure cloud storage. IEEE Access 6:70017–70024

    Article  Google Scholar 

  19. Zhang R, Xue R, Liu L (2018) Searchable encryption for healthcare clouds: a survey. IEEE Trans Services Comput 11(6):978–974

    Article  Google Scholar 

Download references

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Lavanya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavanya, S., Saravanakumar, N.M. Secured two factor authentication, graph based replication and encryption strategy in cloud computing. Multimed Tools Appl 82, 16105–16125 (2023). https://doi.org/10.1007/s11042-022-13838-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13838-4

Keywords

Navigation