Skip to main content
Log in

Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to safeguard the cloud-based applications, systems, and user access related to them, several technological solutions, policies, and processes are put forward, termed cloud data security. The term Secure Cloud Storage (SCS) signifies the widely used methods ensuring the security of the data. In contrast to conventional methods, such as a digital signature or Media Access Control (MAC), it is not necessary to consider the total records to validate the data integrity. This work proposes a new Security model in the cloud by guaranteeing the security of data in terms of the Encryption and Obfuscation process, the Lightweight Secured Auditable Cloud Storage with Data Dynamics (LSACSDD). The phase of the suggested work is the Secure Storage Phase: Here, the Improved encryption and Improved obfuscation process-based data security is assured in the storage. Here, Improved Elliptic Curve Cryptography (ECC) is proposed as the encryption process, in which, the optimal key is chosen via Self Improved Beluga Whale Optimization (SI-BWO) model. Outsourcing Phase: Here, three different processes take place, they are auditing, proof and verification. Data Dynamic Phase: It is the final phase, where, the functions of the data dynamics method splits into 2 kinds, the deletion/insertion function and the modification function. Finally, the suggested method is validated over the other methods with respect to different security measures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The data is avialble in https://github.com/ujjwalll/GACMIS.

Abbreviations

AES:

Advanced Encryption Standard

AOA:

Arithmetic Optimization Algorithm

AODE:

Averaged One Dependence Estimators

BWO:

Beluga Whale Optimization

BES:

Bald Eagle Search

CSP:

Cloud server provider

CC:

Cloud computing

COA:

Cipher Text Only Attack

CCA:

Chosen-Cipher Text Attack

CPA:

Chosen-Plaintext Attack

CSP:

Cloud Service Provider

DES:

Data encryption standard

EHO:

Elephant Herding Optimization

ECC:

Elliptic Curve Cryptography

IDEA:

International data encryption algorithm

GA:

Genetic algorithm

HASBE:

Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control

HGS:

Hunger Games Optimization

KCA:

Known Cipher text Attack

KPA:

Known-Plaintext Attack

LSACSDD:

Lightweight Secured Auditable Cloud Storage with Data Dynamics

MAC:

Media Access Control

MFO:

Moth Flame Optimization

RSA:

Ron Rivest, Adi Shamir and Leonard Adleman

SecACS:

Secured Auditable Cloud Storage

SNCBQ:

Service Constraint Network Condition and Behavior Quality

SELECT-APSL:

SELECT Applicable Only to Parallel Server

SI-BWO:

SelfImproved Beluga Whale Optimization

TKGC:

Trusted Key Generation Center

QOS:

Quality Of Service

SCS:

Secure Cloud Storage

TAM:

Time-Variant Attribute-Based Multitype

TKGC:

Temporal Knowledge Graph Completion

TSTP:

Trust Orient Safe Transmission Protocol

References

  1. Kumaresan S, Shanmugam V (2020) Time-variant attribute-based multitype encryption algorithm for improved cloud data security using a user profile. J Supercomput 76:6094–6112. https://doi.org/10.1007/s11227-019-03118-8

    Article  Google Scholar 

  2. Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S (2022) A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing. Int J Intell Netw 3:16–30

    Google Scholar 

  3. Nugraha Y, Martin A (2021) Towards a framework for trustworthy data security level agreement in cloud procurement. Comput Secur 106:102266

    Article  Google Scholar 

  4. Tahir M, Sardaraz M, Mehmood Z et al (2021) CryptoGA: a cryptosystem based on a genetic algorithm for cloud data security. Cluster Comput 24:739–752. https://doi.org/10.1007/s10586-020-03157-4

    Article  Google Scholar 

  5. Thabit F, Alhomdy S, Jagtap S (2021) A new data security algorithm for cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Netw 2:18–33

    Google Scholar 

  6. Chadwick DW, Fan W, Costantino G, De Lemos R, Di Cerbo F, Herwono I, Manea M, Mori P, Sajjad A, Wang XS (2020) A cloud-edge-based data security architecture for sharing and analysing cyber threat information. Futur Gener Comput Syst 102:710–722

    Article  Google Scholar 

  7. Hataba M, Sherif A, Elkhouly R (2022) Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms. IEEE Access 10:33943–33953. https://doi.org/10.1109/ACCESS.2022.3159249

    Article  Google Scholar 

  8. Ahamad D, Hameed SA, Akhtar M (2022) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ - Comput Inf Sci 34(6):2343–2358

    Google Scholar 

  9. Thabit F, Alhomdy S, Al-Ahdal AH, Jagtap S (2021) A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Glob Transit Proc 2(1):91–99

    Article  Google Scholar 

  10. Lo’ai AT, Saldamli G (2021) Reconsidering big data security and privacy in cloud and mobile cloud systems. J King Saud Univ-Comput Inf Sci 33(7):810–819

    Google Scholar 

  11. Thabit F, Alhomdy S, Jagtap S (2021) Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing. Glob Transit Proc 2(1):100–110

    Article  Google Scholar 

  12. Kim YE et al (2023) 3-Multi ranked encryption with enhanced security in cloud computing. Digit Commun Netw 9(2):313–326

    Article  Google Scholar 

  13. Ismail UM, Islam S (2020) A unified framework for cloud security transparency and audit. J Inf Secur Applic 54:102594

    Google Scholar 

  14. Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA-based data security in the cloud computing environment. Comput Commun 151:539–547

    Article  Google Scholar 

  15. Talha M, Sohail M, Hajji H (2020) Analysis of research on Amazon AWS cloud computing seller data security. Int J Res Eng Innov 4(3):131–136

    Article  Google Scholar 

  16. Premkumar R, Priya SS (2022) Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in the cloud using blockchain. Measurement: Sensors 24:100486

  17. Wenfang Zhang, Heng Jiao, Muhammad Khurram Khan (2022) Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. Comput Secur 125(Cover date: February 2023): Article 103019

  18. Anirudha Pratap, Singh Syam, Kumar Pasupuleti (2016) Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing. Procedia Comput Sci 93:751–759

  19. Li Li, Jiayong Liu (2020) SecACS: Enabling lightweight secure auditable cloud storage with data dynamics. J Inf Secur Applic 54(Cover date: October 2020):Article 102545

  20. Yang J Xu, Weng J, Zhou J, Wong DS (2021) Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans Cloud Comput 9(1):212–225. https://doi.org/10.1109/TCC.2018.2851256

  21. Zhang X, Wang X, Gu D, Xue J, Tang W (2022) Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems. IEEE Trans Netw Serv Manage 19(4):5333–5347. https://doi.org/10.1109/TNSM.2022.3189650

    Article  Google Scholar 

  22. Khedr WI, Khater HM, Mohamed ER (2019) Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage. IEEE Access 7:65635–65651. https://doi.org/10.1109/ACCESS.2019.2917628

    Article  Google Scholar 

  23. Sengupta B, Dixit A, Ruj S (2022) Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques. IEEE Trans Cloud Comput 10(3):2090–2101. https://doi.org/10.1109/TCC.2020.3000342

  24. Liu J, Wang XA, Liu Z, Wang H, Yang X (2020) Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles. IEEE Access 8:79428–79439. https://doi.org/10.1109/ACCESS.2020.2991033

    Article  Google Scholar 

  25. Nayak SK, Tripathy S (2021) SEPDP: Secure and Efficient Privacy-Preserving Provable Data Possession in Cloud Storage. IEEE Trans Serv Comput 14(3):876–888. https://doi.org/10.1109/TSC.2018.2820713

  26. Shen J, Liu D, He D, Huang X, Xiang Y (2020) Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans Sustain Comput 5(2):161–173. https://doi.org/10.1109/TSUSC.2017.2781232

  27. Zheng W, Lai C-F, He D, Kumar N, Chen B (2021) Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment. IEEE Trans Industr Inf 17(6):4238–4247. https://doi.org/10.1109/TII.2020.2991204

    Article  Google Scholar 

  28. Huang K et al (2020) EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J 7(2):882–892. https://doi.org/10.1109/JIOT.2019.2945921

    Article  Google Scholar 

  29. Xu Y et al (2021) Predictive Generalized Graph Fourier Transform for Attribute Compression of Dynamic Point Clouds. IEEE Trans Circ Syst Video Technol 31(5):1968–1982. https://doi.org/10.1109/TCSVT.2020.3015901

    Article  Google Scholar 

  30. Thirumalaisamy M, Basheer S, Selvarajan S, Althubiti SA, Alenezi F, Srivastava G, Lin JCW (2022) Interaction of secure cloud network and crowd computing for smart city data obfuscation. Sensors 22(19):7169

    Article  Google Scholar 

  31. Sun L, Xu C, Zhang Y et al (2020) Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. Int J Inf Secur 19:711–720. https://doi.org/10.1007/s10207-020-00486-8

    Article  Google Scholar 

  32. Man Z, Li J, Di X, Zhang R, Li X, Sun X (2023) Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf Sci 622:629–651

    Article  Google Scholar 

  33. Sawant Adwait Suyog (2022) Enhancing Encryption in Cloud Computing and Reducing Energy Usage by Using PSO-ALO Algorithm to Improve Homomorphic Encryption Technique. Diss. Dublin, National College of Ireland

  34. Prabhakaran V, Kulandasamy A (2023) mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system. J Reliable Intell Environ. https://doi.org/10.1007/s40860-022-00197-y

    Article  Google Scholar 

  35. Laiphrakpam Dolendro Singh, Khumanthem Manglem Singh (2015) Implementation of Text Encryption using Elliptic Curve Cryptography. Procedia Comput Sci 54:73–82

  36. Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl-Based Syst 251:109215

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabhdeep Singh.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest

Informed consent

Not Applicable

Ethical approval

Not Applicable

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, P., Singh, P. & Agarwal, A.K. Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics. Multimed Tools Appl 83, 37687–37711 (2024). https://doi.org/10.1007/s11042-023-17060-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17060-8

Keywords

Navigation