Abstract
In order to safeguard the cloud-based applications, systems, and user access related to them, several technological solutions, policies, and processes are put forward, termed cloud data security. The term Secure Cloud Storage (SCS) signifies the widely used methods ensuring the security of the data. In contrast to conventional methods, such as a digital signature or Media Access Control (MAC), it is not necessary to consider the total records to validate the data integrity. This work proposes a new Security model in the cloud by guaranteeing the security of data in terms of the Encryption and Obfuscation process, the Lightweight Secured Auditable Cloud Storage with Data Dynamics (LSACSDD). The phase of the suggested work is the Secure Storage Phase: Here, the Improved encryption and Improved obfuscation process-based data security is assured in the storage. Here, Improved Elliptic Curve Cryptography (ECC) is proposed as the encryption process, in which, the optimal key is chosen via Self Improved Beluga Whale Optimization (SI-BWO) model. Outsourcing Phase: Here, three different processes take place, they are auditing, proof and verification. Data Dynamic Phase: It is the final phase, where, the functions of the data dynamics method splits into 2 kinds, the deletion/insertion function and the modification function. Finally, the suggested method is validated over the other methods with respect to different security measures.
Similar content being viewed by others
Data availability
The data is avialble in https://github.com/ujjwalll/GACMIS.
Abbreviations
- AES:
-
Advanced Encryption Standard
- AOA:
-
Arithmetic Optimization Algorithm
- AODE:
-
Averaged One Dependence Estimators
- BWO:
-
Beluga Whale Optimization
- BES:
-
Bald Eagle Search
- CSP:
-
Cloud server provider
- CC:
-
Cloud computing
- COA:
-
Cipher Text Only Attack
- CCA:
-
Chosen-Cipher Text Attack
- CPA:
-
Chosen-Plaintext Attack
- CSP:
-
Cloud Service Provider
- DES:
-
Data encryption standard
- EHO:
-
Elephant Herding Optimization
- ECC:
-
Elliptic Curve Cryptography
- IDEA:
-
International data encryption algorithm
- GA:
-
Genetic algorithm
- HASBE:
-
Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control
- HGS:
-
Hunger Games Optimization
- KCA:
-
Known Cipher text Attack
- KPA:
-
Known-Plaintext Attack
- LSACSDD:
-
Lightweight Secured Auditable Cloud Storage with Data Dynamics
- MAC:
-
Media Access Control
- MFO:
-
Moth Flame Optimization
- RSA:
-
Ron Rivest, Adi Shamir and Leonard Adleman
- SecACS:
-
Secured Auditable Cloud Storage
- SNCBQ:
-
Service Constraint Network Condition and Behavior Quality
- SELECT-APSL:
-
SELECT Applicable Only to Parallel Server
- SI-BWO:
-
SelfImproved Beluga Whale Optimization
- TKGC:
-
Trusted Key Generation Center
- QOS:
-
Quality Of Service
- SCS:
-
Secure Cloud Storage
- TAM:
-
Time-Variant Attribute-Based Multitype
- TKGC:
-
Temporal Knowledge Graph Completion
- TSTP:
-
Trust Orient Safe Transmission Protocol
References
Kumaresan S, Shanmugam V (2020) Time-variant attribute-based multitype encryption algorithm for improved cloud data security using a user profile. J Supercomput 76:6094–6112. https://doi.org/10.1007/s11227-019-03118-8
Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S (2022) A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing. Int J Intell Netw 3:16–30
Nugraha Y, Martin A (2021) Towards a framework for trustworthy data security level agreement in cloud procurement. Comput Secur 106:102266
Tahir M, Sardaraz M, Mehmood Z et al (2021) CryptoGA: a cryptosystem based on a genetic algorithm for cloud data security. Cluster Comput 24:739–752. https://doi.org/10.1007/s10586-020-03157-4
Thabit F, Alhomdy S, Jagtap S (2021) A new data security algorithm for cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Netw 2:18–33
Chadwick DW, Fan W, Costantino G, De Lemos R, Di Cerbo F, Herwono I, Manea M, Mori P, Sajjad A, Wang XS (2020) A cloud-edge-based data security architecture for sharing and analysing cyber threat information. Futur Gener Comput Syst 102:710–722
Hataba M, Sherif A, Elkhouly R (2022) Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms. IEEE Access 10:33943–33953. https://doi.org/10.1109/ACCESS.2022.3159249
Ahamad D, Hameed SA, Akhtar M (2022) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ - Comput Inf Sci 34(6):2343–2358
Thabit F, Alhomdy S, Al-Ahdal AH, Jagtap S (2021) A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Glob Transit Proc 2(1):91–99
Lo’ai AT, Saldamli G (2021) Reconsidering big data security and privacy in cloud and mobile cloud systems. J King Saud Univ-Comput Inf Sci 33(7):810–819
Thabit F, Alhomdy S, Jagtap S (2021) Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing. Glob Transit Proc 2(1):100–110
Kim YE et al (2023) 3-Multi ranked encryption with enhanced security in cloud computing. Digit Commun Netw 9(2):313–326
Ismail UM, Islam S (2020) A unified framework for cloud security transparency and audit. J Inf Secur Applic 54:102594
Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA-based data security in the cloud computing environment. Comput Commun 151:539–547
Talha M, Sohail M, Hajji H (2020) Analysis of research on Amazon AWS cloud computing seller data security. Int J Res Eng Innov 4(3):131–136
Premkumar R, Priya SS (2022) Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in the cloud using blockchain. Measurement: Sensors 24:100486
Wenfang Zhang, Heng Jiao, Muhammad Khurram Khan (2022) Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. Comput Secur 125(Cover date: February 2023): Article 103019
Anirudha Pratap, Singh Syam, Kumar Pasupuleti (2016) Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing. Procedia Comput Sci 93:751–759
Li Li, Jiayong Liu (2020) SecACS: Enabling lightweight secure auditable cloud storage with data dynamics. J Inf Secur Applic 54(Cover date: October 2020):Article 102545
Yang J Xu, Weng J, Zhou J, Wong DS (2021) Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans Cloud Comput 9(1):212–225. https://doi.org/10.1109/TCC.2018.2851256
Zhang X, Wang X, Gu D, Xue J, Tang W (2022) Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems. IEEE Trans Netw Serv Manage 19(4):5333–5347. https://doi.org/10.1109/TNSM.2022.3189650
Khedr WI, Khater HM, Mohamed ER (2019) Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage. IEEE Access 7:65635–65651. https://doi.org/10.1109/ACCESS.2019.2917628
Sengupta B, Dixit A, Ruj S (2022) Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques. IEEE Trans Cloud Comput 10(3):2090–2101. https://doi.org/10.1109/TCC.2020.3000342
Liu J, Wang XA, Liu Z, Wang H, Yang X (2020) Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles. IEEE Access 8:79428–79439. https://doi.org/10.1109/ACCESS.2020.2991033
Nayak SK, Tripathy S (2021) SEPDP: Secure and Efficient Privacy-Preserving Provable Data Possession in Cloud Storage. IEEE Trans Serv Comput 14(3):876–888. https://doi.org/10.1109/TSC.2018.2820713
Shen J, Liu D, He D, Huang X, Xiang Y (2020) Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans Sustain Comput 5(2):161–173. https://doi.org/10.1109/TSUSC.2017.2781232
Zheng W, Lai C-F, He D, Kumar N, Chen B (2021) Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment. IEEE Trans Industr Inf 17(6):4238–4247. https://doi.org/10.1109/TII.2020.2991204
Huang K et al (2020) EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J 7(2):882–892. https://doi.org/10.1109/JIOT.2019.2945921
Xu Y et al (2021) Predictive Generalized Graph Fourier Transform for Attribute Compression of Dynamic Point Clouds. IEEE Trans Circ Syst Video Technol 31(5):1968–1982. https://doi.org/10.1109/TCSVT.2020.3015901
Thirumalaisamy M, Basheer S, Selvarajan S, Althubiti SA, Alenezi F, Srivastava G, Lin JCW (2022) Interaction of secure cloud network and crowd computing for smart city data obfuscation. Sensors 22(19):7169
Sun L, Xu C, Zhang Y et al (2020) Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. Int J Inf Secur 19:711–720. https://doi.org/10.1007/s10207-020-00486-8
Man Z, Li J, Di X, Zhang R, Li X, Sun X (2023) Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf Sci 622:629–651
Sawant Adwait Suyog (2022) Enhancing Encryption in Cloud Computing and Reducing Energy Usage by Using PSO-ALO Algorithm to Improve Homomorphic Encryption Technique. Diss. Dublin, National College of Ireland
Prabhakaran V, Kulandasamy A (2023) mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system. J Reliable Intell Environ. https://doi.org/10.1007/s40860-022-00197-y
Laiphrakpam Dolendro Singh, Khumanthem Manglem Singh (2015) Implementation of Text Encryption using Elliptic Curve Cryptography. Procedia Comput Sci 54:73–82
Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl-Based Syst 251:109215
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest
Informed consent
Not Applicable
Ethical approval
Not Applicable
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singh, P., Singh, P. & Agarwal, A.K. Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics. Multimed Tools Appl 83, 37687–37711 (2024). https://doi.org/10.1007/s11042-023-17060-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17060-8