Skip to main content

Advertisement

Log in

Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cloud computing is currently playing an important role in the information technology industry because of its improved efficiency, wide access, low cost, and many benefits. It also provides more space for storing data and transmitting data from one location to another faster for different users on the Internet. Due to large storage, cloud customers can save huge capital investment on IT infrastructure and focus on their own core business. Therefore, many companies or organizations are moving their business to the cloud. However, many customers are reluctant to use the cloud due to security and privacy concerns. To tackle this problem, in this paper, efficient secure data retrieval is developed with the help of multi-stage authentication (MSA) and optimized blowfish algorithm (OBA). The proposed system consists of three modules namely, MSA, data security, and data retrieval. Initially, the cloud users register their information on cloud based on a multi-authentication procedure. After the registration process, the data are encrypted with the help of OBA. To increase the security of the system, the key value is optimally selected with the help of a binary crow search algorithm. After the encryption process, MSA based data retrieval process is performed. This will avoid, un-authorized person to attack the data. The performance of the proposed methodology is implemented in JAVA and performances are analyzed in terms of different metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  • Bai TDP, Raj KM, Rabara SA (2017) Elliptic curve cryptography based security framework for internet of things (IoT) enabled smart card. In: 2017 World congress on computing and communication technologies (WCCCT) IEEE, pp 43–46

  • Brindha T, Shaji RS (2018) A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Comput 22(3):1013–1022

    Article  Google Scholar 

  • Burger PM (2001) Biometric authentication system. U.S. Patent 6(219): 439

  • Cheng H, Rong C, Qian M, Wang W (2018) Accountable Privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882

    Article  Google Scholar 

  • De la Prieta F, Rodríguez-González S, Chamoso P, Corchado JM, Bajo J (2019) Survey of agent-based cloud computing applications. Future Gener Comput Syst 100:223–236

    Article  Google Scholar 

  • Delfs H, Knebl H, Knebl H (2002) Introduction to cryptography, vol 2. Springer, Heidelberg

    Book  Google Scholar 

  • Dinesha HA, Agrawal VK (2012) Multi-level authentication technique for accessing cloud services. In: 2012 international conference on computing, communication and applications IEEE, pp 1–4

  • Guo J, Li C, Zhang G, Sun Y, Bie R (2019) Blockchain-enabled digital rights management for multimedia resources of online education. Multim Tools Appl 1–21

  • Helmi AM, Farhan MS, Nasr MM (2018) A framework for integrating geospatial information systems and hybrid cloud computing. Comput Electr Eng 67:145–158

    Article  Google Scholar 

  • Kang HS, Son JH, Hong CS (2015) Defense technique against spoofing attacks using reliable ARP table in cloud computing environment. In: 2015 17th Asia–Pacific network operations and management symposium (APNOMS) IEEE, pp 592–595

  • Kanna GP, Vasudevan V (2019) A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Computing 22(4):9561–9569

    Article  Google Scholar 

  • Kumar M, Sharma SC, Goel A, Singh SP (2019) A comprehensive survey for scheduling techniques in cloud computing. J Netw Comput Appl 143:1–33

    Article  Google Scholar 

  • Kushida T, Pingali GS (2014) Industry cloud-effective adoption of cloud computing for industry solutions. In: 2014 IEEE 7th international conference on cloud computing IEEE, pp 753–760

  • Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: IEEE international conference on cloud computing Springer, Berlin, pp 157–166

  • Meyers RK, Desoky AH (2008) An implementation of the Blowfish cryptosystem. In: 2008 IEEE international symposium on signal processing and information technology IEEE, pp 346–351

  • Mohiuddin I, Almogren A, Al Qurishi M, Hassan MM, Al Rassan I, Fortino G (2019) Secure distributed adaptive bin packing algorithm for cloud storage. Future Gener Comput Syst 90:307–316

    Article  Google Scholar 

  • Mubarakali A, Bose SC, Srinivasan K, Elsir A, Elsier O (2019) Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain. J Ambient Intell Humaniz Comput 1–9

  • Pournaghi SM, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput 1–29

  • Pragaladan R, Sathappan S (2018) A secure cloud data storage combining DNA structure and multi-aspect time-integrated cut-off potential. In: Advances in big data and cloud computing. Springer, Singapore, pp 361–374

  • Raghul H, Ramagopal RN, Saravanan B, Guhapriya T, Anitha R (2015) Data security in federated cloud environment using homomorphic encryption technique. Int J Emerg Technol Adv Eng 5(4):137–141

    Google Scholar 

  • Rajani S, Ghorpade V, Dhange M (2016) Multi-factor authentication as a service for cloud data security. Int J Comput Sci Eng 4:43–46

    Google Scholar 

  • Ramya B, Kokila MS, Hemalath S (2016) Secure public cloud using DES algorithm. Int J Adv Res Comput Eng Technol 5(11)

  • Reddy BT, Chowdappa KB, Reddy SR (2015) Cloud security using Blowfish and key management encryption algorithm. Int J Eng Appl Sci 2(6)

  • Resende ACD, Mochetti K, Aranha DF (2015) PUF-based mutual multifactor entity and transaction authentication for secure banking. In: Lightweight cryptography for security and privacy, pp 77–96

  • Rohini V, Shinde VD (2015) Secure role-based access control on encrypted data in cloud storage using raspberry PI. Int J Multidiscip Res Dev 2(7):20–27

    Google Scholar 

  • Sachdev A, Bhansali M (2013) Enhancing cloud computing security using AES algorithm. Int J Comput Appl 67(9)

  • Somani U, Lakhani K, Mundra M (2010) Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In: 2010 first international conference on parallel, distributed and grid computing (PDGC 2010) IEEE, pp 211–216

  • Sudhakar RV, Rao TCM (2020) Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications. Clust Comput 1–11

  • Sumathi M, Sangeetha S (2020) A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography. Complex Intell Syst 1–15

  • Sundarakumar MR, Mahadevan G (2019) Authorization for secured cloud storage through SHA-256

  • Suresha K, Karthick PV (2020) Enhancing data security in cloud computing using threshold cryptography technique. In: Advances in cybernetics, cognition, and machine learning for communication technologies. Springer, Singapore, pp 231–242

  • Thangavel M, Varalakshmi P (2018) Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Comput 21(2):1411–1437

    Article  Google Scholar 

  • Tsai CH, Su PC (2020) The application of multi-server authentication scheme in internet banking transaction environments. Inf Syst e-Bus Manag 1–29

  • Vafamehr A, Khodayar ME (2018) Energy-aware cloud computing. Electric J 31(2):40–49

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Immaculate Shyla.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shyla, S.I., Sujatha, S.S. Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. J Ambient Intell Human Comput 13, 151–163 (2022). https://doi.org/10.1007/s12652-021-02893-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-02893-8

Keywords

Navigation