Abstract
Cloud computing is currently playing an important role in the information technology industry because of its improved efficiency, wide access, low cost, and many benefits. It also provides more space for storing data and transmitting data from one location to another faster for different users on the Internet. Due to large storage, cloud customers can save huge capital investment on IT infrastructure and focus on their own core business. Therefore, many companies or organizations are moving their business to the cloud. However, many customers are reluctant to use the cloud due to security and privacy concerns. To tackle this problem, in this paper, efficient secure data retrieval is developed with the help of multi-stage authentication (MSA) and optimized blowfish algorithm (OBA). The proposed system consists of three modules namely, MSA, data security, and data retrieval. Initially, the cloud users register their information on cloud based on a multi-authentication procedure. After the registration process, the data are encrypted with the help of OBA. To increase the security of the system, the key value is optimally selected with the help of a binary crow search algorithm. After the encryption process, MSA based data retrieval process is performed. This will avoid, un-authorized person to attack the data. The performance of the proposed methodology is implemented in JAVA and performances are analyzed in terms of different metrics.
Similar content being viewed by others
References
Bai TDP, Raj KM, Rabara SA (2017) Elliptic curve cryptography based security framework for internet of things (IoT) enabled smart card. In: 2017 World congress on computing and communication technologies (WCCCT) IEEE, pp 43–46
Brindha T, Shaji RS (2018) A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Comput 22(3):1013–1022
Burger PM (2001) Biometric authentication system. U.S. Patent 6(219): 439
Cheng H, Rong C, Qian M, Wang W (2018) Accountable Privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882
De la Prieta F, Rodríguez-González S, Chamoso P, Corchado JM, Bajo J (2019) Survey of agent-based cloud computing applications. Future Gener Comput Syst 100:223–236
Delfs H, Knebl H, Knebl H (2002) Introduction to cryptography, vol 2. Springer, Heidelberg
Dinesha HA, Agrawal VK (2012) Multi-level authentication technique for accessing cloud services. In: 2012 international conference on computing, communication and applications IEEE, pp 1–4
Guo J, Li C, Zhang G, Sun Y, Bie R (2019) Blockchain-enabled digital rights management for multimedia resources of online education. Multim Tools Appl 1–21
Helmi AM, Farhan MS, Nasr MM (2018) A framework for integrating geospatial information systems and hybrid cloud computing. Comput Electr Eng 67:145–158
Kang HS, Son JH, Hong CS (2015) Defense technique against spoofing attacks using reliable ARP table in cloud computing environment. In: 2015 17th Asia–Pacific network operations and management symposium (APNOMS) IEEE, pp 592–595
Kanna GP, Vasudevan V (2019) A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Computing 22(4):9561–9569
Kumar M, Sharma SC, Goel A, Singh SP (2019) A comprehensive survey for scheduling techniques in cloud computing. J Netw Comput Appl 143:1–33
Kushida T, Pingali GS (2014) Industry cloud-effective adoption of cloud computing for industry solutions. In: 2014 IEEE 7th international conference on cloud computing IEEE, pp 753–760
Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: IEEE international conference on cloud computing Springer, Berlin, pp 157–166
Meyers RK, Desoky AH (2008) An implementation of the Blowfish cryptosystem. In: 2008 IEEE international symposium on signal processing and information technology IEEE, pp 346–351
Mohiuddin I, Almogren A, Al Qurishi M, Hassan MM, Al Rassan I, Fortino G (2019) Secure distributed adaptive bin packing algorithm for cloud storage. Future Gener Comput Syst 90:307–316
Mubarakali A, Bose SC, Srinivasan K, Elsir A, Elsier O (2019) Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain. J Ambient Intell Humaniz Comput 1–9
Pournaghi SM, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput 1–29
Pragaladan R, Sathappan S (2018) A secure cloud data storage combining DNA structure and multi-aspect time-integrated cut-off potential. In: Advances in big data and cloud computing. Springer, Singapore, pp 361–374
Raghul H, Ramagopal RN, Saravanan B, Guhapriya T, Anitha R (2015) Data security in federated cloud environment using homomorphic encryption technique. Int J Emerg Technol Adv Eng 5(4):137–141
Rajani S, Ghorpade V, Dhange M (2016) Multi-factor authentication as a service for cloud data security. Int J Comput Sci Eng 4:43–46
Ramya B, Kokila MS, Hemalath S (2016) Secure public cloud using DES algorithm. Int J Adv Res Comput Eng Technol 5(11)
Reddy BT, Chowdappa KB, Reddy SR (2015) Cloud security using Blowfish and key management encryption algorithm. Int J Eng Appl Sci 2(6)
Resende ACD, Mochetti K, Aranha DF (2015) PUF-based mutual multifactor entity and transaction authentication for secure banking. In: Lightweight cryptography for security and privacy, pp 77–96
Rohini V, Shinde VD (2015) Secure role-based access control on encrypted data in cloud storage using raspberry PI. Int J Multidiscip Res Dev 2(7):20–27
Sachdev A, Bhansali M (2013) Enhancing cloud computing security using AES algorithm. Int J Comput Appl 67(9)
Somani U, Lakhani K, Mundra M (2010) Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In: 2010 first international conference on parallel, distributed and grid computing (PDGC 2010) IEEE, pp 211–216
Sudhakar RV, Rao TCM (2020) Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications. Clust Comput 1–11
Sumathi M, Sangeetha S (2020) A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography. Complex Intell Syst 1–15
Sundarakumar MR, Mahadevan G (2019) Authorization for secured cloud storage through SHA-256
Suresha K, Karthick PV (2020) Enhancing data security in cloud computing using threshold cryptography technique. In: Advances in cybernetics, cognition, and machine learning for communication technologies. Springer, Singapore, pp 231–242
Thangavel M, Varalakshmi P (2018) Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Comput 21(2):1411–1437
Tsai CH, Su PC (2020) The application of multi-server authentication scheme in internet banking transaction environments. Inf Syst e-Bus Manag 1–29
Vafamehr A, Khodayar ME (2018) Energy-aware cloud computing. Electric J 31(2):40–49
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shyla, S.I., Sujatha, S.S. Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. J Ambient Intell Human Comput 13, 151–163 (2022). https://doi.org/10.1007/s12652-021-02893-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-02893-8