Multi-level Authentication-Based Secure Aware Data Transaction on Cloud Using Cyclic Shift Transposition Algorithm

  • Prasanta Kumar Bal
  • Sateesh Kumar Pradhan
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 109)


Cloud computing is used for the sake of storing, managing, and processing data on a remote server network hosted on the Internet, rather than a local server or a personal computer. While numerous data volume is saved in the cloud, the stored data within the cloud have some security issues. It is therefore essential that data stored in the cloud are secure. Therefore, in this paper, multi-level authentication-based secure aware data transaction on cloud is proposed. The proposed system consists of three modules, namely multi-level authentication, data security, and data retrieval. To avoid the unauthorized user login to the server, novel multi-level authentication is developed. In this model, data security is improved with the help of cyclic shift transposition algorithm. To avoid the real-time attack during the data transaction retrieval process, hash-based timestamp is used. In terms of time and memory, the proposed methodology is evaluated.


Cloud computing Multi-level authentication Cyclic shift transposition algorithm Security Data transaction 


  1. 1.
    Yan Z, Ding W, Yu X, Zhu H, Deng RH (2016) Deduplication on encrypted big data in cloud. IEEE Trans Big Data 2(2):138–150CrossRefGoogle Scholar
  2. 2.
    Li W, Yang Y, Yuan D (2016) Ensuring cloud data reliability with minimum replication by proactive replica checking. IEEE Trans Comput 65(5):1494–1506MathSciNetCrossRefGoogle Scholar
  3. 3.
    Jakóbik A, Palmieri F, Kołodziej J (2018) Stackelberg games for modeling defense scenarios against cloud security threats. J Netw Comput Appl 110:99–107CrossRefGoogle Scholar
  4. 4.
    Kandil A, El-Deeb H (2016) Exploration of application migration to cloud environment. In 2016 6th international conference-cloud system and big data engineering (Confluence) IEEE, pp 109–114Google Scholar
  5. 5.
    Basu S, Pattnaik PK (2017) A consistency preservation based approach for data-intensive cloud computing environment. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp 1–5Google Scholar
  6. 6.
    Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138–151CrossRefGoogle Scholar
  7. 7.
    Luna J, Taha A, Trapero R, Suri N (2017) Quantitative reasoning about cloud security using service level agreements. IEEE Trans Cloud Comput 5(3):457–471CrossRefGoogle Scholar
  8. 8.
    Gupta S, Misra SC (2016) Moderating effect of compliance, network, and security on the critical success factors in the implementation of cloud ERP. IEEE Trans Cloud Comput 4(4):440–451CrossRefGoogle Scholar
  9. 9.
    Wei J, Liu W, Hu X (2016) Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans Cloud Comput 1–1Google Scholar
  10. 10.
    Awad A, Matthews A, Qiao Y, Lee B (2018) Chaotic searchable encryption for mobile cloud storage. IEEE Trans Cloud Comput 6(2):440–452 (2015), (Apr 2018)CrossRefGoogle Scholar
  11. 11.
    Hu C, Li W, Cheng X, Yu J, Wang S, Bie R (2018) A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans Big Data 4(3):341–355CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Prasanta Kumar Bal
    • 1
  • Sateesh Kumar Pradhan
    • 1
  1. 1.Department of Computer Science & ApplicationUtkal UniversityBhubaneswarIndia

Personalised recommendations