Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain
Multimedia Tools and Applications - Trang 1-20 - 2024
Tóm tắt
Data auditing permits data owners to confirm the reliability of their personal information without obtaining it from an unsafe cloud. Advertising cloud storage has widely adopted this characteristic. Data integrity is more difficult to maintain, and data through the cloud is not always secure. The ability to access data remotely through cloud storage makes it necessary to protect it against unauthorized access, hackers, and other malicious activity. In order to overcome these concerns, a hybrid Advanced Encryption Standard- Elliptic Curve Cryptography (AES-ECC) algorithm and Merkle Hash (MHT) Tree is developed. The user data is sent to the cloud service provider via blockchain for storage purposes. The key generation and encryption are carried out using a hybrid AES-ECC encryption technique, which is used to generate both private and public keys. The encrypted user file is then divided into several blocks. The tags for the split encrypted blocks are then generated using SHA256, which provides the hash value of each smaller file. Cloud Service Provider (CSP) constructs an MHT by employing generated hashtags to return the proof to user information after establishing hashtags for encrypted file blocks in the blockchain storage. Merkle hash tree is frequently employed to validate data integrity. Furthermore, the third-party auditor determines if the proofs generated by CSP match one from the user to check the tamper. The simulation analysis shows that the accuracy, encryption, decryption, key generation, and execution time reached for the proposed approach is 96%, 190 s, 124 s, 5.9 s, and 440 s. The proposed algorithm effectively validates data integrity and provides improved data security in blockchain environment.
Tài liệu tham khảo
Zhang X, Zhao J, Xu C, Li H, Wang H, Zhang Y (2019) CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors. IEEE Trans Cloud Comput 9(4):1362–1375
Fan K, Bao Z, Liu M, Vasilakos AV, Shi W (2020) Dredas: decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT. Futur Gener Comput Syst 110:665–674
Karthick S, Sankar SP, Prathab TR (2018) An Approach for Image Encryption/Decryption Based on Quaternion Fourier Transform. In: Proceedings 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR), pp 1–7
Cui M, Han D, Wang J, Li KC, Chang CC (2020) ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Trans Veh Technol 69(12):15815–15827
Li H, Guo F, Wang L, Wang J, Wang B, Wu C (2021) A blockchain-based public auditing protocol with self-certified public keys for cloud data. Secur Commun Netw 2021:1
Huang L, Zhang G, Yu S, Fu A, Yearwood J (2019) SeShare: secure cloud data sharing based on blockchain and public auditing. Concurr Comput: Pract Exp 31(22):e4359
Miao Y, Huang Q, Xiao M, Li H (2020) Decentralized and privacy-preserving public auditing for cloud storage based on blockchain. IEEE Access 8:139813–139826
Arulananth TS, Baskar M, Anbarasu V, Thiagarajan R, Rajendran T, Balaji A (2021) Multi party secure data access management in cloud using user centric block chain data encryption. Pattern Recognit Lett 152:295–301
Shu J, Zou X, Jia X, Zhang W, Xie R (2021) Blockchain-based decentralized public auditing for cloud storage. IEEE Trans Cloud Comput 10(4):2366–2380
Yang X, Pei X, Wang M, Li T, Wang C (2020) Multi-replica and multi-cloud data public audit scheme based on blockchain. IEEE Access 8:144809–144822
Li S, Liu J, Yang G, Han J (2020) A blockchain-based public auditing scheme for cloud storage environment without trusted auditors. Wirel Commun Mob Comput 2020:1–3
Bonsón E, Bednárová M (2019) Blockchain and its implications for accounting and auditing. Meditari Account Res 27(5):725–740
Xie M, Zhao Q, Hong H, Chen C, Yu J (2022) A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices. J Parallel Distrib Comput 169:58–71
Tian H, Nan F, Jiang H, Chang CC, Ning J, Huang Y (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125
Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manage 57(6):102382
Tian H, Nan F, Chang CC, Huang Y, Lu J, Du Y (2019) Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Netw Comput Appl 127:59–69
Youn TY, Chang KY, Rhee KH, Shin SU (2020) Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access 6:26578–26587
Xue J, Xu C, Zhao J, Ma J (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci China Inform Sci 62:1–6
Luo Y, Xu M, Huang K, Wang D, Fu S (2018) Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput Secur 73:492–506
Zhang J, Wang B, He D, Wang XA (2019) Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput 23:3411–3422
Daniel E, Vasanthi NA (2019) LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Cluster Comput 22:1247–1258
Wang H, Qin H, Zhao M, Wei X, Shen H, Susilo W (2020) Blockchain-based fair payment smart contract for public cloud storage auditing. Inf Sci 519:348–362
Shen W, Qin J, Yu J, Hao R, Hu J (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346
Adeniyi AE, Abiodun KM, Awotunde JB, Olagunju M, Ojo OS, Edet NP (2023) Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multimed. Tools Appl. 2:20537–20551
Hoobi MM (2020) Efficient hybrid cryptography algorithm. J Southwest Jiaotong Univ 55(3). https://doi.org/10.35741/issn.0258-2724.55.3.5
Oo KK, Soe YN (2019) Encryption data measurement and data security of hybrid AES and RSA algorithm. Int J Trend Sci Re Dev (IJT SRD) 3(6):834–838
Martino R, Cilardo A (2020) Designing a SHA-256 processor for blockchain-based IoT applications. Internet of Things 11:100254
Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409–425
Wang J, Peng F, Tian H, Chen W, Lu J (2019) Public auditing of log integrity for cloud storage systems via blockchain. In: Security and Privacy in New Computing Environments: Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings (pp. 378–387). Springer International Publishing
Dataset 1: https://www.kaggle.com/datasets/kiranmahesh/nslkdd?select=kdd. Accessed 3 Sep 2023