Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication

Megha Gupta, Laxmi Ahuja, Ashish Seth
{"title":"Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication","authors":"Megha Gupta, Laxmi Ahuja, Ashish Seth","doi":"10.1080/1206212x.2023.2267839","DOIUrl":null,"url":null,"abstract":"AbstractA hybrid chaotic-based DNA and multifactor authentication strategy are created to improve the protection of the cloud environment. Initially, multimodal data are collected from the data owner then the information is compressed by utilizing the deflate compression approach. The data is then encrypted using hybrid chaotic-based DNA cryptography to increase the security of data. In this hybrid algorithm DNA is used for the key generation and chaotic algorithm is utilized for the encryption process. On the other hand, a multifactor authentication method is created to access data from the cloud to block access by unauthorized users. In that technique, users are requested to enter the registered Password with the generated OTP from the mobile number. Then, the device serial number is another factor to verify the accessing device. Likewise, the user's fingerprint and iris recognition are also validated for accessing the data. The cloud-based data can be accessible following users' successful authentication. The simulation analysis shows that the encryption and decryption time reached for image, string and integer data is 24, 0.065, 37, 0.14, 28 and 0.14 s, respectively, for the cloud security algorithm. The proposed algorithm effectively mitigates space consumption and provides improved data security in a cloud environment.KEYWORDS: Cloud environmentsecuritycompressiondeflatehybrid chaotic-DNAmultifactor authentication AcknowledgementsAuthor express their deep sense of gratitude to the Founder President of Amity University, Dr. Ashok K. Chauhan for his keen interest in promoting research in the Amity University and have always been an inspiration for achieving great heights.Disclosure statementNo potential conflict of interest was reported by the author(s).Compliance with ethical standardsThis article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.Additional informationFundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Notes on contributorsMegha GuptaMegha Gupta is research scholar pursuing Ph.D from AIIT, Amity University, and Noida under guidance of Prof. (Dr.) Laxmi Ahuja & Co-Guide Prof. (Dr.) Ashish Seth. She is Gold Medalist in M.tech from Jamia Hamdard, New Delhi. She received her B.TECH degree with HONOURS from B.M.I.E.T Sonipat. Her research areas include Cloud Computing, Security, Software Engineering, Software Testing, Computer Networks, Database Management systems and Big Data. She has published several research papers in reputed international and national journals and also participated and presented research papers in various international, national conferences.Laxmi AhujaProf. (Dr.) Laxmi Ahuja Ph.D(CSE) working as Professor in Amity Institute of Information Technology with the role ranging from Lecturer to Professor to Dy. Director of the Department with in a span of 21 years. in academics; Her areas of interest include Search Engine, Data Mining and Soft Computing Approaches; published more than 100 research papers in International and National Conferences and Journals in SCOPUS Impact Factor Journals like Springer, Elsevier,Inderscience and several others. She has successfully filed number of patents under domain of Information Technology as an Inventor, which has been published in “International Journal of Patents” by Patent Department, Govt. of India. She has published many Lecture Notes for Springer Book chapter. Organized various sessions in International Conferences and Session chair in various Conferences. She has organized various Guest Lectures, Workshops and Faculty Development Programme. She is Associate Editor of Proceedings of the International Conference on Reliability, Infocom Technology and Optimization (Trends and Future Directions). She is actively involved in research activities. She has currently Eight research scholar under her guidance and supervised three students for Ph.D. She has also published number of Books related to operating system and Information Technology. She is Member of IEEE and Life Member of Computer Society of India, Past Vice chairman of IETE – The Institute of Electronics and Telecommunications Engineers, Senior member of IACSIT ,Member of IEEE Society. She is actively involved in various activities of these societies. She is also Technical Chair member in many Conferences. She has Awarded as Guest of Honor in many Events.Ashish SethAshish Seth, PhD. SMIEEE, ACM Distinguished Speaker Presently working as Professor at School of Global Convergence Studies, Inha University, South Korea and is presently deputed to Inha University in Tashkent, Uzbekistan from September 2016. Associated as Subject Expert with Transport and Telecommunications Institute, Riga Latvia, under the European Union project “Strengthening the Academic Staff of the Transport and Telecommunications Institute in the areas of Strategic Specialization” to teach programming languages.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212x.2023.2267839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

AbstractA hybrid chaotic-based DNA and multifactor authentication strategy are created to improve the protection of the cloud environment. Initially, multimodal data are collected from the data owner then the information is compressed by utilizing the deflate compression approach. The data is then encrypted using hybrid chaotic-based DNA cryptography to increase the security of data. In this hybrid algorithm DNA is used for the key generation and chaotic algorithm is utilized for the encryption process. On the other hand, a multifactor authentication method is created to access data from the cloud to block access by unauthorized users. In that technique, users are requested to enter the registered Password with the generated OTP from the mobile number. Then, the device serial number is another factor to verify the accessing device. Likewise, the user's fingerprint and iris recognition are also validated for accessing the data. The cloud-based data can be accessible following users' successful authentication. The simulation analysis shows that the encryption and decryption time reached for image, string and integer data is 24, 0.065, 37, 0.14, 28 and 0.14 s, respectively, for the cloud security algorithm. The proposed algorithm effectively mitigates space consumption and provides improved data security in a cloud environment.KEYWORDS: Cloud environmentsecuritycompressiondeflatehybrid chaotic-DNAmultifactor authentication AcknowledgementsAuthor express their deep sense of gratitude to the Founder President of Amity University, Dr. Ashok K. Chauhan for his keen interest in promoting research in the Amity University and have always been an inspiration for achieving great heights.Disclosure statementNo potential conflict of interest was reported by the author(s).Compliance with ethical standardsThis article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.Additional informationFundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Notes on contributorsMegha GuptaMegha Gupta is research scholar pursuing Ph.D from AIIT, Amity University, and Noida under guidance of Prof. (Dr.) Laxmi Ahuja & Co-Guide Prof. (Dr.) Ashish Seth. She is Gold Medalist in M.tech from Jamia Hamdard, New Delhi. She received her B.TECH degree with HONOURS from B.M.I.E.T Sonipat. Her research areas include Cloud Computing, Security, Software Engineering, Software Testing, Computer Networks, Database Management systems and Big Data. She has published several research papers in reputed international and national journals and also participated and presented research papers in various international, national conferences.Laxmi AhujaProf. (Dr.) Laxmi Ahuja Ph.D(CSE) working as Professor in Amity Institute of Information Technology with the role ranging from Lecturer to Professor to Dy. Director of the Department with in a span of 21 years. in academics; Her areas of interest include Search Engine, Data Mining and Soft Computing Approaches; published more than 100 research papers in International and National Conferences and Journals in SCOPUS Impact Factor Journals like Springer, Elsevier,Inderscience and several others. She has successfully filed number of patents under domain of Information Technology as an Inventor, which has been published in “International Journal of Patents” by Patent Department, Govt. of India. She has published many Lecture Notes for Springer Book chapter. Organized various sessions in International Conferences and Session chair in various Conferences. She has organized various Guest Lectures, Workshops and Faculty Development Programme. She is Associate Editor of Proceedings of the International Conference on Reliability, Infocom Technology and Optimization (Trends and Future Directions). She is actively involved in research activities. She has currently Eight research scholar under her guidance and supervised three students for Ph.D. She has also published number of Books related to operating system and Information Technology. She is Member of IEEE and Life Member of Computer Society of India, Past Vice chairman of IETE – The Institute of Electronics and Telecommunications Engineers, Senior member of IACSIT ,Member of IEEE Society. She is actively involved in various activities of these societies. She is also Technical Chair member in many Conferences. She has Awarded as Guest of Honor in many Events.Ashish SethAshish Seth, PhD. SMIEEE, ACM Distinguished Speaker Presently working as Professor at School of Global Convergence Studies, Inha University, South Korea and is presently deputed to Inha University in Tashkent, Uzbekistan from September 2016. Associated as Subject Expert with Transport and Telecommunications Institute, Riga Latvia, under the European Union project “Strengthening the Academic Staff of the Transport and Telecommunications Institute in the areas of Strategic Specialization” to teach programming languages.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在云环境中使用混合混沌算法和多因素验证来增强用户身份验证的安全性
摘要为了提高云环境的保护能力,提出了一种基于混沌DNA和多因素认证的混合策略。最初,从数据所有者处收集多模态数据,然后利用deflate压缩方法对信息进行压缩。然后使用基于混合混沌的DNA加密技术对数据进行加密,以增加数据的安全性。该混合算法采用DNA算法生成密钥,采用混沌算法进行加密。另一方面,创建了多因素身份验证方法来访问云中的数据,以阻止未经授权的用户访问。在该技术中,要求用户使用从移动号码生成的OTP输入注册密码。然后,设备序列号是验证访问设备的另一个因素。同样,用户的指纹和虹膜识别也要经过验证才能访问数据。用户身份验证成功后,可以访问基于云的数据。仿真分析表明,云安全算法对图像、字符串和整数数据的加解密时间分别为24、0.065、37、0.14、28和0.14 s。该算法有效降低了云环境下的空间消耗,提高了数据的安全性。关键词:云环境安全压缩压缩混合混沌-多因素认证致谢作者对Amity大学创始人校长Ashok K. Chauhan博士对推动Amity大学研究的浓厚兴趣表示深深的感谢,并一直激励着我们取得更大的成就。披露声明作者未报告潜在的利益冲突。本文完全是作者的原创作品;这篇文章之前没有发表过,在该杂志的编辑委员会决定不接受它发表之前,它不会被发送给其他出版物。作者声明在撰写本文期间没有收到任何资金、资助或其他支持。作者简介:tamegha Gupta是一名研究学者,在Laxmi Ahuja教授和共同指导教授Ashish Seth的指导下,在AIIT、Amity大学和Noida攻读博士学位。她是来自新德里贾米亚哈达德的理科硕士金牌得主。她以优异的成绩获得B.M.I.E.T Sonipat学士学位。她的研究领域包括云计算、安全、软件工程、软件测试、计算机网络、数据库管理系统和大数据。她在国际和国内知名期刊上发表了多篇研究论文,并参加了各种国际、国家会议并发表了研究论文。你的事迹AhujaProf。Laxmi Ahuja博士(CSE)在Amity信息技术研究所担任教授,在21年的时间里,从讲师到教授,再到系主任。在学者;她的研究领域包括搜索引擎、数据挖掘和软计算方法;在SCOPUS影响因子期刊(如施普林格,Elsevier,Inderscience等)的国际和国内会议和期刊上发表了100多篇研究论文。她以发明人的身份在信息技术领域成功申请了多项专利,这些专利已在印度政府专利部的“国际专利杂志”上发表。她出版了许多b施普林格书章节的讲义。组织各种国际会议并担任会议主席。她曾多次举办客座讲座、工作坊及教师发展计划。她是《可靠性、信息通信技术和优化(趋势和未来方向)国际会议论文集》的副主编。她积极参与研究活动。目前指导研究学者8人,指导博士研究生3人。出版了多部操作系统和信息技术相关书籍。她是IEEE的成员和印度计算机协会的终身会员,IETE - The Institute of Electronics and Telecommunications Engineers的前任副主席,IACSIT的高级成员,IEEE Society的成员。她积极参与这些社团的各种活动。她也是许多会议的技术主席成员。她在许多活动中被授予荣誉嘉宾。Ashish Seth,博士。SMIEEE, ACM杰出演讲者,现为韩国仁荷大学全球融合研究学院教授,2016年9月起派驻乌兹别克斯坦塔什干仁荷大学。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computers and Applications
International Journal of Computers and Applications Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
4.70
自引率
0.00%
发文量
20
期刊介绍: The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.
期刊最新文献
Weight assignment in cloud service selection based on FAHP and rough sets The social force model: a behavioral modeling approach for information propagation during significant events A comprehensive study on social networks analysis and mining to detect opinion leaders A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1