利用区块链辅助环基同态加密进行匿名身份验证,提高云计算安全性

Pranav Shrivastava, Bashir Alam, Mansaf Alam
{"title":"利用区块链辅助环基同态加密进行匿名身份验证,提高云计算安全性","authors":"Pranav Shrivastava, Bashir Alam, Mansaf Alam","doi":"10.1007/s10586-024-04617-x","DOIUrl":null,"url":null,"abstract":"<p>Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"355 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing\",\"authors\":\"Pranav Shrivastava, Bashir Alam, Mansaf Alam\",\"doi\":\"10.1007/s10586-024-04617-x\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.</p>\",\"PeriodicalId\":501576,\"journal\":{\"name\":\"Cluster Computing\",\"volume\":\"355 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cluster Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/s10586-024-04617-x\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cluster Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s10586-024-04617-x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如今,由于信息传输呈指数级增长,对云计算的需求与日俱增。即使采取了安全措施来保护存储在云中的数据,网络犯罪分子仍在锲而不舍地破坏云环境。为应对这一挑战,需要一种增强型身份验证方法来提高安全性。为了保护云环境中的用户隐私和匿名性,本研究提出了一种名为基于超椭圆曲线的匿名环签名(HCARS)的新技术。此外,区块链技术被用来安全地记录时间戳和加密密钥。区块链系统中的散列函数采用了 SHA 256 和 SHA 512 算法。此外,利用带误差环学习(RLWE)问题,基于 Nth 度截断多项式环单元(NTRU)的全同态加密(NTRU-FHE)方案可加密敏感数据并确保其完整性。通过利用 Java 进行实验验证,对所提出的方法和现有方法进行了比较研究。结果表明,所提出的方法优于现有技术,在输入大小为 75 的情况下,加密时间为 6.75 秒,在输入大小相同的情况下,解密时间为 5.128 秒。同样,100 条接收信息的签名生成时间为 125 毫秒,450 个数据块的数据块生成时间为 10.8 秒,16,384 条记录的吞吐量为 98 MB/秒,20 条信息的总计算时间为 403 毫秒。结果表明,HCARS 方法性能优越,大大缩短了加密、解密和签名生成时间,提高了吞吐量和计算效率。在 HCARS 方法的帮助下,面对不断变化的网络威胁,云系统的安全和隐私保护变得更加容易。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Quantitative and qualitative similarity measure for data clustering analysis OntoXAI: a semantic web rule language approach for explainable artificial intelligence Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1