Abstract
Information must be kept private and secure because it is shared when people communicate online, making data protection essential. Data sharing is a significant element of this. Information can now be viewed by unauthorized interceptors due to the volume of data being transmitted online. Cryptography has been a key component of security systems. A blank message is encrypted during this process to add protection. An exact copy ensures sufficient protection of data in both conventional and quantum computing is urgently needed given the rise of quantum computing, as encryption is currently the most popular method of cloud data protection. Symmetric key cryptosystems, in comparison to public key cryptosystems, are faster because they only need a single private key to encode and decrypt data at both ends. Even so, it can be challenging to maintain security in a hostile environment while carrying out compatible and effective key distribution and secure private data transmission across organizations. In this paper comprehensive analysis of this cryptosystem is presented and describes the component-by-component approach used in its implementation. The different attacks on the code based McEliece cryptosystem are covered separately. The experimental results obtained using Goppa codes are also reported in the research where the simulations are carried out at different extension degrees. Using the results of the simulations, we came to our findings about the outcomes and the numerous implementation issues. In this work, a model is proposed that applies the Cloud customer data security using NTRUs (nth degree truncated polynomial ring units) together with a code based McEliece variation cryptosystem to secure access control data. To encrypt and decode data, the modified NTRU cryptosystem is employed, which is powered by lattice math. The process of multiplying larger numbers or conducting complex multiplication is known as lattice multiplication, which divides the process into smaller steps while maintaining an algorithm that is precisely the same as the traditional long multiplication method.
Similar content being viewed by others
Data Availability
The dataset generated and analyzed during the current study are available from the corresponding author on reasonable request.
References
Razzaq MA, Ahmad M, Gill SH, Jhanjhi NZ, Almansour FM, Haq I, et al. Security and privacy aspects of cloud computing: a smart campus case study. Intell Autom Soft Comput. 2022;31(1):117–28. https://doi.org/10.32604/iasc.2022.
Ukwunoma HC, Arome G. Post-quantum cryptography-driven security framework for cloud computing. Open Comput Sci. 2022. https://doi.org/10.1515/comp-2022-0235.
Shafiq DA, Jhanjhi NZ, Abdullah A, Alzain MA. A load balancing algorithm for the data centres to optimise cloud computing applications. IEEE Access. 2021;9:41731–44. https://doi.org/10.1109/ACCESS.2021.3065308.
Ahmad K, Kamal A, Ahmad KA, Khari M, Crespo RG. Fast hybrid-MixNet for security and privacy using NTRU algorithm. J Inform Sec Appl. 2021;1(60):102872. https://doi.org/10.1016/j.jisa.2021.102872.
Shafiq DA, Jhanjhi NZ, Abdullah A, Alzain MA. A secured system of Internet enabled host devices. Netw Commun Technol. 2020;5(1):26–36. https://doi.org/10.5539/nct.v5n1p26.
Rani N, Juliet N, Arunkumar S. A novel cryptosystem for files stored in cloud using NTRU encryption algorithm. Int J Recent Technol Eng IJRTE. 2020;9(1):2277–3878. https://doi.org/10.35940/ijrte.A2536.059120.
Kumar R, Naidu AS, Singh A, Tentu AN. McEliece cryptosystem: simulation and security vulnerabilities. Int J Comput Sci Math. 2020;12(1):64–81. https://doi.org/10.1504/IJCSM.2020.108787.
Shukur H, Zeebaree S, Zebari R, Zeebaree D, Ahmed O, Salih A. Cloud computing virtualization of resources allocation for distributed systems. J Appl Sci Technol Trends. 2020;1(3):98–105.
Mishra SK, Sahoo B, Parida PP. Load balancing in cloud computing: a big picture. J King Saud Univ Comput Inform Sci. 2020;32(2):149–58.
Chowdary PR, Challa Y, Jitendra MSNV. Identification of MITM attack by utilizing artificial intelligence mechanism in cloud environments. J Phys Conf Ser. 2019;1228: 012044.
Shafiq DA, Jhanjhi NZ, Abdullah A. Proposing a load balancing algorithm for the optimization of cloud computing applications. In: 2019 13th international conference on mathematics, actuarial science, computer science and statistics (MACS). IEEE; 2019 Dec 14. p. 1–6.
Anand S, Perumal V. EECDH to prevent MITM attack in cloud computing. Digit Commun Netw. 2019;5:276–87.
Huang Q, Yang Y, Yue W, He Y. Secure data group sharing and conditional dissemination with multi-owner in cloud computing. IEEE Trans Cloud Comput. 2019;9(4):1607–18.
Miao Y, Liu X, Choo KK, Deng RH, Li J, Li H, Ma J. Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Depend Sec Comput. 2019;18(3):1080–94.
Mahmood GS, Huang DJ, Jaleel BA. Achieving an effective, confidentiality and integrity of data in cloud computing. Int J Netw Secur. 2019;21(2):326–32.
Pradeep KV, Vijayakumar V, Subramaniyaswamy V. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment. J Comput Netw Commun. 2019;8:2019.
Abikoye OC, Haruna AD, Abubakar A, Akande NO, Asani EO. Modified advanced encryption standard algorithm for information security. Symmetry. 2019;11(12):1484.
Rachmat N, Samsuryadi. Performance analysis of 256-bit AES encryption algorithm on android smartphone. J Phys Conf Ser. 2019;1196:012049.
Al Essa HA, Ashoor AS. Enhancing performance of AES algorithm using concurrency and multithreading. ARPN J Eng Appl Sci. 2019;14(11):2039–49.
Saeed O, Shaikh RA. A user-based trust model for cloud computing environment. Int J Adv Comput Sci Appl. 2018;9(3):1.
Sugumar DR, Joycee KA. FEDSACE: a framework for enhanced user data security algorithms in cloud computing environment. Int J Fut Revolut Comput Sci Commun Eng. 2018;4(3):1.
Tsai K-L, Huang Y-L, Leu F-Y, You I, Huang Y-L, Tsai C-H. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6:45325–34.
Mall S, Saroj SK. A new security framework for cloud data. Proc Comput Sci. 2018;1(143):765–75.
Shafiq DA, Jhanjhi NZ, Abdullah A, Alzain MA. Cloud computing: a paradigm shift in the way of computing. Int J Mod Educ Comput Sci. 2017;9(12):38–48.
Metipatil P, Bhuvaneshwari P, Basha SM, Patil SS. An efficient framework for predicting cancer type based on microarray gene expressions using CNN-BiLSTM technique. SN Comput Sci. 2023;4(4):381.
Kumble L, Patil KK. An improved data compression framework for wireless sensor networks using stacked convolutional autoencoder (S-CAE). SN Comput Sci. 2023;4(4):419.
Raghavendra Nayaka P, Ranjan R. An efficient framework for algorithmic metadata extraction over scholarly documents using deep neural networks. SN Comput Sci. 2023;4(4):341.
Kumble L, Patil KK. Evalutionary STBD model for bio-signal compression provisioning in wire-less sensor network. In: 2017 international conference on smart technologies for smart nation (SmartTechCon). IEEE; 2017. p. 1597–601.
Acknowledgements
The research work was made possible with the support of GITAM University, Bengaluru, Karnataka, India, which provided the necessary facilities.
Funding
No funding received for this research.
Author information
Authors and Affiliations
Contributions
This research endeavor was made possible by the collaboration and contributions of all authors.
Corresponding author
Ethics declarations
Conflict of interest
No conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Advances in Computational Approaches for Image Processing, Wireless Networks, Cloud Applications and Network Security” guest edited by P. Raviraj, Maode Ma and Roopashree H R.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
E, G.R., Tukkoji, C. Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems. SN COMPUT. SCI. 5, 396 (2024). https://doi.org/10.1007/s42979-024-02736-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-02736-1