Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Information must be kept private and secure because it is shared when people communicate online, making data protection essential. Data sharing is a significant element of this. Information can now be viewed by unauthorized interceptors due to the volume of data being transmitted online. Cryptography has been a key component of security systems. A blank message is encrypted during this process to add protection. An exact copy ensures sufficient protection of data in both conventional and quantum computing is urgently needed given the rise of quantum computing, as encryption is currently the most popular method of cloud data protection. Symmetric key cryptosystems, in comparison to public key cryptosystems, are faster because they only need a single private key to encode and decrypt data at both ends. Even so, it can be challenging to maintain security in a hostile environment while carrying out compatible and effective key distribution and secure private data transmission across organizations. In this paper comprehensive analysis of this cryptosystem is presented and describes the component-by-component approach used in its implementation. The different attacks on the code based McEliece cryptosystem are covered separately. The experimental results obtained using Goppa codes are also reported in the research where the simulations are carried out at different extension degrees. Using the results of the simulations, we came to our findings about the outcomes and the numerous implementation issues. In this work, a model is proposed that applies the Cloud customer data security using NTRUs (nth degree truncated polynomial ring units) together with a code based McEliece variation cryptosystem to secure access control data. To encrypt and decode data, the modified NTRU cryptosystem is employed, which is powered by lattice math. The process of multiplying larger numbers or conducting complex multiplication is known as lattice multiplication, which divides the process into smaller steps while maintaining an algorithm that is precisely the same as the traditional long multiplication method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

The dataset generated and analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Razzaq MA, Ahmad M, Gill SH, Jhanjhi NZ, Almansour FM, Haq I, et al. Security and privacy aspects of cloud computing: a smart campus case study. Intell Autom Soft Comput. 2022;31(1):117–28. https://doi.org/10.32604/iasc.2022.

    Article  Google Scholar 

  2. Ukwunoma HC, Arome G. Post-quantum cryptography-driven security framework for cloud computing. Open Comput Sci. 2022. https://doi.org/10.1515/comp-2022-0235.

    Article  Google Scholar 

  3. Shafiq DA, Jhanjhi NZ, Abdullah A, Alzain MA. A load balancing algorithm for the data centres to optimise cloud computing applications. IEEE Access. 2021;9:41731–44. https://doi.org/10.1109/ACCESS.2021.3065308.

    Article  Google Scholar 

  4. Ahmad K, Kamal A, Ahmad KA, Khari M, Crespo RG. Fast hybrid-MixNet for security and privacy using NTRU algorithm. J Inform Sec Appl. 2021;1(60):102872. https://doi.org/10.1016/j.jisa.2021.102872.

    Article  Google Scholar 

  5. Shafiq DA, Jhanjhi NZ, Abdullah A, Alzain MA. A secured system of Internet enabled host devices. Netw Commun Technol. 2020;5(1):26–36. https://doi.org/10.5539/nct.v5n1p26.

    Article  Google Scholar 

  6. Rani N, Juliet N, Arunkumar S. A novel cryptosystem for files stored in cloud using NTRU encryption algorithm. Int J Recent Technol Eng IJRTE. 2020;9(1):2277–3878. https://doi.org/10.35940/ijrte.A2536.059120.

    Article  Google Scholar 

  7. Kumar R, Naidu AS, Singh A, Tentu AN. McEliece cryptosystem: simulation and security vulnerabilities. Int J Comput Sci Math. 2020;12(1):64–81. https://doi.org/10.1504/IJCSM.2020.108787.

    Article  MathSciNet  Google Scholar 

  8. Shukur H, Zeebaree S, Zebari R, Zeebaree D, Ahmed O, Salih A. Cloud computing virtualization of resources allocation for distributed systems. J Appl Sci Technol Trends. 2020;1(3):98–105.

    Article  Google Scholar 

  9. Mishra SK, Sahoo B, Parida PP. Load balancing in cloud computing: a big picture. J King Saud Univ Comput Inform Sci. 2020;32(2):149–58.

    Google Scholar 

  10. Chowdary PR, Challa Y, Jitendra MSNV. Identification of MITM attack by utilizing artificial intelligence mechanism in cloud environments. J Phys Conf Ser. 2019;1228: 012044.

    Article  Google Scholar 

  11. Shafiq DA, Jhanjhi NZ, Abdullah A. Proposing a load balancing algorithm for the optimization of cloud computing applications. In: 2019 13th international conference on mathematics, actuarial science, computer science and statistics (MACS). IEEE; 2019 Dec 14. p. 1–6.

  12. Anand S, Perumal V. EECDH to prevent MITM attack in cloud computing. Digit Commun Netw. 2019;5:276–87.

    Article  Google Scholar 

  13. Huang Q, Yang Y, Yue W, He Y. Secure data group sharing and conditional dissemination with multi-owner in cloud computing. IEEE Trans Cloud Comput. 2019;9(4):1607–18.

    Article  Google Scholar 

  14. Miao Y, Liu X, Choo KK, Deng RH, Li J, Li H, Ma J. Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Depend Sec Comput. 2019;18(3):1080–94.

    Article  Google Scholar 

  15. Mahmood GS, Huang DJ, Jaleel BA. Achieving an effective, confidentiality and integrity of data in cloud computing. Int J Netw Secur. 2019;21(2):326–32.

    Google Scholar 

  16. Pradeep KV, Vijayakumar V, Subramaniyaswamy V. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment. J Comput Netw Commun. 2019;8:2019.

    Google Scholar 

  17. Abikoye OC, Haruna AD, Abubakar A, Akande NO, Asani EO. Modified advanced encryption standard algorithm for information security. Symmetry. 2019;11(12):1484.

    Article  Google Scholar 

  18. Rachmat N, Samsuryadi. Performance analysis of 256-bit AES encryption algorithm on android smartphone. J Phys Conf Ser. 2019;1196:012049.

  19. Al Essa HA, Ashoor AS. Enhancing performance of AES algorithm using concurrency and multithreading. ARPN J Eng Appl Sci. 2019;14(11):2039–49.

    Google Scholar 

  20. Saeed O, Shaikh RA. A user-based trust model for cloud computing environment. Int J Adv Comput Sci Appl. 2018;9(3):1.

  21. Sugumar DR, Joycee KA. FEDSACE: a framework for enhanced user data security algorithms in cloud computing environment. Int J Fut Revolut Comput Sci Commun Eng. 2018;4(3):1.

  22. Tsai K-L, Huang Y-L, Leu F-Y, You I, Huang Y-L, Tsai C-H. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6:45325–34.

    Article  Google Scholar 

  23. Mall S, Saroj SK. A new security framework for cloud data. Proc Comput Sci. 2018;1(143):765–75.

    Article  Google Scholar 

  24. Shafiq DA, Jhanjhi NZ, Abdullah A, Alzain MA. Cloud computing: a paradigm shift in the way of computing. Int J Mod Educ Comput Sci. 2017;9(12):38–48.

    Article  Google Scholar 

  25. Metipatil P, Bhuvaneshwari P, Basha SM, Patil SS. An efficient framework for predicting cancer type based on microarray gene expressions using CNN-BiLSTM technique. SN Comput Sci. 2023;4(4):381.

    Article  Google Scholar 

  26. Kumble L, Patil KK. An improved data compression framework for wireless sensor networks using stacked convolutional autoencoder (S-CAE). SN Comput Sci. 2023;4(4):419.

    Article  Google Scholar 

  27. Raghavendra Nayaka P, Ranjan R. An efficient framework for algorithmic metadata extraction over scholarly documents using deep neural networks. SN Comput Sci. 2023;4(4):341.

    Article  Google Scholar 

  28. Kumble L, Patil KK. Evalutionary STBD model for bio-signal compression provisioning in wire-less sensor network. In: 2017 international conference on smart technologies for smart nation (SmartTechCon). IEEE; 2017. p. 1597–601.

Download references

Acknowledgements

The research work was made possible with the support of GITAM University, Bengaluru, Karnataka, India, which provided the necessary facilities.

Funding

No funding received for this research.

Author information

Authors and Affiliations

Authors

Contributions

This research endeavor was made possible by the collaboration and contributions of all authors.

Corresponding author

Correspondence to Geetha Rani E.

Ethics declarations

Conflict of interest

No conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Approaches for Image Processing, Wireless Networks, Cloud Applications and Network Security” guest edited by P. Raviraj, Maode Ma and Roopashree H R.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

E, G.R., Tukkoji, C. Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems. SN COMPUT. SCI. 5, 396 (2024). https://doi.org/10.1007/s42979-024-02736-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02736-1

Keywords

Navigation