Back to Search Start Over

Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud.

Authors :
Shrivastava, Pranav
Alam, Bashir
Alam, Mansaf
Source :
Cluster Computing. Dec2023, Vol. 26 Issue 6, p3673-3688. 16p.
Publication Year :
2023

Abstract

Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector. CC is a centralized and distributed network comprised of interrelated and interconnected systems, and the whole universe uses the cloud for the ultimate portion of data transmission. However, the cloud cannot provide security assurance, which is one of the main drawbacks of the cloud. Blockchain is the fascinating massive attention in the cloud field because of its security features. It consists of a chain of several blocks composed of multiple transactions. These data available in blocks are encrypted and cannot be altered by any in the world. Several emerging applications are affected by insurance companies, anomalies, thieves, and intruders fetching individual data and disturbing the user's routine. This paper develops a blockchain-based modified infinite chaotic elliptic cryptography (MICEC) to improve and tighten the security in the cloud. It contains three stages: protection of authentication, ownership protection, and identity mapping validation. At first, MICEC is employed for an authentication process that combines the infinite elliptic curve cryptography and modified chaotic neural network for pair of key generation and data encryption. In addition, the hash function is generated with the aid of the improved message digest 5 algorithm. Second, the improved Message Content Recommendation Algorithm with Latent Dirichlet Allocation is used to compute the score values. At last, cosine similarity matching criteria is computed in the validation based on the digests. The proposed work is simulated using the JAVA programming language with NetBeans IDE. The performance is evaluated and compared to other methods. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
13867857
Volume :
26
Issue :
6
Database :
Academic Search Index
Journal :
Cluster Computing
Publication Type :
Academic Journal
Accession number :
173017167
Full Text :
https://doi.org/10.1007/s10586-022-03777-y