44
Views
0
CrossRef citations to date
0
Altmetric
Articles

Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication

, &
Pages 680-696 | Received 19 Jan 2023, Accepted 31 Aug 2023, Published online: 18 Oct 2023

References

  • Gupta M, Ahuja L, Seth A. A Study on Cloud Environment: Confidentiality Problems, Security Threats, and Challenges. Soft Computing for Security Applications. Advances in Intelligent Systems and Computing. 2022;1397:679–698. doi:10.1007/978-981-16-5301-8_49
  • Gupta M, Ahuja L, Seth A. A novel security framework for threat management of cloud based computing networks 6–7 May 2022 Jaipur, IndiaRecent Advances In Sciences, Engineering, Information Technology & Management.2023. doi:10.1063/5.0154526
  • Tabrizchi H, Kuchaki Rafsanjani M. A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. 2020;76(12):9493–9532. doi:10.1007/s11227-020-03213-1
  • Seth B, Dalal S, Jaglan V, et al. Integrating encryption techniques for secure data storage in the cloud. Trans Emerg Telecommun Technol. 2022;33(4):e4108. doi:10.1002/ett.4108
  • Karthick S, Sankar SP, Prathab TR. An Approach for Image Encryption/Decryption Based on Quaternion Fourier Transform . In IEEE International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR). 2018. doi:10.1109/ICETIETR.2018.8529014
  • Elshamy EM, Hussein AI, Hamed HF, et al. Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem. Multimed Tools Appl. 2021;80:9877–9893. doi:10.1007/s11042-020-09986-0
  • Chaudhary R, Aujla GS, Kumar N, et al. Optimized big data management across multi-cloud data centers: software-defined-network-based analysis. IEEE Commun Mag. 2018;56(2):118–126. doi:10.1109/MCOM.2018.1700211
  • Mokadem R, Hameurlain A. A data replication strategy with tenant performance and provider economic profit guarantees in cloud data centers. J Syst Softw. 2020;159:110447. doi:10.1016/j.jss.2019.110447
  • Chinnasamy P, Padmavathi S, Swathy R, et al. Efficient data security using hybrid cryptography on cloud computing, In Inventive Communication and Computational Technologies: Proceedings of ICICCT, Singapore. Springer Singapore; 2020. p. 537–547.
  • Pravin A, Prem Jacob T, Nagarajan G. Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique. J Ambient Intell Humaniz Comput. 2019:1–8. doi:10.1007/s12652-019-01563-0.
  • Geng Y. Homomorphic encryption technology for cloud computing. Procedia Comput Sci. 2019;154:73–83. doi:10.1016/j.procs.2019.06.012
  • Li H, Yu C, Wang X. A novel 1D chaotic system for image encryption, authentication and compression in cloud. Multimed Tools Appl. 2021;80(6):8721–8758. doi:10.1007/s11042-020-10117-y
  • Prabhu Kavin B, Ganapathy S, Kanimozhi U, et al. An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA. Wirel Pers Commun. 2020;115:1107–1135. doi:10.1007/s11277-020-07613-7
  • Kakkad V, Patel M, Shah M. Biometric authentication and image encryption for image security in cloud framework, multiscale and multidisciplinary modeling. Exp Des. 2019;2:233–248.
  • Dangi R, Pawar S. An improved authentication and data security approach over cloud environment. Harmony Search and Nature Inspired Optimization Algorithms: Theory and Applications, ICHSA 2018, Singapore. Springer; 2019. p. 1069–1076.
  • Joseph T, Kalaiselvan SA, Aswathy SU, et al. Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. J Ambient Intell Humaniz Comput. 2021;12(6):6141–6149. doi:10.1007/s12652-020-02184-8
  • Vengala DVK, Kavitha D, Kumar AS. Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment. Complex Intell. Syst.. 2021:1–14. doi:10.1007/s40747-021-00305-0.
  • Prabha KM, Saraswathi PV. Suppressed K-anonymity multi-factor authentication based schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Comput Commun. 2020;158:85–94. doi:10.1016/j.comcom.2020.04.057
  • Lo'ai AT, Saldamli G. Reconsidering big data security and privacy in cloud and mobile cloud systems. J King Saud Univ-Comput Inform Sci. 2021;33(7):810–819. doi:10.1016/j.jksuci.2019.05.007
  • Abbas MS, Mahdi SS, Hussien SA. Security improvement of cloud data using hybrid cryptography and steganography. 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq. IEEE; 2020. p. 123–127
  • Shanmugam DB, Vijayalakshmi N, Sesubalan SA, et al. Security improvement of cloud data using hybrid cryptography and steganography.
  • Bhargavi P, Srilakshmi K. Efficient dual compression and encryption technique for enhanced cloud security. J. Green Eng. 2020;10(10):8721–8735.
  • Rupa C, Harshitha M, Srivastava G, et al. Securing multimedia using a deep learning based chaotic logistic map. IEEE J Biomed Health Inform. 2022;27(3):1154–1162. doi:10.1109/JBHI.2022.3178629
  • Nikhila V, Rupa C. Intensifying multimedia information security using comprehensive cipher. 2019 Innovations in Power and Advanced Computing Technologies (i-PACT); Vellore. IEEE; 2019, March, Vol. 1, p. 1–4.
  • Rupa C. A secure information framework with ap RQ properties. J Inst Eng India Ser B. 2017;98:359–364. doi:10.1007/s40031-016-0263-3
  • Jiang H, Lin SJ. A rolling hash algorithm and the implementation to LZ4 data compression. IEEE Access. 2020;8:35529–35534. doi:10.1109/ACCESS.2020.2974489
  • Sivanandam L, Periyasamy S, Oorkavalan UM. Power transition X filling based selective Huffman encoding technique for test-data compression and scan power reduction for SOCs. Microprocess Microsyst. 2020;72:102937. doi:10.1016/j.micpro.2019.102937
  • Wang XY, Li ZM. A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng. 2019;115:107–118. doi:10.1016/j.optlaseng.2018.11.010
  • Li G, Zhang X, Yang H. Complexity analysis and synchronization control of fractional-order Jafari-Sprott chaotic system. IEEE Access. 2020;8:53360–53373. doi:10.1109/ACCESS.2020.2980935
  • Namasudra S, Chakraborty R, Majumder A, et al. Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans Multimedia Comput Commun Appl. 2020;16(3):1–19.
  • Dataset 1. https://archive.ics.uci.edu/ml/datasets/Educational+Process+Mining+%28EPM%29%3A+A+Learning+Analytics+Data+Set.
  • Dataset 2. https://www.kaggle.com/prakharrathi25/banking-dataset-marketing-targets.
  • Dataset 3. https://www.kaggle.com/sovitrath/diabetic-retinopathy-224(224-gaussian-filtered.
  • Pushpa B. Hybrid data encryption algorithm for secure medical data transmission in cloud environment. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), Erode. IEEE; 2020. p. 329–334.
  • Velmurugadass P, Dhanasekaran S, Anand SS, et al. Enhancing blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Mater Today Proc. 2021;37:2653–2659. doi:10.1016/j.matpr.2020.08.519

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.