Base paper4
Base paper4
net/publication/345438033
CITATIONS READS
86 4,742
3 authors, including:
Chinnasamy Ponnusamy
Kalasalingam Academy of Research and Education
86 PUBLICATIONS 1,106 CITATIONS
SEE PROFILE
All content following this page was uploaded by Chinnasamy Ponnusamy on 09 November 2020.
Abstract Services are distributed among all servers and between the users and
individuals in the cloud environment. Cloud providers have trouble guaranteeing
file protection as security is the biggest issue in data handling and transfer as it can
be accessed, misused and destroyed the original data form. Cloud security is a big
concern in the cloud computing environment. To safeguard the cloud environment,
many research works are being proposed. To overcome the security issue and achieve
the CIA property (confidentiality, integrity and availability) the cryptography is used.
Cryptography is the most useful technique to ensure a high level of data transfer and
storage security. In traditional symmetric and asymmetric has some limitations. To
solve this we are going to introducing a new hybrid technique to achieve high data
security and confidentiality. In this article, we are combing ECC and Blowfish to
implement a hybrid algorithm. The performance of the hybrid system is compared
with the existing hybrid method and shows that the proposed method provides high
security and confidentiality of patient data. The hybrid cryptography is used to defeat
the inconveniences of both symmetric and asymmetric.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 537
to Springer Nature Singapore Pte Ltd. 2021
G. Ranganathan et al. (eds.), Inventive Communication and Computational
Technologies, Lecture Notes in Networks and Systems 145,
https://doi.org/10.1007/978-981-15-7345-3_46
538 P. Chinnasamy et al.
1 Introduction
2 Related Works
Few of the hybrid cryptosystem algorithms are discussed below along with their
advantages and disadvantages for secure cloud storage.
Kamara and Lauter [5] have proposed a security model that works on the
public cloud, using cryptographic primitives for verifying data integrity. This paper
discussed the benefits of cloud storage such as availability, reliability, efficient
retrieval and data sharing, which combines recent and non-standard cryptographic
primitives for secure cloud storage.
A hybrid data encryption system that would use both RSA and Blowfish was
implemented in [6]. In this, they used a mathematical methodology to implement
the Field Programmable Gate Array (FPGA). This strategy is very effective given its
low cost and high level of protection. But key size (448 bits) is the primary issue.
Maitri and Verma [7] suggested the use of a hybrid cryptographic technique
to protect cloud file storage. They used steganography with LSB by which the
encryption key is covered into a picture header for key information integrity.
In [8], an innovative technique of hybrid cryptography was developed for health
records. In that, they used Blowfish and enhanced RSA algorithms to improve patient
data security and prevent false requests.
Wang et al. [9] introduced a new method to encrypt information and send encrypted
data to another user, the user creates the public key. Decryption is done through a
private key. Use of symmetric and asymmetric searchable encryption to search over
encrypted data. Wang et al. have designed a model that uses security encryption
techniques, and users should have prior knowledge of encrypted data.
In [10], he presented a hybrid technique (AES-RSA) for lightweight data.
However, it cannot be applied to multimedia data as it provides security for
lightweight data only.
In addition to Order Preserving Symmetric Encryption (OPSE), symmetric search-
able encryptions were employed. System analysis has shown its usefulness in the case
of a graded keyword search, but attacks, integrity and confidentiality are not rele-
vant information. So, it might not be appropriate to provide security. Incremental
encryption [11] enables data to be encrypted and exchanged with other authorized
users with a different encryption key before being stored in the cloud. Agarwal and
Agarwal [12] spoke about security threats in the cloud.
Dubey et al. [13] proposed to exchange data in the cloud using RSA and they
have used the MD5 algorithm for data integrity. They utilized the RSA algorithm to
encrypt large data files to enhance data security in the cloud.
Sarkar and Kumar [14] recommended a method for ensuring cloud data protection
using hybrid encryption. This strategy would also boost data protection at a high
overhead communication rate in the cloud.
Chinnasamy and Deepalakshmi [15] introduced a novel technique which produces
access control as a service using multilabel (SMBACaaS). They have used an
improved key generation scheme of RSA (IKGSR) for generating key and signature
to achieve better confidentiality and security.
540 P. Chinnasamy et al.
The different types of cryptographic algorithms are analyzed in [16] and are used
in modern cloud storage. We gave a quick summary of various security concerns,
and how we can use cryptographic methods to create stable cloud storage systems.
Singh and Kaur [17] suggested a user data encryption system before being trans-
mitted to the cloud. AES is used to encrypt user data, and the RSA algorithm encodes
the secret key. The same operation for decryption is followed, too. The hybrid strategy
had been used to combat cloud DOS attacks. Similar to other methods, the only
downside of this approach is more time-consuming. Akomolafe and Abodunrin [18]
created a new data storage architecture using the cryptographic hybrid model. Secure
data storage is obtained by using the AES, Blake2b and Schnorr Signature algorithms.
The service provider is unknown about the personal encryption method to provide a
high level of security because data encryption is performed on the client-side before
uploading to the cloud. The method is nonetheless incompatible with multimedia
files.
Karthik et al. [19] proposed the use of both symmetric key (One-Time-Pad) and
Asymmetric-key algorithm (RSA) to provide strong security. The product of this
approach offered better security. The time taken to encipher data is also faster than
the process already in use.
Rahmani et al. [20] proposed a new method for cloud services with XaaS archi-
tecture. The authors suggested Cloud Encryption as a Service (EaaS) by which the
service provider encryption security risk is reduced and client-side protection is
enhanced.
From these surveys, the cloud provider is responsible for the security of client data.
An asymmetric cryptosystem with hyper-elliptic curve cryptography is proposed for
efficient data security, which provides secure data encryption as well as protected
shield against data theft on the cloud. From the user’s point of view, he believes the
user has to access a high amount of cloud data in a protected way. However, the
complexity of the cryptographic algorithm used, with the security concern, has not
been given much importance. To resolve the complexities of the algorithm proposed
earlier, the proposed model must assist directly in knowledgeable, fast and safe access
to data.
The hybrid approach described above provides confidentiality only. Whereas our
proposed method is novel in terms of providing features such as; enhancing client-
side security through the use of hybrid cryptosystem (BLOWFISH+ECC), the effi-
ciency of the proposed method is greatly improved in comparison with existing
methods, as well as security also enhanced.
3 Proposed Method
The hybrid cryptography combines the public key cryptography with the symmetric
key cryptography. The hybrid algorithms used here are Elliptic curve cryptography
(public key cryptography) and Blowfish algorithm (symmetric key cryptography).
Elliptical curve cryptography (public key encryption) based on the Elliptic curve
Efficient Data Security Using Hybrid Cryptography … 541
theory that can be used to generate cryptographic keys that are faster, smaller and
more effective. The advantage of an Elliptic curve is smaller chip size, less power
consumption, increase in speed, etc. Blowfish is a freely available symmetric encryp-
tion algorithm, which is a very powerful weapon against hackers and cybercriminals
used in a wide range of products including some secure email encryption devices,
backup software and password. Due to the small number of rounds, Blowfish is a
relatively fast block cipher (encryption tool) very powerful with a relatively simple
structure. In this section, we are going to explain the basic functionalities of Blowfish
and Elliptic curve cryptographic algorithms.
Blowfish is a symmetrical block cipher that performs a Fiesta network, which consists
of 16 rounds of functional decryption and iterative encryption.
The block size used is 64 bit and the size of the key can differ from any length to
448. Blowfish cipher uses 18 32 bit sub-arrays commonly known as P-boxes, and 4
32 bit replacement boxes each with 256 entries.
It consists of two stages: The first is Key Extension, and the other is data encryp-
tion. Key is converted into many sub-keys in the key expansion process, and encryp-
tion occurs in the data encryption phase across 16-round networks. Every round
involves a key-dependent permutation and a substitution based on key and data
(Fig. 1).
For smaller key size, huge speed and low consumption of memory the elliptic curve
cryptography (ECC) has been choosing for instantiating schemes related to the public
key, digital encryption, bitcoin services and others. Those proven ECC reputations
are based on its algorithmically complex, discrete problem with the logarithm (DLP).
In the FP prime finite field, the Elliptic curve is about the cloud of points described
in the below equation
y2 = x3 + ax + b mod p (1)
where x, y, a and b are all elements within the FP. The points to be on the curve is
determined by the a and b coefficients.
System Model
The cloud serves as the main storage medium where data of the patient is stored
in encrypted form using the Blowfish algorithm and its key is encrypted using the
public key Elliptic curve. The ciphertext of both patient’s data and the Blowfish key
are stored in the cloud. To decrypt the Blowfish key the private key of the Elliptic
curve cryptography is used and the decrypted Blowfish key is obtained. The Blowfish
algorithm uses the decrypted Blowfish key to decipher the patient’s data (Fig. 2).
Here the patient’s data is taken into account for storage and retrieval of the data
from the cloud using the hybrid algorithms (Elliptic curve and Blowfish). The process
takes place here is
1. Upload process
2. Download process.
Upload Process
If this is a script or plain text, then the path or data to be directly encrypted is defined
by the client. The feature automatically generates a symmetric key called one key,
based on the key size. The Blowfish is used to encipher plaintext P to obtain ciphertext
C. The hidden key of Blowfish is authenticated by the Elliptic Curve cryptography
process and the key that is encrypted is stored in a secure location.
Download Function
The user gets ciphertext C from the cloud. Elliptic curve cryptography algorithm
is used for ciphertext key decryption. To obtain the plaintext P, the downloaded
ciphertext data C is decrypted with the Blowfish algorithm.
Implementation
To implement the proposed method the operating system used is Windows 10 and
Java 1.8 for the front end, as it is free and platform-independent. For the storage
purpose, i.e. for the database SQLite is used which is the commonly used database
Efficient Data Security Using Hybrid Cryptography … 543
as it is free and code can be available in the public domain. The IDE used here is
NetBeans 8.01 which is open-source and used for Java Desktop applications and the
cloud server is Apache Tomcat Server 8.0.27.0 as it is open source and implements
Java server pages and Java servlets. The key settings for our proposed method are
shown in Table 1.
In the below graph to compare the efficiency of the hybrid algorithm (Elliptic curve
and Blowfish) the parameters taken into consideration are time in terms of (seconds)
544 P. Chinnasamy et al.
along x-axis and data size (a record) in terms of (MB) along the y-axis and the
encryption, time is compared (Fig. 3 and Table 2).
In the below graph the algorithm (Blowfish and AES) is compared with our hybrid
algorithm. Both AES and Blowfish comes under the symmetric key cryptography.
Symmetric algorithms have the main advantage of faster execution and efficient for
large amounts of data. By the above graph, it is evident that our hybrid algorithm is
efficient than the other algorithms (Fig. 4 and Table 3).
Efficient Data Security Using Hybrid Cryptography … 545
5 Security Analysis
We used two separate keys for the decryption process inside the hybrid cryptosystem.
This improved data and key protection even after lost one key. However, the attack
cannot be carried out while the data is already in an encrypted state.
The security of the ECC algorithm is based on the elliptic curve discrete logarithm
problem (ECDLP) is hard. ECC has many operations to compute the curve because
all the operations are based on different coordinates. Also, it provides security against
differential fault attacks.
546 P. Chinnasamy et al.
The secured data storage problem is solved by introducing our proposed hybrid
cryptography method. The drawbacks of the cloud are lack of greater security and
privacy. This model proposed is designed and implemented in Java, incorporating
the best techniques of both symmetric key (Blowfish) and asymmetric-key (ECC).
The Blowfish and ECC algorithms are used for the processes of key generation,
encryption and decryption. Elliptic curve cryptography (ECC) is implemented to
achieve an enhanced level of security in cloud computing. ECC provides a more
robust and secure model for developing and deploying a secure application in the
cloud. To solve the key distribution we can incorporate with steganography method
to hide the keys. In the future, to solve the key distribution we can incorporate with
steganography method and compare this work with the existing hybrid method.
References
14. Sarkar MK, Kumar S (2016) Ensuring data storage security in cloud computing based on
hybrid encryption schemes. In: Fourth international conference on parallel, distributed and grid
computing (PDGC), Waknaghat, pp 320–325. https://doi.org/10.1109/pdgc.2016.7913169
15. Chinnasamy P, Deepalakshmi P (2018) A scalable multilabel-based access control as a service
for the cloud (SMBACaaS). Trans Emerg Telecommun Technol 29(8):e3458. https://doi.org/
10.1002/ett.3458,2018
16. Yong P, Wei Z, Feng X, Zhong-hua D, Yang G, Dongqing C (2012) A secure cloud storage
based on cryptographic techniques. J China Univ Posts Telecommun 19:182–189
17. Singh N, Kaur PD (2015) A hybrid approach for encrypting data on cloud to prevent DoS
attacks. Int J Database Theor Appl 8(3):145–154. http://dx.doi.org/10.14257/ijdta.2015.8.3.12
18. Akomolafe OP, Abodunrin MO (2017) A hybrid cryptographic model for data storage in mobile
cloud computing. Int J Comput Netw Inform Sec 6:53–60
19. Karthik, Chinnasamy, Deepalakshmi (2017) Hybrid cryptographic technique using OTP:RSA.
In: 2017 IEEE international conference on intelligent techniques in control, optimization and
signal processing (INCOS), Srivilliputhur, pp 1–4
20. Rahmani H, Sundararajan E, Zulkarnain Md, Ali AMZ (2013) Encryption as a service (EaaS)
as a solution for cryptography in cloud. Procedia Technol 11:1202–1210