{"title":"Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication","authors":"Megha Gupta, Laxmi Ahuja, Ashish Seth","doi":"10.1080/1206212x.2023.2267839","DOIUrl":null,"url":null,"abstract":"AbstractA hybrid chaotic-based DNA and multifactor authentication strategy are created to improve the protection of the cloud environment. Initially, multimodal data are collected from the data owner then the information is compressed by utilizing the deflate compression approach. The data is then encrypted using hybrid chaotic-based DNA cryptography to increase the security of data. In this hybrid algorithm DNA is used for the key generation and chaotic algorithm is utilized for the encryption process. On the other hand, a multifactor authentication method is created to access data from the cloud to block access by unauthorized users. In that technique, users are requested to enter the registered Password with the generated OTP from the mobile number. Then, the device serial number is another factor to verify the accessing device. Likewise, the user's fingerprint and iris recognition are also validated for accessing the data. The cloud-based data can be accessible following users' successful authentication. The simulation analysis shows that the encryption and decryption time reached for image, string and integer data is 24, 0.065, 37, 0.14, 28 and 0.14 s, respectively, for the cloud security algorithm. The proposed algorithm effectively mitigates space consumption and provides improved data security in a cloud environment.KEYWORDS: Cloud environmentsecuritycompressiondeflatehybrid chaotic-DNAmultifactor authentication AcknowledgementsAuthor express their deep sense of gratitude to the Founder President of Amity University, Dr. Ashok K. Chauhan for his keen interest in promoting research in the Amity University and have always been an inspiration for achieving great heights.Disclosure statementNo potential conflict of interest was reported by the author(s).Compliance with ethical standardsThis article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.Additional informationFundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Notes on contributorsMegha GuptaMegha Gupta is research scholar pursuing Ph.D from AIIT, Amity University, and Noida under guidance of Prof. (Dr.) Laxmi Ahuja & Co-Guide Prof. (Dr.) Ashish Seth. She is Gold Medalist in M.tech from Jamia Hamdard, New Delhi. She received her B.TECH degree with HONOURS from B.M.I.E.T Sonipat. Her research areas include Cloud Computing, Security, Software Engineering, Software Testing, Computer Networks, Database Management systems and Big Data. She has published several research papers in reputed international and national journals and also participated and presented research papers in various international, national conferences.Laxmi AhujaProf. (Dr.) Laxmi Ahuja Ph.D(CSE) working as Professor in Amity Institute of Information Technology with the role ranging from Lecturer to Professor to Dy. Director of the Department with in a span of 21 years. in academics; Her areas of interest include Search Engine, Data Mining and Soft Computing Approaches; published more than 100 research papers in International and National Conferences and Journals in SCOPUS Impact Factor Journals like Springer, Elsevier,Inderscience and several others. She has successfully filed number of patents under domain of Information Technology as an Inventor, which has been published in “International Journal of Patents” by Patent Department, Govt. of India. She has published many Lecture Notes for Springer Book chapter. Organized various sessions in International Conferences and Session chair in various Conferences. She has organized various Guest Lectures, Workshops and Faculty Development Programme. She is Associate Editor of Proceedings of the International Conference on Reliability, Infocom Technology and Optimization (Trends and Future Directions). She is actively involved in research activities. She has currently Eight research scholar under her guidance and supervised three students for Ph.D. She has also published number of Books related to operating system and Information Technology. She is Member of IEEE and Life Member of Computer Society of India, Past Vice chairman of IETE – The Institute of Electronics and Telecommunications Engineers, Senior member of IACSIT ,Member of IEEE Society. She is actively involved in various activities of these societies. She is also Technical Chair member in many Conferences. She has Awarded as Guest of Honor in many Events.Ashish SethAshish Seth, PhD. SMIEEE, ACM Distinguished Speaker Presently working as Professor at School of Global Convergence Studies, Inha University, South Korea and is presently deputed to Inha University in Tashkent, Uzbekistan from September 2016. Associated as Subject Expert with Transport and Telecommunications Institute, Riga Latvia, under the European Union project “Strengthening the Academic Staff of the Transport and Telecommunications Institute in the areas of Strategic Specialization” to teach programming languages.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212x.2023.2267839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
AbstractA hybrid chaotic-based DNA and multifactor authentication strategy are created to improve the protection of the cloud environment. Initially, multimodal data are collected from the data owner then the information is compressed by utilizing the deflate compression approach. The data is then encrypted using hybrid chaotic-based DNA cryptography to increase the security of data. In this hybrid algorithm DNA is used for the key generation and chaotic algorithm is utilized for the encryption process. On the other hand, a multifactor authentication method is created to access data from the cloud to block access by unauthorized users. In that technique, users are requested to enter the registered Password with the generated OTP from the mobile number. Then, the device serial number is another factor to verify the accessing device. Likewise, the user's fingerprint and iris recognition are also validated for accessing the data. The cloud-based data can be accessible following users' successful authentication. The simulation analysis shows that the encryption and decryption time reached for image, string and integer data is 24, 0.065, 37, 0.14, 28 and 0.14 s, respectively, for the cloud security algorithm. The proposed algorithm effectively mitigates space consumption and provides improved data security in a cloud environment.KEYWORDS: Cloud environmentsecuritycompressiondeflatehybrid chaotic-DNAmultifactor authentication AcknowledgementsAuthor express their deep sense of gratitude to the Founder President of Amity University, Dr. Ashok K. Chauhan for his keen interest in promoting research in the Amity University and have always been an inspiration for achieving great heights.Disclosure statementNo potential conflict of interest was reported by the author(s).Compliance with ethical standardsThis article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.Additional informationFundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Notes on contributorsMegha GuptaMegha Gupta is research scholar pursuing Ph.D from AIIT, Amity University, and Noida under guidance of Prof. (Dr.) Laxmi Ahuja & Co-Guide Prof. (Dr.) Ashish Seth. She is Gold Medalist in M.tech from Jamia Hamdard, New Delhi. She received her B.TECH degree with HONOURS from B.M.I.E.T Sonipat. Her research areas include Cloud Computing, Security, Software Engineering, Software Testing, Computer Networks, Database Management systems and Big Data. She has published several research papers in reputed international and national journals and also participated and presented research papers in various international, national conferences.Laxmi AhujaProf. (Dr.) Laxmi Ahuja Ph.D(CSE) working as Professor in Amity Institute of Information Technology with the role ranging from Lecturer to Professor to Dy. Director of the Department with in a span of 21 years. in academics; Her areas of interest include Search Engine, Data Mining and Soft Computing Approaches; published more than 100 research papers in International and National Conferences and Journals in SCOPUS Impact Factor Journals like Springer, Elsevier,Inderscience and several others. She has successfully filed number of patents under domain of Information Technology as an Inventor, which has been published in “International Journal of Patents” by Patent Department, Govt. of India. She has published many Lecture Notes for Springer Book chapter. Organized various sessions in International Conferences and Session chair in various Conferences. She has organized various Guest Lectures, Workshops and Faculty Development Programme. She is Associate Editor of Proceedings of the International Conference on Reliability, Infocom Technology and Optimization (Trends and Future Directions). She is actively involved in research activities. She has currently Eight research scholar under her guidance and supervised three students for Ph.D. She has also published number of Books related to operating system and Information Technology. She is Member of IEEE and Life Member of Computer Society of India, Past Vice chairman of IETE – The Institute of Electronics and Telecommunications Engineers, Senior member of IACSIT ,Member of IEEE Society. She is actively involved in various activities of these societies. She is also Technical Chair member in many Conferences. She has Awarded as Guest of Honor in many Events.Ashish SethAshish Seth, PhD. SMIEEE, ACM Distinguished Speaker Presently working as Professor at School of Global Convergence Studies, Inha University, South Korea and is presently deputed to Inha University in Tashkent, Uzbekistan from September 2016. Associated as Subject Expert with Transport and Telecommunications Institute, Riga Latvia, under the European Union project “Strengthening the Academic Staff of the Transport and Telecommunications Institute in the areas of Strategic Specialization” to teach programming languages.
摘要为了提高云环境的保护能力,提出了一种基于混沌DNA和多因素认证的混合策略。最初,从数据所有者处收集多模态数据,然后利用deflate压缩方法对信息进行压缩。然后使用基于混合混沌的DNA加密技术对数据进行加密,以增加数据的安全性。该混合算法采用DNA算法生成密钥,采用混沌算法进行加密。另一方面,创建了多因素身份验证方法来访问云中的数据,以阻止未经授权的用户访问。在该技术中,要求用户使用从移动号码生成的OTP输入注册密码。然后,设备序列号是验证访问设备的另一个因素。同样,用户的指纹和虹膜识别也要经过验证才能访问数据。用户身份验证成功后,可以访问基于云的数据。仿真分析表明,云安全算法对图像、字符串和整数数据的加解密时间分别为24、0.065、37、0.14、28和0.14 s。该算法有效降低了云环境下的空间消耗,提高了数据的安全性。关键词:云环境安全压缩压缩混合混沌-多因素认证致谢作者对Amity大学创始人校长Ashok K. Chauhan博士对推动Amity大学研究的浓厚兴趣表示深深的感谢,并一直激励着我们取得更大的成就。披露声明作者未报告潜在的利益冲突。本文完全是作者的原创作品;这篇文章之前没有发表过,在该杂志的编辑委员会决定不接受它发表之前,它不会被发送给其他出版物。作者声明在撰写本文期间没有收到任何资金、资助或其他支持。作者简介:tamegha Gupta是一名研究学者,在Laxmi Ahuja教授和共同指导教授Ashish Seth的指导下,在AIIT、Amity大学和Noida攻读博士学位。她是来自新德里贾米亚哈达德的理科硕士金牌得主。她以优异的成绩获得B.M.I.E.T Sonipat学士学位。她的研究领域包括云计算、安全、软件工程、软件测试、计算机网络、数据库管理系统和大数据。她在国际和国内知名期刊上发表了多篇研究论文,并参加了各种国际、国家会议并发表了研究论文。你的事迹AhujaProf。Laxmi Ahuja博士(CSE)在Amity信息技术研究所担任教授,在21年的时间里,从讲师到教授,再到系主任。在学者;她的研究领域包括搜索引擎、数据挖掘和软计算方法;在SCOPUS影响因子期刊(如施普林格,Elsevier,Inderscience等)的国际和国内会议和期刊上发表了100多篇研究论文。她以发明人的身份在信息技术领域成功申请了多项专利,这些专利已在印度政府专利部的“国际专利杂志”上发表。她出版了许多b施普林格书章节的讲义。组织各种国际会议并担任会议主席。她曾多次举办客座讲座、工作坊及教师发展计划。她是《可靠性、信息通信技术和优化(趋势和未来方向)国际会议论文集》的副主编。她积极参与研究活动。目前指导研究学者8人,指导博士研究生3人。出版了多部操作系统和信息技术相关书籍。她是IEEE的成员和印度计算机协会的终身会员,IETE - The Institute of Electronics and Telecommunications Engineers的前任副主席,IACSIT的高级成员,IEEE Society的成员。她积极参与这些社团的各种活动。她也是许多会议的技术主席成员。她在许多活动中被授予荣誉嘉宾。Ashish Seth,博士。SMIEEE, ACM杰出演讲者,现为韩国仁荷大学全球融合研究学院教授,2016年9月起派驻乌兹别克斯坦塔什干仁荷大学。
期刊介绍:
The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.