Abstract: People nowadays repeatedly brought sensitive information in the cloud storage. When it comes to maintaining data on the cloud for IoT applications, security is a huge concern. Cryptography methods are highly beneficial for enforcing data security. A hybrid cryptographic strategy is addressed in this invention to provide improved security for data maintained on cloud storage. The presented invention incorporates the IKGRSA and enhanced AES algorithms to offer a hybrid of the two algorithms for data protection before it could be uploaded to the cloud. It has been confirmed that the proposed invention offers enhanced data security and privacy for recent IoT applications. 5 claims & 1 Figure
Claims:The scope of the invention is defined by the following claims:
Claim:
1. A system/method for enhancing the security of IoT applications using hybrid cryptographic technique, said system/method comprising the steps of:
a) The user browse the data from computer/ mobile (1) to secure the data’s and the enhanced AES algorithm (2) is invoked to generate a key as well as to encrypt the data.
b) The ciphertext (3) of user data is uploaded to the cloud and an enhanced AES secret key is encrypted thru IKGSR (4) public key.
c) The encrypted key (5) is uploaded to the cloud and the end user download (6) the ciphertext at their end.
d) The end user first start to decipher the key of AES (7) followed by deciphering the data (8) is initiated by end user. Finally end user get the original data (9) at their end.
2. As mentioned in claim 1, the data owner can browse their data to upload into the cloud and the data is encrypted by EAES algorithm before uploading into the cloud.
3. As per claim 1, the secret key of EAES algorithm was encrypted using the public key of IKGSR. Encoded data along with key are upload into the cloud.
4. As per claim 1, the end user download the encoded data at their end. Encoded messages has ciphertext of data and key. Hence, first decode the key of EAES using the private key of IKGSR.
5. As per claim 1, finally, the end user can able to view the original data which is sent from the owner side. , Description:Field of Invention
The present invention relates to, all the applications/use cases, where secure storing and processing the sensitive user’s information by applying the hybrid cryptographic mechanism. By proposing this type of algorithms, the security and privacy of all the applications related to smart healthcare, smart cities, smart home and smart agriculture are enhanced by incorporating the hybrid cryptographic process.
Background of the invention
A few number of hybrid cryptographic algorithms have already been developed. However one system, depicted in Matyas (US1992/5142578), provides a methodology and device for securely distributing data by encrypting the data using DEA and encode the key of DEA using a public key algorithm. Another type of technique has been introduced in U.S. Pat. No. (US 2019 /0245682) by Joel Alwen, this a first device receives an encrypted communication from a second device. The encrypted communication includes a first encrypted secret, a second encrypted secret, a first signature, and a second signature. The first device verifies the first signature and the second signature, and, when the first and second signatures are valid, decrypts the first encrypted secret using a first encryption algorithm and the second encrypted secret using a second encryption algorithm.
On cloud computing networks, a technique for storing and retrieving electronic data utilizing Galois Fields as well as informational security has been developed by Lesavich et al (US2015/9137250). The Alwen (US 2019 /0245682) proposes a hybrid encryption technique, platform, and non-transitory software storage for sharing encrypted messages. A first device collects an encrypted messages out of a different device, and per the proposed architecture. The encoded messages contains the secret messages and signatures of first and second devices.
The (Kumar et al [2020], 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), pp.514-517), proposed a hybrid system to secure the IoT based applications. Here, they have used RSA and DES algorithm for secure the data. Furthermore, 3 keys were released for encoding and decoding, hence the key distribution has been extremely safe. In (Chinnasamy et al [2020], Lecture Notes in Networks and Systems, 145, pp- 537-547), the authors are suggested to use Blowfish and ECC algorithm to enhance the security of the cloud computing. They have implemented this algorithm using JAVA based crypto libraries. The performance of the proposed method was analyzed in terms of encode and decoding time with (Chinnasamy et al [2018], 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 1717-1720)
To offer enhanced security, (Karthik et al. [2017], 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), pp-14) recommended using One-Time-Pad along with RSA. This method yielded a higher level of security. The decoding time of this method is higher than the existing methods. The (Chinnasamy et al [2018], Advances in Intelligent Systems and Computing, 145, pp-341-350), introduced the enhanced key generation method on RSA algorithms by using four prime numbers. They have used this algorithms to share the data in secure manner in health care applications. In (Prasath et al. [2021], Journal of Mathematical and Computational Science, 10, pp- 2208-2232) implemented a hybrid system to secure the data on IoT applications. They have used AES -128 bit algorithm along with MD5 technique. The performance of this method was analyzed by time complexity. However, the security of this method is lacked in terms of key sharing. Not only this, the authors (Chinnasamy et al [2021], Journal Ambient Intelligence Humanized Computing, pp 1-20), introduced the hybrid cryptographic method to securely share the health care data as well as it offers a role based access control on customer data.
The purpose of the invention is to enhance the security and privacy of the user’s data on many applications like smart healthcare, smart cities, smart home and smart agriculture. Upto now, many applications used only the single cryptographic algorithm to secure the user data, but we are enhancing the security level by hybrid methods.
Summary of the invention
The security of cloud based IoT applications a major concern. In this innovation, a hybrid solution for enhancing the security of IoT applications by utilizing the hybrid cryptographic mechanism (enhanced AES and IKGSR). The IKGSR algorithm is designed to achieve the desired level of data protection. IKGSR creates a considerably stronger reliable and consistent foundation for the creation and execution of secure cloud based IoT applications.
Brief Description of Drawings
The invention will be described in detail with reference to the exemplary embodiments shown in the figures wherein:
Figure 1 Proposed Method For Secure Cloud Storage Using Hybrid Cryptography.
Detailed Description of the Invention
The traditional AES algorithm security is depends on the key size. Generally, AES uses a 3 different key (i.e. 128, 192, 256 bits) based on the number of rounds (i.e. 10, 12, 14) to be performed. In this invention, we are increasing the key size to 40 bytes as well as the round is increased to 16. As a result, the AES method's confidentiality is increased in terms of round operations, and this also provides security against unwanted access. Another benefit is the hackers more difficult to break. The encoding is a process of converting a given message into an unreadable message. In the proposed scheme, the number of iterations is increased to 16 instead of 10. The initial key of EAES method is constructed by using the Polybius square method proposed in (Kumar et al [2015], International Journal of Innovations in Engineering Technology, 5, pp-227–229). The encoding functionalities is combination of substitution bytes, rows shifting, column mixing and adding of round key.
With something like a 6X6 matrices, Polybius Square is utilized to generate the initial key. This made up of alphanumeric characters that are filling in without duplication form left to right (Kumar et al [2015], International Journal of Innovations in Engineering Technology, 5, pp-227–229). The digits are organized through 0 to 9 in increasing order. The reverse process of encoding is named as decoding. The inverse configuration of encoding operations is used here to find the plaintext. IKGSR (Improved Key Generation Scheme of RSA) has already been developed by (Chinnasamy et al [2018], Advances in Intelligent Systems and Computing, 145, pp-341-350). The key pairs in this scenario are generated using four huge prime numbers. The values of public and private key E and D in the classic RSA scheme are dependent on the product of two prime numbers, however in IKGSR, the value of E and D is generated by Z, and that is a product of four huge prime integers. IKGSR's strength is also demonstrated against by the Chosen Ciphertext Attack (CCA) as well as the timing attack.
The cloud acts as the key storage device in which the sensitive data is kept in encoded form by utilizing the enhanced AES method and its key is encoded thru public key of IKGSR. In the cloud, the owner store the ciphertext of both the data and key. The following is process is carried out during the uploading of owner data in client side. The user should select the data from computer/ mobile. Then the enhanced AES algorithm is invoked to generate a key as well as to encrypt the data. After that, an enhanced AES secret key is encrypted thru IKGSR public key, finally, the encrypted data and key is uploaded to the cloud. In the receiver side, the reverse process of uploading operation has been performed to obtain the patient data.
5 Claims & 1 Figure
| # | Name | Date |
|---|---|---|
| 1 | 202141057660-REQUEST FOR EARLY PUBLICATION(FORM-9) [11-12-2021(online)].pdf | 2021-12-11 |
| 2 | 202141057660-FORM-9 [11-12-2021(online)].pdf | 2021-12-11 |
| 3 | 202141057660-FORM FOR SMALL ENTITY(FORM-28) [11-12-2021(online)].pdf | 2021-12-11 |
| 4 | 202141057660-FORM FOR SMALL ENTITY [11-12-2021(online)].pdf | 2021-12-11 |
| 5 | 202141057660-FORM 1 [11-12-2021(online)].pdf | 2021-12-11 |
| 6 | 202141057660-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-12-2021(online)].pdf | 2021-12-11 |
| 7 | 202141057660-EVIDENCE FOR REGISTRATION UNDER SSI [11-12-2021(online)].pdf | 2021-12-11 |
| 8 | 202141057660-EDUCATIONAL INSTITUTION(S) [11-12-2021(online)].pdf | 2021-12-11 |
| 9 | 202141057660-DRAWINGS [11-12-2021(online)].pdf | 2021-12-11 |
| 10 | 202141057660-COMPLETE SPECIFICATION [11-12-2021(online)].pdf | 2021-12-11 |