{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:38:47Z","timestamp":1775421527296,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T00:00:00Z","timestamp":1615420800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T00:00:00Z","timestamp":1615420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing (CC) is a technology that delivers its service by means of the internet. In the modern scenario, cloud storage services have gained attention. The cloud environment confronts data breaches expansively in cloud storage, which might bring about the disclosure of personal in addition to corporate data. Thus, the requirement arises for the creation of a more foremost authentication system. Customary authentication schemes depend on techniques, like Password Authentications Protocol (PAP), Challenge Handshakes Authentication Protocols (CHAP), as well as One-Time Pads (OTP), which are often susceptible to malevolent attacks as well as security threats. To shun such issues, this paper proposed a Modified ECC centred secure data transfer and a \u20183\u2019-factor authentication scheme in the untrusted cloud environment. The proposed work comprises \u20183\u2019 steps: authentication, data compression, and safe data transfer. In the authentication phase, the SHA-512 algorithm along with CCP is utilized. After that, the user-uploaded data is compressed utilizing CHA on the server-side. Next, MECC encrypts the compressed data, and then, safely uploaded it to the cloud server (CS). In the investigational appraisal, the proposed work is contrasted with the prevailing methods. The outcomes proved that the proposed work renders better security than the prevailing methods.<\/jats:p>","DOI":"10.1007\/s40747-021-00305-0","type":"journal-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T10:04:31Z","timestamp":1615457071000},"page":"2915-2928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment"],"prefix":"10.1007","volume":"9","author":[{"given":"Dilip Venkata Kumar","family":"Vengala","sequence":"first","affiliation":[]},{"given":"D.","family":"Kavitha","sequence":"additional","affiliation":[]},{"given":"A. P. Siva","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,11]]},"reference":[{"key":"305_CR1","doi-asserted-by":"crossref","unstructured":"Zhang Z-H, Xue-Feng J, Li J-J, Jiang W (2012) An identity-based authentication scheme in cloud computing. In: International conference on industrial control and electronics engineering (ICICEE), IEEE, pp 984\u2013986","DOI":"10.1109\/ICICEE.2012.261"},{"issue":"1","key":"305_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7\u201318","journal-title":"J Internet Serv Appl"},{"issue":"5","key":"305_CR3","first-page":"136","volume":"2","author":"S Mithila","year":"2012","unstructured":"Mithila S, Kumar PP (2012) Data security through confidentiality in cloud computing environment. Int J Comput Sci Inf Technol 2(5):136\u2013840","journal-title":"Int J Comput Sci Inf Technol"},{"key":"305_CR4","doi-asserted-by":"crossref","unstructured":"Semwal P, Sharma MK (2017) Comparative study of different cryptographic algorithms for data security in cloud computing. In: 3rd International conference on advances in computing, communication and automation (ICACCA) (Fall), IEEE, pp 1\u20137","DOI":"10.1109\/ICACCAF.2017.8344738"},{"key":"305_CR5","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.procs.2017.12.089","volume":"125","author":"PR Kumar","year":"2018","unstructured":"Kumar PR, Raj PH, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Proc Comput Sci 125:691\u2013697","journal-title":"Proc Comput Sci"},{"key":"305_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88\u2013115","journal-title":"J Netw Comput Appl"},{"key":"305_CR7","first-page":"1","volume":"17","author":"J Srinivas","year":"2018","unstructured":"Srinivas J, Das AK, Kumar N, Rodrigues J (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Dependable Secure Comput 17:1\u20131","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"305_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-015-0028-6","volume":"2016","author":"BB Gupta","year":"2016","unstructured":"Gupta BB, Yamaguchi S, Chelliah PR (2016) Guest editorial special issues on security trends in mobile cloud computing, web, and social networking. EURASIP J Inf Secur 2016:1","journal-title":"EURASIP J Inf Secur"},{"issue":"5","key":"305_CR9","first-page":"38","volume":"4","author":"J Vyas","year":"2017","unstructured":"Vyas J, Modi P (2017) Providing confidentiality and integrity on data stored in cloud storage by hash and meta-data approach. Int J Adv Res Eng Sci Technol 4(5):38\u201350","journal-title":"Int J Adv Res Eng Sci Technol"},{"key":"305_CR10","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.procs.2017.06.124","volume":"110","author":"G Ramachandra","year":"2017","unstructured":"Ramachandra G, Iftikhar M, Khan FA (2017) A comprehensive survey on security in cloud computing. Proc Comput Sci 110:465\u2013472","journal-title":"Proc Comput Sci"},{"key":"305_CR11","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s12243-017-0578-3","volume":"72","author":"H Abbas","year":"2017","unstructured":"Abbas H, Maennel O, Assar A (2017) Security and privacy issues in cloud computing. Ann Telecommun 72:233\u2013235","journal-title":"Ann Telecommun"},{"key":"305_CR12","unstructured":"Sim LJH, Ren SQ, Keoh SL, Aung KMM (2016) A cloud authentication protocol using one-time pad. In: Region 10 conference (TENCON), IEEE, pp 2513\u20132516"},{"key":"305_CR13","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1016\/j.future.2017.10.019","volume":"82","author":"S Hong","year":"2017","unstructured":"Hong S, Park S, Park LW, Jeon M, Chang H (2017) An analysis of security systems for electronic information for establishing secure internet of things environments: focusing on research trends in the security field in South Korea. Future Gener Comput Syst 82:769\u2013782","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"305_CR14","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/TII.2016.2627503","volume":"13","author":"L Caviglione","year":"2016","unstructured":"Caviglione L, Podolski M, Mazurczyk W, Ianigro M (2016) Covert channels in personal cloud storage services: the case of dropbox. IEEE Trans Ind Inf 13(4):1921\u20131931","journal-title":"IEEE Trans Ind Inf"},{"key":"305_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.cose.2018.01.019","volume":"75","author":"T Halabi","year":"2018","unstructured":"Halabi T, Bellaiche M (2018) A broker-based framework for standardization and management of cloud security-SLAs. Comput Secur 75:59\u201371","journal-title":"Comput Secur"},{"issue":"4","key":"305_CR16","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1002\/dac.2694","volume":"28","author":"Y-S Jeong","year":"2015","unstructured":"Jeong Y-S, Park JS, Park JH (2015) An efficient authentication system of smart device using multi factors in mobile cloud service architecture. Int J Commun Syst 28(4):659\u2013674","journal-title":"Int J Commun Syst"},{"issue":"2","key":"305_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/iet-sen.2015.0040","volume":"11","author":"W Pei","year":"2017","unstructured":"Pei W, Li J, Li H, Gao H, Wang P (2017) ASCAA: API-level security certification of android applications. IET Softw 11(2):55\u201363","journal-title":"IET Softw"},{"issue":"1","key":"305_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aci.2016.03.001","volume":"13","author":"SA Hussain","year":"2017","unstructured":"Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13(1):57\u201365","journal-title":"Appl Comput Inform"},{"key":"305_CR19","doi-asserted-by":"publisher","unstructured":"Kumar MR, Srinivasu N, Reddy LC (2018) Dynamic and secure authentication using IKC for distributed cloud environment. In: Satapathy S, Tavares J, Bhateja V, Mohanty J (eds) Information and decision sciences. Advances in Intelligent Systems and Computing, vol 701. Springer, Singapore, pp 107\u2013117. https:\/\/doi.org\/10.1007\/978-981-10-7563-6_12","DOI":"10.1007\/978-981-10-7563-6_12"},{"issue":"12","key":"305_CR20","doi-asserted-by":"publisher","first-page":"3959","DOI":"10.1007\/s00500-017-2607-6","volume":"22","author":"A Roy","year":"2018","unstructured":"Roy A, Dasgupta D (2018) A fuzzy decision support system for multifactor authentication. Soft Comput 22(12):3959\u20133981","journal-title":"Soft Comput"},{"issue":"2","key":"305_CR21","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11277-016-3273-1","volume":"90","author":"R Pitchai","year":"2016","unstructured":"Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947\u2013960","journal-title":"Wirel Pers Commun"},{"key":"305_CR22","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.comcom.2019.11.048","volume":"150","author":"DR Rani","year":"2020","unstructured":"Rani DR, Geethakumari G (2020) Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN. Comput Commun 150:799\u2013810","journal-title":"Comput Commun"},{"key":"305_CR23","first-page":"1","volume":"1","author":"J Shen","year":"2019","unstructured":"Shen J, Deng X, Zhenwu Xu (2019) Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP J Wirel Commun Netw 1:1\u201312","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"1","key":"305_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11761-018-0249","volume":"13","author":"B Maram","year":"2018","unstructured":"Maram B, Gnanasekar JM, Manogaran G, Balaanand M (2018) Intelligent security algorithm for UNICODE data privacy and security in IOT. SOCA 13(1):3\u201315. https:\/\/doi.org\/10.1007\/s11761-018-0249","journal-title":"SOCA"},{"key":"305_CR25","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.comcom.2019.12.041","volume":"151","author":"S Namasudra","year":"2020","unstructured":"Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539\u2013547","journal-title":"Comput Commun"},{"issue":"12","key":"305_CR26","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"X Li","year":"2018","unstructured":"Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428\u20136453","journal-title":"J Supercomput"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00305-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00305-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00305-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:29:11Z","timestamp":1686331751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00305-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,11]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["305"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00305-0","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,11]]},"assertion":[{"value":"25 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the research study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}