{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:28:56Z","timestamp":1772303336119,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2019R1A2C1085388"],"award-info":[{"award-number":["2019R1A2C1085388"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Dongguk University Research Fund","award":["S-2020-G0001-00050."],"award-info":[{"award-number":["S-2020-G0001-00050."]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>As a result of the limited resources available in IoT local devices, the large scale cloud consumer\u2019s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and data may be leaked. Because cloud-data and grid infrastructure are both growing exponentially, there is an urgent need to explore computational sources and cloud large-data protection. Numerous cloud service categories are assimilated into numerous fields, such as defense systems and pharmaceutical databases, to compute information space and allocation of resources. Attribute Based Encryption (ABE) is a sophisticated approach which can permit employees to specify a higher level of security for data stored in cloud storage facilities. Numerous obsolete ABE techniques are practical when applied to small data sets to generate cryptograms with restricted computational properties; their properties are used to generate the key, encrypt it, and decrypt it. To address the current concerns, a dynamic non-linear polynomial chaotic quantum hash technique on top of secure block chain model can be used for enhancing cloud data security while maintaining user privacy. In the proposed method, customer attributes are guaranteed by using a dynamic non- polynomial chaotic map function for the key initialization, encryption, and decryption. In the proposed model, both organized and unorganized massive clinical data are considered to be inputs for reliable corroboration and encoding. Compared to existing models, the real-time simulation results demonstrate that the stated standard is more precise than 90% in terms of bit change and more precise than 95% in terms of dynamic key generation, encipherment, and decipherment time.<\/jats:p>","DOI":"10.3390\/s21217300","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T22:17:23Z","timestamp":1635891443000},"page":"7300","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data"],"prefix":"10.3390","volume":"21","author":[{"given":"Kranthi Kumar","family":"Singamaneni","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, GITAM Institute of Technology, GITAM Deemed to be University, Visakhapatnam 530045, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4604-846X","authenticated-orcid":false,"given":"Kadiyala","family":"Ramana","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence & Data Science, Annamacharya Institute of Technology and Sciences, Rajampet 516115, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6343-5197","authenticated-orcid":false,"given":"Gaurav","family":"Dhiman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Government Bikram College of Commerce, Patiala 147001, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1118-9569","authenticated-orcid":false,"given":"Saurabh","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Industrial and System Engineering, Dongguk University, Seoul 04620, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1110-4011","authenticated-orcid":false,"given":"Byungun","family":"Yoon","sequence":"additional","affiliation":[{"name":"Department of Industrial and System Engineering, Dongguk University, Seoul 04620, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","article-title":"Dual-Server Public-Key Encipherment With Keyword Search for Secure Cloud Storage","volume":"11","author":"Chen","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Tseng, F.K., Chen, R.J., and Lin, B.S.P. (2013, January 16\u201318). iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encipherment with Keyword Search. Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia.","DOI":"10.1109\/TrustCom.2013.57"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Nakouri, M.H., and Kim, T.H. (2017, January 26\u201330). A new biometric-based security framework for cloud storage. Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986318"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sabri, H.M., Ghany, K.K.A., Hefny, H.A., and Elkhameesy, N. (2014, January 24\u201327). Biometrics template security on cloud computing. Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India.","DOI":"10.1109\/ICACCI.2014.6968607"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4587","DOI":"10.1109\/ACCESS.2017.2780323","article-title":"A Novel Secure Data Transmission Scheme Using Chaotic Compressed Sensing","volume":"6","author":"Gan","year":"2017","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Shacham, H., and Waters, B. (2008, January 7). Compact Proofs of Retrievability. Proceedings of the 14th International Conference Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT \u201908), Melbourne, Australia.","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., and Oprea, A. (2008). Proofs of Retrievability: Theory and Implementation. Report 2008\/175, Cryptology ePrint Archive, ACM Digital Library.","DOI":"10.1145\/1655008.1655015"},{"key":"ref_8","unstructured":"Naor, M., and Rothblum, G.N. (2005, January 25). The Complexity of Online Memory Checking. Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201905), Pittsburgh, PA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Chang, E.-C., and Xu, J. (2008, January 6\u20138). Remote Integrity Check with Dishonest Storage Server. Proceedings of the 13th European Symp. Research in Computer Security (ESORICS \u201908), M\u00e1laga, Spain.","DOI":"10.1007\/978-3-540-88313-5_15"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","article-title":"IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks","volume":"13","author":"Tan","year":"2009","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_11","unstructured":"Von Solms, S.H., and Tait, B.L. (2005, January 28\u201330). Solving the problem of replay in Biometrics- An electronic commerce Example. Proceedings of the 5th IFIP Conference on Challenges of expanding internet: E-commerce, E-business, and E-government (I3E 2005), Poznan, Poland."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., and Lou, W. (2009). Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. European Symposium on Research in Computer Security, 14th European Symposium on Research in Computer Security, Saint-Malo, France, 21\u201323 September 2009, Springer.","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D. (2007, January 31). Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security-CCS \u201907, New York, NY, USA.","DOI":"10.1145\/1315245.1315318"},{"key":"ref_14","unstructured":"Juels, A., and Kaliski, B.S. (2007, January 31). Proofs of Retrievability for Large FilesIn. Proceedings of the 14th ACM Conference Computer and Communications Security (CCS\u201907), New York, NY, USA."},{"key":"ref_15","unstructured":"Shah, M.A., Swaminathan, R., and Baker, M. (2008). Privacy-Preserving Audit and Extraction of Digital Contents. Report 2008\/186, Cryptology ePrint Archive, Hewlett-Packard Development Company, L.P.. HP Labs Technical Report No. HPL-2008-32."},{"key":"ref_16","unstructured":"Oprea, A., Reiter, M.K., and Yang, K. (, January February). Space-Efficient Block Storage Integrity. Proceedings of the 12th Ann. Network and Distributed System SecuritySymp. (NDSS \u201905), San Diego, CA, USA."},{"key":"ref_17","first-page":"372","article-title":"A Novel Integrity-Verification based Secured ABE model for cloud computing","volume":"5","author":"Singamaneni","year":"2018","journal-title":"Int. J. Res."},{"key":"ref_18","unstructured":"Subaja, C.M., Sarathy, P., and Priyanka, C. (2019, January 4\u20136). An Efficient Data Security in Medical Report using Block Chain Technology. Proceedings of the 2019 International Conference on Communication and Signal Processing (ICCSP), Chennai, India."},{"key":"ref_19","unstructured":"Schwarz, T., and Miller, E. (2006, January 4\u20137). Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS\u201906), Lisboa, Portugal."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TPDS.2018.2851246","article-title":"Profit Maximization for Cloud Brokers in Cloud Computing","volume":"30","author":"Mei","year":"2019","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"18009","DOI":"10.1109\/ACCESS.2018.2820182","article-title":"Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encipherment in Cloud Computing","volume":"6","author":"Yang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Song, X., and Wang, Y. (2017, January 13\u201316). Homomorphic cloud computing scheme based on hybrid homomorphic encipherment. Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China.","DOI":"10.1109\/CompComm.2017.8322975"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3166\/isi.23.5.213-222","article-title":"Secure key management in cloud environment using quantum cryptography","volume":"23","author":"Singamaneni","year":"2018","journal-title":"Ing\u00e9nierie Syst\u00e8mes d Inf."},{"key":"ref_24","first-page":"33","article-title":"IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing","volume":"33","author":"Singamaneni","year":"2019","journal-title":"Rev. d\u2019Intelligence Artif."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"283","DOI":"10.3166\/jesa.51.283-293","article-title":"Efficient quantum cryptography technique for key distribution","volume":"51","author":"Singamaneni","year":"2018","journal-title":"J. Eur. Syst\u00e8mes Autom."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"134576","DOI":"10.1109\/ACCESS.2021.3116111","article-title":"Low Energy Interleaved Chaotic Secure Image Coding Scheme for Visual Sensor Networks Using Pascal\u2019s Triangle Transform","volume":"9","author":"Suseela","year":"2021","journal-title":"IEEE Access"},{"key":"ref_27","first-page":"1","article-title":"Task Scheduling in cloud using ACO","volume":"13","author":"Natarajan","year":"2020","journal-title":"Recent Adv. Comput. Sci. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"138245","DOI":"10.1109\/ACCESS.2021.3115238","article-title":"Linear Elliptical Curve Digital Signature (LECDS) With Blockchain Approach for Enhanced Security on Cloud Server","volume":"9","author":"Sowmiya","year":"2021","journal-title":"IEEE Access"},{"key":"ref_29","first-page":"15","article-title":"Artificial Intelligence and Patentability: Review and Discussions","volume":"20","author":"Chatterjee","year":"2021","journal-title":"Int. J. Mod. Res."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_31","first-page":"905","article-title":"Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain","volume":"62","author":"Yan","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_32","first-page":"973","article-title":"GaiaWorld: A Novel Blockchain System Based on Competitive PoS Consensus Mechanism","volume":"60","author":"Song","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_33","first-page":"1","article-title":"A Comparative Study of Fuzzy Optimization through Fuzzy Number","volume":"20","author":"Kumar","year":"2021","journal-title":"Int. J. Mod. Res."},{"key":"ref_34","first-page":"87","article-title":"Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data","volume":"65","author":"Lydia","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.32604\/iasc.2020.012531","article-title":"Blockchain Queuing Model with Non-preemptive Limited-priority","volume":"26","author":"Li","year":"2020","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_36","first-page":"153","article-title":"A Key Recovery System Based on Password-protected Secret Sharing in a Permissioned Blockchain","volume":"65","author":"Ra","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_37","first-page":"155","article-title":"Trust provision in the internet of things using transversal blockchain networks","volume":"25","author":"Bordel","year":"2019","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.32604\/iasc.2020.012174","article-title":"Blockchain-Based Data Storage Mechanism for Industrial Internet of Things","volume":"26","author":"Wang","year":"2020","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_39","first-page":"2441","article-title":"Task-Attribute-Based Access Control Scheme for IoT via Blockchain","volume":"65","author":"Chen","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gomathi, S., Soni, M., Dhiman, G., Govindaraj, R., and Kumar, P. (2021). A Survey on Applications and Security Issues of Blockchain Technology in Business Sectors, Elsevier.","DOI":"10.1016\/j.matpr.2021.02.088"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"8024","DOI":"10.3934\/mbe.2021398","article-title":"A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree","volume":"18","author":"Seraphim","year":"2021","journal-title":"Math. Biosci. Eng."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Nair, R., Gupta, S., Soni, M., Shukla, P.K., and Dhiman, G. (2020). An Approach to Minimize the Energy Consumption during Blockchain Transaction, Elsevier.","DOI":"10.1016\/j.matpr.2020.10.361"},{"key":"ref_43","first-page":"14","article-title":"A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"8214619","DOI":"10.1155\/2018\/8214619","article-title":"Quantum Cryptography for the Future Internet and the Security Analysis","volume":"2018","author":"Zhou","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","article-title":"Quantum cryptography","volume":"74","author":"Nicolas","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Senkerik, R., Pluhacek, M., Zelinka, I., Davendra, D., and Janostik, J. (2015, January 9\u201311). Preliminary Study on the Randomization and Sequencing for the Chaos Embedded Heuristic. Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015, Villejuif, France.","DOI":"10.1007\/978-3-319-29504-6_55"},{"key":"ref_47","first-page":"22","article-title":"Analytical Review Analysis for Screening COVID-19 Disease","volume":"1","author":"Vaishnav","year":"2021","journal-title":"Int. J. Mod. Res."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"035004","DOI":"10.1088\/2058-9565\/aabc6b","article-title":"Quantum-secured blockchain","volume":"3","author":"Kiktenko","year":"2018","journal-title":"Quantum Sci. Technol."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Wang, Q., Ren, K., Lou, W., and Zhang, Y. (2009, January 19\u201325). Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. Proceedings of the IEEE INFOCOM, Rio de Janeiro, Brazil.","DOI":"10.1109\/INFCOM.2009.5062006"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7300\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:24:48Z","timestamp":1760167488000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":49,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["s21217300"],"URL":"https:\/\/doi.org\/10.3390\/s21217300","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,2]]}}}