Advertisement

Cluster Computing

, Volume 22, Supplement 2, pp 3727–3735 | Cite as

Secure and efficient data forwarding in untrusted cloud environment

  • Balamanigandan RamachandranEmail author
  • Kamalraj Subramaniam
Article

Abstract

Nowadays, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. In recent days one of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Due to user’s data security, the encrypted data is stored in cloud server to protect from unauthorized users. Existing methods offer either data transformation efficiency or security. They fail to maintain end to end security during massive transformations. However, existing methods are not capable of solving the key complexity and avoiding key secrecy disclosure. The main objective of this study is to design and develop a secured efficient data forwarding algorithm for increasing the security level. It is developed specially for untrusted cloud environment. In order to provide a better solution, an efficient framework is proposed for forwarding and retrieving the content in the untrusted cloud environment. Proposed system implements dual privacy for reliable data transmission in an untrusted cloud environment. It develops efficient secret key exposure to minimize the key complexity during data transmission. SEDFA is used for one to many communications as a public key used for encryption and decryption. This scheme provides reliable data transmission between the data owner and end user in untrusted Cloud Environment. Proposed mechanisms minimized the data encryption time, decryption time and improved the communication cost. Based on experimental results, SEDFA reduces the communication cost 5%, encryption time (ET), 2 s, decryption time (DT) 0.5 s.

Keywords

Secure and efficient data forwarding Untrusted cloud environment Key complexity Reliable data transmission Encryption time Decryption time Communication cost 

References

  1. 1.
    Yang, K., Jia, X.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems. Springer, New York, pp. 59–83, (2014)Google Scholar
  2. 2.
    Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transact. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)Google Scholar
  3. 3.
    Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the Network and Service Management (CSM), 2012 8th International Conference and 2012 workshop on systems virtualization management (SVM). IEEE. pp. 37–45, (2012)Google Scholar
  4. 4.
    Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y. T.: Lt codes-based secure and reliable cloud storage service. In: Proceedings of the INFOCOM. IEEE. pp. 693–701, (2012)Google Scholar
  5. 5.
    Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transact. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)Google Scholar
  6. 6.
    Wang, B., Chow, S. S., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: Proceedings of the Distributed Computing Systems (ICDCS), 33rd International Conference. IEEE. pp. 124–133, (2013)Google Scholar
  7. 7.
    Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012)Google Scholar
  8. 8.
    Mehto, K., Moriwal, R.: A secured and searchable encryption algorithm for cloud storage. Int. J. Comput. Appl. 120(5), 17–21 (2015)Google Scholar
  9. 9.
    Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transact. Parallel Distrib. Syst. 24(1), 131–143 (2013)Google Scholar
  10. 10.
    Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A cloud design for user-controlled storage and processing of sensor data. In: Proceedings of the Cloud Computing Technology and Science (CloudCom), 4th International Conference. IEEE. pp. 232–240, (2012)Google Scholar
  11. 11.
    Selva Kumar, C., Rathanam, G. J., Sumalatha, M. R.: PDDS-Improving cloud data storage security using data partitioning technique. In: Proceedings of the Advance Computing Conference (IACC), 3rd International. IEEE. pp. 7–11, (2013)Google Scholar
  12. 12.
    Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificates encryption for secure data sharing in public clouds. IEEE Transact. Knowl. Data Eng. 26(9), 2107–2119 (2014)Google Scholar
  13. 13.
    Zhao, C., Tu, S., Chen, H., Huang, Y.: An efficient association rule mining algorithm based on user behavior for cloud security auditing. In: Proceedings of the Online Analysis and Computing Science (ICOACS), International Conference. IEEE. pp. 145–149, (2016)Google Scholar
  14. 14.
    Xiao, M., Wang, M., Liu, X., Sun, J.: Efficient distributed access control for big data in clouds. In: Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS), Conference. IEEE. pp. 202–207, (2015)Google Scholar
  15. 15.
    Zhang, Y., Chen, J., Du, R., Deng, L., Xiang, Y., Zhou, Q.: Feacs: a flexible and efficient access control scheme for cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 13th International Conference. IEEE. pp. 310–319, (2014)Google Scholar
  16. 16.
    Shaikh, A., Gadge, J.: Framework for a security of shared data in a cloud environment. In: Proceedings of the Computing Communication Control and Automation (ICCUBEA), International Conference. IEEE. pp. 1–6, (2016)Google Scholar
  17. 17.
    Marwan, M., Kartit, A., Ouahmane, H.: A secure framework for medical image storage based on multi-cloud. In: Proceedings of the Cloud Computing Technologies and Applications (CloudTech), 2nd International Conference. IEEE. pp. 88–94, (2016)Google Scholar
  18. 18.
    Brindha, S. J., Sujana, J. A. J., Revathi, T.: Agent-based bidirectional bidding mechanism for efficient scheduling of real-time tasks in cloud computing. In: Proceedings of the Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference. IEEE. pp. 130–135, (2016)Google Scholar
  19. 19.
    Ren, S. Q., Meng, T. H., Yibin, N., Aung, K. M. M.: Privacy-preserved multi-party data merging with secure equality evaluation. In: Proceedings of the Cloud Computing Research and Innovations (ICCCRI), International Conference. IEEE. pp. 34–41, (2016)Google Scholar
  20. 20.
    Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers. (2016)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Balamanigandan Ramachandran
    • 1
    Email author
  • Kamalraj Subramaniam
    • 2
  1. 1.Department of Computer Science and EngineeringKarpagam Academy of Higher EducationCoimbatoreIndia
  2. 2.Department of Electronics and Communication EngineeringKarpagam Academy of Higher EducationCoimbatoreIndia

Personalised recommendations