Advertisement

Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile

  • S. KumaresanEmail author
  • Vijayaragavan Shanmugam
Article
  • 11 Downloads

Abstract

Cloud computing becomes more sophisticated to provide different services at different levels of user access. Even though various services are accessed at a different level, the security of data being accessed is a highly challenging one. However, there is a number of encryption approaches discussed toward the problem of cloud security; they suffer to achieve higher security as required. The previous ABFD (attribute-based flexible delegation) algorithm uses a set of policies in encrypting the data with specific keys mentioned in the policy. However, the leakage of encryption policy would introduce poor security which can be overcome by adopting multitype encryption standards in different time windows. According to this, an efficient time-variant attribute-based multitype encryption algorithm (TAM) is presented in this paper. The TAM algorithm maintains a taxonomy of attributes and related keys to be used for encryption and decryption. The corresponding keys have been used to generate the ciphertext. The content of taxonomy has been dynamically changing in each time window which makes the difference in integrity management and security performance than previous algorithms. The TAM approach introduces a higher security performance up to 89.6%. The method also reduces the time complexity up to 21 s and increases the throughput performance up to 96%.

Keywords

Cloud security Data security Encryption TAM Encryption standards User profile Taxonomy 

Notes

References

  1. 1.
    Paladi N, Gehrmann C, Michalas A (2017) Providing user security guarantees in public infrastructure clouds. In: IEEE Transaction on Cloud Computing, vol 5(3)CrossRefGoogle Scholar
  2. 2.
    Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the Conference on Hot Topics Cloud ComputerGoogle Scholar
  3. 3.
    Schiffman J, Moyer T, Vijayakumar H, Jaeger T, McDaniel P 2010 Seeding clouds with trust anchors. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp 43–46Google Scholar
  4. 4.
    Paladi N, Michalas A, Gehrmann C (2014) Domain-based storage protection with secure access control for the cloud. In: Proceedings of the International Workshop on Cloud Computing Security, pp 35–42Google Scholar
  5. 5.
    Liao J, Trahay F, Xiao G (2017) Performing initiative data prefetching in distributed file systems for cloud computing. IEEE Trans Cloud Comput 5(3):550–562CrossRefGoogle Scholar
  6. 6.
    Sehgal P, Tarasov V, Zadok E (2010) Evaluating performance and energy in file system server workloads. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, pp 253–266Google Scholar
  7. 7.
    Tarasov V, Bhanage S, Zadok E (2011) Benchmarking file system benchmarking: It* is* rocket science. In: Proceedings of the 13th Workshop Hot Topics Operating Systems, pp 1–5Google Scholar
  8. 8.
    Liao J, Ishikawa Y (2012) Partial replication of metadata to achieve high metadata availability in parallel file systems. Proceedings of the 41st International Conference on Parallel Processing, pp 168–177Google Scholar
  9. 9.
    Noble RB, Haile Y (2010) Distributing private data in challenging network environments. In: Proceedings of the 19th International Conference on World Wide Web, pp 801–810Google Scholar
  10. 10.
    Jiang S, Ding X, Xu Y, Davis K (2013) A prefetching scheme exploiting both data layout and access history on disk. ACM Trans Storage 9(3):23CrossRefGoogle Scholar
  11. 11.
    He J, Bent J, Torres A (2013) I/O acceleration with pattern detection. In: Proceedings of the 22nd International ACM Symposium on High-Performance Parallel and Distributed Computing, pp 26–35Google Scholar
  12. 12.
    Al Assaf M, Jiang X, Abid M, Qin X (2013) Eco-storage: a hybrid storage system with energy-efficient informed prefetching. J Signal Process Syst 72(3):165–180CrossRefGoogle Scholar
  13. 13.
    Song H, Yin Y, Sun X, Thakur R, Lang S (2011) Server-side I/O coordination for parallel file systems. In: Proceedings of the International Conference on High-Performance Computing, Networking, Storage, and Analysis, pp 1–11Google Scholar
  14. 14.
    Obaidat MS (2014) QoS-guaranteed bandwidth shifting and redistribution in a mobile cloud environment. IEEE Trans Cloud Comput 2(2):181–193CrossRefGoogle Scholar
  15. 15.
    Bertholon B, Varrette S, Bouvry P (2011) Certicloud: a novel TPM-based approach to ensure cloud IaaS security. In: Proceedings of the IEEE International Conference on Cloud Computing, pp 121–130Google Scholar
  16. 16.
    Wang W, Li Z, Owens R, Bhargava B (2009) Secure and efficient access to outsourced data. In: Proceedings of the ACM Cloud Computing Security Workshop, pp 55–66Google Scholar
  17. 17.
    Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. IEEE Comput 45(1):39–45CrossRefGoogle Scholar
  18. 18.
    Graf S, Lang P, Hohenadel SA, Waldvogel M (2012) Versatile key management for secure cloud storage. In: Proceedings of the IEEE 31st Symposium Reliable Distribution Systems, pp 469–474Google Scholar
  19. 19.
    Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: Financial Cryptography and Data Security, Springer, New York, NY, USA. pp 258–274CrossRefGoogle Scholar
  20. 20.
    Paladi N, Gehrmann C, Morenius F (2013) Domain-based storage protection (DBSP) in public infrastructure clouds. In: Proceedings of the Secure IT Systems, pp 279–296CrossRefGoogle Scholar
  21. 21.
    Michalas A, Komninos N, Prasad N, Oleshchuk V (2010) New client puzzle approach for DoS resistance in ad hoc networks. In: IEEE International Conference on Information Theory Information Security, Dec 2010 pp 568–573Google Scholar
  22. 22.
    Blanchet B (2001) An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings. 14th IEEE Computer Security Foundations WorkshopGoogle Scholar
  23. 23.
    Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval in multiple clouds. IEEE Trans Cloud Comput 5(3):499–509CrossRefGoogle Scholar
  24. 24.
    Ma X, Yang LT, Xiang Y, Zeng WK, Zou D, Jin H (2017) Fully reversible privacy region protection for cloud video surveillance. IEEE Trans Cloud Comput 5(3):510–522CrossRefGoogle Scholar
  25. 25.
    Ahuja R, Mohanty SK (2017) A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans Cloud Comput.  https://doi.org/10.1109/TCC.2017.2751471 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceBharathiar UniversityCoimbatoreIndia
  2. 2.Department of Computer ScienceMuthayammal Engineering CollegeRasipuramIndia

Personalised recommendations