Soft Computing

, Volume 22, Issue 3, pp 1013–1022 | Cite as

A secure transaction of cloud data using conditional source trust attributes encryption mechanism

  • Thomas BrindhaEmail author
  • Ramaswamy Swarnammal Shaji
Methodologies and Application


Cloud storage enables users to store their data and enjoy high-quality cloud applications based on transaction processing. Normally, the wholesaler has real servers which host products and services from different locations, provide the end-users to simply log on to the network and perform transaction processing. However, the dynamic data update after transaction processing in cloud does not provide an optimal security framework. Besides, the cloud data storage is not focusing on maximizing the security on performing the transactions over cloud servers. In order to overcome such limitations in cloud, a novel framework named conditional source trust attribute encryption with particle swarm-based transaction optimization (CSTAE-PSTO) is proposed. The conditional attributes are encrypted using the conditional source trust attribute encryption technique along with the bilinear mapping transformation function in CSTAE-PSTO framework to improve the security level through unique secured identity number. The PSTO technique on cloud applications optimizes the result with minimal transaction completion time. Experiment is conducted based on factors such as throughput level on transaction, security rate on data layer and transaction completion time. Experimental analysis shows that the CSTAE-PSTO framework is able to improve the security rate on data layer and reduce the transaction completion time when compared to the state-of-the-art works.


Conditional attributes Transaction Cloud storage Security rate Data layer 


Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Al-maamari A, Omara FA (2015) Task scheduling using PSO algorithm in cloud computing environments. Int J Grid Distrib Comput 8(5):245–256CrossRefGoogle Scholar
  2. Cheng L, Wang C (2013) Network performance isolation for latency-sensitive cloud applications. Future Gener Comput Syst 29(4):1073–1084CrossRefGoogle Scholar
  3. Di S, Wang C (2013a) Dynamic optimization of multiattribute resource allocation in self-organizing clouds. IEEE Trans Parallel Distrib Syst 24(3):464–478Google Scholar
  4. Di S, Wang C (2013b) Error-tolerant resource allocation and payment minimization for cloud system. IEEE Trans Parallel Distrib Syst 24(6):1097–1106Google Scholar
  5. Di S, Wang C, Chen L (2013) Ex-post efficient resource allocation for self-organizing cloud. J Comput Electr Eng 39(7):2342–2356CrossRefGoogle Scholar
  6. He H, Li R, Dong X, Zhang Z (2014) Secure, efficient and fine-grained data control mechanism for P2P storage cloud. IEEE Trans Cloud Comput 2(4):471–484CrossRefGoogle Scholar
  7. Inbarani WS, Shenbagamoorthy G, Paul CKC (2013) Proxy re-encryption schemes for data storage security in cloud—a survey. Int J Eng Res Technol 2(1):1–5CrossRefGoogle Scholar
  8. Karimi M (2014) Hybrid discrete particle swarm optimization for task scheduling in grid computing. Int J Grid Distrib Comput 7(4):93–104Google Scholar
  9. Khedkar SV, Gawande AD (2014) Data partitioning technique to improve cloud data storage security. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3347–3350Google Scholar
  10. Kumar GP, Reddy KS, Raviteja C, Arif SM (2014) PABKE: Provable attribute-based keyword explore over outsourced encrypted data. Int J Comput Eng Res Trends 1(5):271–276Google Scholar
  11. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRefGoogle Scholar
  12. Li K, Wang J, Zhang Y, Ma H (2014) Key policy attribute-based proxy re-encryption and RCCA secure scheme. J Internet Serv Inf Secur (JISIS) 4(2):70–82Google Scholar
  13. Lin J, Chen C, Chang JM (2013) QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans Cloud Comput 1(1):101–115CrossRefGoogle Scholar
  14. Naruse T, Mohri M, Shiraishi Y (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum Centric Comput Inf Sci 5(8):1–13Google Scholar
  15. Shu J, Shen Z, Xue W (2014) Shield: a stackable secure storage system for file sharing in public storage. J Parallel Distrib Comput 74:2872–2883CrossRefGoogle Scholar
  16. Sookhak M, Talebian H, Ahmed E, Gani A, Khan MK (2014) A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43:121–141CrossRefGoogle Scholar
  17. Zhou L, Aradharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960CrossRefGoogle Scholar
  18. Zhu Y, Hu H, Ahn G, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  1. 1.Department of Information TechnologyNoorul Islam UniversityThuckalayIndia

Personalised recommendations