Skip to main content
Log in

RETRACTED ARTICLE: Protecting user profile based on attribute-based encryption using multilevel access security by restricting unauthorization in the cloud environment

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 19 May 2022

This article has been updated

Abstract

Data security in centralized storage needs advancement in privacy standards because of all of the cloud. The data security in the cloud has been well provided by security industries like cloud network security, data center security, distributed security and soon, also their exist numerous techniques to preserve the privacy of cloud users. The earlier methods enforce user privacy by restricting the malicious access from various users. Data authentication is provable access to keep privacy among other standards. However, the privacy of cloud users has been breached on several occasions. To improve cloud security and enforce efficient privacy preservation, a multi-level micro access restriction algorithm has been presented in this paper. The cloud data has been indexed in multiple levels, the data present in each level has been restricted using the profile and set if encryption standards. The user request has been evaluated for its trusted access according to the access grant present in profile data. Similarly, the cloud data has been encrypted with the user key and the key belongs to the data owner. The method estimates micro access trust weight (MATW), which has been used to restrict the user from malicious access and to preserve user privacy. The method improves the performance of cloud security and introduces higher privacy preservation accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Change history

References

  • Agrawal D et al (2013) Secure and privacy-preserving database services in the cloud. In: International conference on data engineering (ICDE)

  • Cao M (2019) A lightweight fine-grained search scheme over encrypted data in cloud-assisted wireless body area networks. In: Wireless communications and mobile computing, vol 2019, Article ID 9340808. Hindawi, p 12

  • Dhasarathan C (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144–150

    Google Scholar 

  • Dong X et al (2014) Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput Secur 42:151–164

    Article  Google Scholar 

  • Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Human Comput 11:1309–1324. https://doi.org/10.1007/s12652-019-01493-x

    Article  Google Scholar 

  • Kibiwott KP (2019) Privacy preservation for eHealth big data in cloud accessed using resource-constrained devices: survey. Int J Netw Secur 21(2):312–325

    Google Scholar 

  • Li D et al (2017) Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption. Springer International Publishing, Cham

    Book  Google Scholar 

  • Qin Z et al (2018) Privacy-preserving image processing in the cloud. In: IEEE cloud computing

  • Saxena R (2019) Data integrity verification: a novel approach for cloud computing. Springer

  • Sun Y (2014) Data security and privacy in cloud computing. Int J Distrib Sens Netw

  • Thangavel M et al (2013) An analysis of privacy preservation schemes in cloud computing. In: IEEE international conference on engineering and technology (ICETECH)

  • Wang Z, Liu W (2016) CP-ABE with outsourced decryption and directionally hidden policy. Secur Commun Netw 9(14):2387–2396

    Article  Google Scholar 

  • Wang S et al (2019) Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms”. PLoS ONE 14(2):e0212761

    Article  Google Scholar 

  • Xue J (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci China Inf Sci 62:32104

    Article  Google Scholar 

  • Yang K et al (2017) (2017) Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf Sci 387(C):116–131

    Article  Google Scholar 

  • Zuo C et al (2018) CCA-secure ABE with outsourced decryption for fog computing. Future Gener Comput Syst 78:730–738

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Vijayakumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03930-w

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vijayakumar, V., Umadevi, K. RETRACTED ARTICLE: Protecting user profile based on attribute-based encryption using multilevel access security by restricting unauthorization in the cloud environment. J Ambient Intell Human Comput 12, 7245–7252 (2021). https://doi.org/10.1007/s12652-020-02400-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02400-5

Keywords

Navigation