Dynamic and Secure Authentication Using IKC for Distributed Cloud Environment

  • M. Ranjeeth Kumar
  • N. Srinivasu
  • Lokanatha C. Reddy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 701)


Distributed computing is one of the most significant recent paradigms facing IT organizations. Since this new handling technology requires clients to believe in their information being useful to providers, there have been problems regarding the enhancement of security and details were explored. A few strategies using quality based security have been prescribed for the administration of access of abbreviated subtle elements in cloud computing. However, be that as it may, the greater part of them are resolute in actualizing complex the rules of accessibility administration. To provide effective secure authentication for multi-user data sharing in the cloud computing environment, Transmitted Team Key Management (TTKM) has traditionally been used for the sharing of distributed data between multiple users in cloud computing settings. This allows the users to share their data securely using Shamir secret key sharing. One major limitation of TTKM is in the provision of inner side security in data sharing for multiple files with single security considerations in the distributed cloud environment. To access this limitation properly in the distributed environment, in this paper we propose the Integrated Key Cryptosystem (IKC) for multiple file sharing with a single aggregate key for single user data sharing. It is the combination of different security systems in attributes-based encryption. Our experimental results shows effective data utilization in the real time distributed cloud environment with different file sharing in a cloud computing environment.


Distributed computing Transmitted team key management Integrated key cryptosystem Aggregate key Cloud environment 


  1. 1.
    Nabeel, M., Bertino Fellow, E.: Privacy keeping Delegated entry control in Public Cloud. Court cases in A preliminary variation of this paper appears within the lawsuits of the IEEE international convention on information Engineering (IRI’12) [1] as an invited paperGoogle Scholar
  2. 2.
    Nabeel, M., Bertino, E.: Privateers keeping delegated access manage in the storage as a provider mannequin. In: EEE International Conference on Knowledge Reuse and Integration (IRI) (2012)Google Scholar
  3. 3.
  4. 4.
    Do, J.-M., Song, Y.-J., Park, N.: Attribute based proxy re-encryption for data confidentiality in cloud computing environments. In: Proceedings of the 1st International Conference on Computers, Networks, Systems and Industrial Engineering. Los Alamitos, CA, USA. IEEE Computer Society, pp. 248–251 (2011)Google Scholar
  5. 5.
    Shang, N., Nabeel, M., Percent, F., Bertino, E.: A privateers-preserving approach to policy-founded content material dissemination. In: ICDE’10: Lawsuits of the 2010 IEEE Twenty Sixth Worldwide Conference on data Engineering (2010)Google Scholar
  6. 6.
    Nabeel, M., Bertino, E., Kantarcioglu, M., Thuraisingham, B.M.: Toward privateers maintaining access manage within the cloud. In: Proceedings of the Seventh Worldwide Conference on Collaborative Computing: Networking, Applications and Work Sharing, ser. Collaborate Com’11, pp. 172–180 (2011)Google Scholar
  7. 7.
    Nabeel, M., Noshing, Bertino, E.: Privacy preserving policy based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. (2012)Google Scholar
  8. 8.
    Nabeel, M., Bertino, E.: Towards attribute based group key management. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA (2011)Google Scholar
  9. 9.
    Chu, C.-K., Chow, S.S.M., Tzeng, W.-G., Zhou, J., Deng, R.H.: Key-aggregate cryptosystem for scalable data sharing in cloud storage. In: Proceedings in This Work was Supported by the Singapore A*STAR project SecDC- 11217–2014Google Scholar
  10. 10.
    Chow, S.S.M., He, Y.J., Hui, L.C.K., Yiu, S.-M.: SPICE—Simple privacy-preserving identity-management for cloud environment. In: Applied Cryptography and Network Security—ACNS 2012, ser. LNCS, vol. 7341. Springer, pp. 526–543 (2012)CrossRefGoogle Scholar
  11. 11.
    Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: International Conference on Distributed Computing Systems—ICDCS 2013. IEEE (2013)Google Scholar
  13. 13.
    Chow, S.S.M., Chu, C.-K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. In: Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, ser. LNCS, vol. 6805. Springer, pp. 442–464 (2012)CrossRefGoogle Scholar
  14. 14.
    Nabeel, M., Bertino, E.: Attribute based group key management. IEEE Trans. Dependable Secure Comput. (2012)Google Scholar
  15. 15.
  16. 16.
    Hardesty, L.: Secure Computers aren’t so Secure. MIT Press (2009).

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • M. Ranjeeth Kumar
    • 1
  • N. Srinivasu
    • 1
  • Lokanatha C. Reddy
    • 2
  1. 1.Department of CSEKL UniversityGunturIndia
  2. 2.Department of CSDravidian UniversityKuppamIndia

Personalised recommendations