Skip to main content

A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage

Part of the Lecture Notes in Mechanical Engineering book series (LNME)

Abstract

In day-to-day life, cloud computing plays an important role in storing and retrieving the huge volumes of data. Data’s which are taken from social media (Whatsapp, Facebook, Twitter etc.), Organizaitons (MNC companies), Business data (Sensex, Forbes Global, Forbes cloud, TS Historical bus cycles etc.,) and other datas from our day to day life records are not enough memory to store in Big Data. While the storage size is increasing, the security problem also increases simultaneously. Therefore, there is a security issue in cloud computing. There are large numbers of studies conducted to improve security in cloud computing. However, most of the survey is not applicable for cloud providing security in mobile devices because of less power consuming and computing resources. The issue in the existing mobile application is no proper security of data on cloud storage. In this paper, we propose a lightweight data sharing scheme for mobile cloud computing. It accesses a control from the ciphertext-policy attribute-based encryption technology which is used in the basic environment of cloud and makes some changes in the structure of the access control tree that is suitable for mobile cloud computing. This technology in the mobile cloud will remove the major portions in the access control tree, and it transforms by using the external proxy servers. Additionally, it is used to reduce the cost of user revocation. The experimental results of our LDSS system can efficiently reduce the mobile device overhead.

Keywords

  • Cloud computing
  • Mobile computing
  • Data storage
  • Data security
  • Intrusion detection system
  • Encryption technique

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gentry C, Halevi S (2011) Implementing gentry’s fully-homomorphic encryption scheme. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 129–148

    Google Scholar 

  2. Kwon H, Kim D, Hahn C, Hur J (2017) Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multim Tools Appl 76(19):19507–19521

    CrossRef  Google Scholar 

  3. Zhang Y, Dong Z, Xiaofeng C, Jin L, Hui L (2016) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149

    Google Scholar 

  4. Skillen A, Mohammad M (2013) On implementing deniable storage encryption for mobile devices

    Google Scholar 

  5. Jiang, Y, Willy S, Yi M, Fuchun G (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729

    Google Scholar 

  6. Wang Q, Li P, Hu X, Jianfei S, Zhiguang Q (2017) Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6:760–771

    CrossRef  Google Scholar 

  7. Yang, K, Xiaohua J, Kui R (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, pp 523–528

    Google Scholar 

  8. Han J, Susilo W, Mu Y, Zhou J, Au MH (2014) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10(3):665–678

    MATH  Google Scholar 

  9. Zhou Z, Huang D, Wang Z (2013) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138

    CrossRef  MathSciNet  Google Scholar 

  10. Jayakumar L, Janakiraman S, Latchoumi TP, Shanthoshini (2017) Dynamic virtual server for optimized web service interaction. Int J Pure Appl Math 117(19):371–377

    Google Scholar 

  11. Latchoumi TP, Jayakumar L, Ezhilarasi TP (2017) Detecting generic objects by using an adaptation of spatial features. J Adv Res Dyn Control Syst 1401–1408

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. P. Latchoumi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ezhilarasi, T.P., Sudheer Kumar, N., Latchoumi, T.P., Balayesu, N. (2021). A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage. In: Arockiarajan, A., Duraiselvam, M., Raju, R. (eds) Advances in Industrial Automation and Smart Manufacturing. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-15-4739-3_92

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4739-3_92

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4738-6

  • Online ISBN: 978-981-15-4739-3

  • eBook Packages: EngineeringEngineering (R0)