Skip to main content

Data Security in Cloud Computing Using an Improved Attribute-Based Encryption

  • 264 Accesses

Part of the Algorithms for Intelligent Systems book series (AIS)

Abstract

Cloud processing is a virtual figuring approach in which we can get shared assets on request. It is a promising worldview for coordinating cell phones. Also, the reconciliation is cloud-based, various-leveled, multi-client information shared climate. The shared environment of distributed computing stimulates security problems such as client authenticity and information privacy. It is a fundamental requirement for the advancement of distributed computing. This paper presents a progressive access control approach for employing an enhanced quality-based encryption and an upgraded three-layer structure to provide a secure and safe environment for distributed computing operations. A large amount of data is obtained from a wide range of mobile phones, for example, personal digital assistants (PDAs), and working telephones, which may be monitored and limited by the framework in the distributed computing model. The strategy is primarily concerned with getting to, putting away, and handling information. It is designed to ensure that only authorized clients have access to the same information and to limit unauthorized client access.

Keywords

  • Distributed computing
  • Improved attribute-based encryption
  • Identical attribute-based encryption
  • Ciphertext
  • Encryption
  • Decryption
  • Cloud

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-981-16-6460-1_19
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   229.00
Price excludes VAT (USA)
  • ISBN: 978-981-16-6460-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   299.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    CrossRef  Google Scholar 

  2. Qin H, Wang H, Wei X, Xue L, Wu L (2019) Privacy-preserving wildcards pattern matching protocol for IoT applications. IEEE Access 7:3609436102

    Google Scholar 

  3. Li H, Lan C, Fu X, Wang C, Li F, Guo H (2020) A secure and lightweight fine-grained data sharing scheme for mobile cloud computing. Sensors 20:4720

    Google Scholar 

  4. Han Q, Liang S, Zhang H (2015) Mobile cloud sensing, big data, and 5g networks make an intelligent and smart world. IEEE Netw 29(2):40–45

    CrossRef  Google Scholar 

  5. Nimje AR, Gaikwad VT, Datir HN (2013) Attribute-based encryption techniques in cloud computing security. IJCTT 4(3)

    Google Scholar 

  6. Wang Q, Gao L, Wang H, Wei X (2019) Face detection for privacy protected images. IEEE Access 7:39183927

    Google Scholar 

  7. Xia H, Hu C, Xiao F, Cheng X, Pan Z (2019) An efficient social like semantic-aware service discovery mechanism for largescale Internet of Things. Comput Netw 152:210220

    Google Scholar 

  8. Song Y, Wang H, Wei X, Wu L (2019) Efficient attribute-based encryption with privacy preserving key generation and its application in industrial cloud. Hindawi Secur Commun Netw 2019, Article ID 3249726

    Google Scholar 

  9. Jung T, Li X-Y, Wan Z, Wan M (2015) Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. Springer, Berlin

    CrossRef  Google Scholar 

  10. Kumar S, Lakshmi R, Balamurugan B (2014) Enhanced attribute based encryption for cloud computing. Procedia Comput Sci (ScienceDirect, Elsevier) 46:689–696. ICICT

    Google Scholar 

  11. Mittal A (2017) Attribute based encryption for secure data access in cloud. Culminating Projects in Information Assurance 39

    Google Scholar 

  12. Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7

    Google Scholar 

  13. Muthunagai SU, Anitha R (2019) Secure access control method in cloud environment using improved attribute based encryption technique. IJEAT 8(5). ISSN: 2249-8958

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Megha Sonaje .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Mane, A.S., Sonaje, M., Tadge, P. (2022). Data Security in Cloud Computing Using an Improved Attribute-Based Encryption. In: Jacob, I.J., Kolandapalayam Shanmugam, S., Bestak, R. (eds) Data Intelligence and Cognitive Informatics. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-6460-1_19

Download citation