Skip to main content

Integrating Secured Crypto System with Cloud for Enhancing Cloud-Based Encrypted Data Sharing Services

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 164))

  • 652 Accesses

Abstract

Cloud services are most growing technology for future business system and information technology applications, as recent advancement has proofed themselves the power and success of cloud computing network, which offers more advance services to its users on demand, such advancement for storage and computational activities motivate many users to take part into cloud computing services. The nature of cloud services model make real-time services to be processed more effectively for best streamed-based communication services. However, along with this benefits, in addition security issues are consider to be a long term concern for different types of cloud computing service models, the chances of data hijacking, loss of information putting such technology on high risk over cloud service model although many researchers and scientist has invented many algorithm and techniques to get secure and provide trustworthy cloud computing services based on demand to its users. In this paper, we proposed a data encryption technique called crypto system to overcome the weakness of existing attribute-based encryption (ABE) technique; ABE is not cooperative with cloud computing service models and other services of cloud; in this paper, we focus on the weakness of attribute-based encryption (ABE) techniques and propose a integrated crypto system for resolving data sharing and security concerns which brings efficiency, reliability, and security for cloud services model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M.Y. Shabir, A. Iqbal, Analysis of classical encryption techniques in cloud computing. Trans. Cloud Comput. 21(1), 11 (2016)

    Google Scholar 

  2. G. Batista, C.H.G. Ferreira, D.C.M. Segura, D.M.L. Filho, M.L.M. Peixoto, A QoS-driven approach for cloud computing address-ing attributes of performance and security. Future Gener. Comput. Syst. 68, 260–274 (2017)

    Google Scholar 

  3. X. Zhao, Q. Lin, J. Chen, X. Wang, J. Yu, Z. Ming, Optimizing security and quality of service in a real-time database system using multi-objective genetic algorithm. Expert Syst. Appl. 64, 11–23 (2016)

    Google Scholar 

  4. Z. Xiao, Y. Xiao, Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials 15, 843–859 (2013)

    Article  Google Scholar 

  5. D. Gonzales, J.M. Kaplan, E. Saltzman, Z. Winkelman, D. Woods, Cloud-trust—a security assessment model for infrastructure as a service (IaaS) clouds. IEEE Trans. Cloud Comput. 5(3), 523–536 (2017)

    Google Scholar 

  6. A. Nieto, J. Lopez, A context-based parametric relationship model (CPRM) to measure the security and QoS tradeoff in configurable environments, in Proceedings IEEE International Conference Communication (ICC), vol 21 (2014), pp. 755–760

    Google Scholar 

  7. R.K. Kalluri, C.V.G. Rao, Addressing the security, privacy and trust challenges of cloud computing. Int. J. Comput. Sci. Inf. Technol. 5(5), 6094–6097 (2014)

    Google Scholar 

  8. D. Stevenson, J. Pasek, Privacy concern, trust, and desire for content personalization, in Proceedings Research Conference Communication, Information Internet Policy, vol. 08, no. 2 (2015) pp. 1–30

    Google Scholar 

  9. G. Shynu, K.J. Singh, A comprehensive survey and analysis on access control schemes in cloud environment. Inf. Technol. 16(1), 19–38 (2016)

    MathSciNet  Google Scholar 

  10. J. Ni, K. Zhang, Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2018)

    Google Scholar 

  11. R. Zhang, R. Xue, L. Liu, Searchable encryption for health-care clouds: a survey. IEEE Trans. Serv. Comput. 11(6), 978–996 (2018)

    Google Scholar 

  12. S. Chenthara, K. Ahmed, H. Wang, F. Whittaker, Security and privacy-preserving challenges of e-Health solutions in cloud computing. IEEE Access 7, 74361–74382 (2019)

    Google Scholar 

  13. T. Salman, M. Zolanvari, Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutorials 21(1), 858–880 (2019)

    Google Scholar 

  14. The Statistics Portal. Number of smartphone users world-wide from 2014 to 2020. Online. Available, vol. 12, no. 3 (2014)

    Google Scholar 

  15. J. Chen, Q. Zhu, Security as a service for cloud-enabled inter-net of controlled things under advanced persistent threats: a contract design approach. IEEE Trans. Inf. Forensics Secur. 12(11), 2736–2750 (2017)

    Google Scholar 

  16. Cloud Security Alliance. Home page URL https://cloudsecurityalliance.org

  17. E. Bertion, F. Paci, R. Ferrini, Privacy-preserving digital identity management for cloud computing. IEEE Comput. Soc. Data Eng. Bull. 12(1), 1–4 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, R., Agrawal, C., Jain, N. (2021). Integrating Secured Crypto System with Cloud for Enhancing Cloud-Based Encrypted Data Sharing Services. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_70

Download citation

Publish with us

Policies and ethics