Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

20.06.2020

An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA

verfasst von: Balasubramanian Prabhu Kavin, Sannasi Ganapathy, U. Kanimozhi, Arputharaj Kannan

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose an enhanced security framework for securing the cloud users data in the cloud environment. This new security framework consists of access control methodology, encryption/decryption technique and digital signature algorithms. Here, a new Elliptic Curve Cryptography based key generation algorithm is proposed for generating highly secured keys. Moreover, a new Identity based Elliptic curve Access Control mechanism (Id-EAC) is also proposed in this paper for restricting the cloud user’s data accessibility over the different kind of data. In addition, a new binary value based two phase encryption and decryption algorithm that referred the elliptic curve cryptographic based key values is introduced to secure the cloud user’s data in the cloud environment. Finally, a new modulo function based Lightweight Digital Signature Algorithm is also proposed to ensure the data integrity in this proposed security framework. This security framework is provided the high data security, accessibility and integrity for the user data. The experimental results show that the efficiency of the proposed algorithms in this security framework is proved as better than other existing algorithms in terms of security and performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1996). A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering, 8(1), 67–80. Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1996). A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering, 8(1), 67–80.
2.
Zurück zum Zitat Naor, M., & Wool, A. (1998). Access control and signatures via quorum secret sharing. IEEE Transactions on Parallel and Distributed Systems, 9(9), 909–922. Naor, M., & Wool, A. (1998). Access control and signatures via quorum secret sharing. IEEE Transactions on Parallel and Distributed Systems, 9(9), 909–922.
3.
Zurück zum Zitat Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE Transactions on Computers, 66(5), 891–904.MathSciNetMATH Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE Transactions on Computers, 66(5), 891–904.MathSciNetMATH
4.
Zurück zum Zitat Qijun, G., Liu, P., Lee, W.-C., & Chu, C.-H. (2009). KTR: An efficient key management scheme for secure data access control in wireless broadcast services. IEEE Transactions on Dependable and Secure Computing, 6(3), 188–201. Qijun, G., Liu, P., Lee, W.-C., & Chu, C.-H. (2009). KTR: An efficient key management scheme for secure data access control in wireless broadcast services. IEEE Transactions on Dependable and Secure Computing, 6(3), 188–201.
5.
Zurück zum Zitat Wan, Zhiguo, Liu, J., Zhang, R., & Deng, R. H. (2013). A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Transactions on Multimedia, 15(6), 1353–1364. Wan, Zhiguo, Liu, J., Zhang, R., & Deng, R. H. (2013). A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Transactions on Multimedia, 15(6), 1353–1364.
6.
Zurück zum Zitat Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484–497. Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484–497.
7.
Zurück zum Zitat Ye, X. (2016). Privacy preserving and delegated access control for cloud applications. Tsinghua Science and Technology, 21(1), 40–54. Ye, X. (2016). Privacy preserving and delegated access control for cloud applications. Tsinghua Science and Technology, 21(1), 40–54.
8.
Zurück zum Zitat Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., et al. (2016). Hierarchical and shared access control. IEEE Transactions on Information Forensics and Security, 11(4), 850–865. Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., et al. (2016). Hierarchical and shared access control. IEEE Transactions on Information Forensics and Security, 11(4), 850–865.
9.
Zurück zum Zitat Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT based applications. Computer Networks, 151, 181–190. Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT based applications. Computer Networks, 151, 181–190.
10.
Zurück zum Zitat Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018). Optimal and energy efficient scheduling techniques for resource management in public cloud networks. National Academy Science Letters, 41(4), 219–223.MathSciNet Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018). Optimal and energy efficient scheduling techniques for resource management in public cloud networks. National Academy Science Letters, 41(4), 219–223.MathSciNet
11.
Zurück zum Zitat Kavin, B. P., Ganapathy, S., & Karman, A. (2018). An intelligent task scheduling approach for cloud using IPSO and A* search algorithm. In 2018 eleventh international conference on contemporary computing (IC3) (pp. 1–5). Kavin, B. P., Ganapathy, S., & Karman, A. (2018). An intelligent task scheduling approach for cloud using IPSO and A* search algorithm. In 2018 eleventh international conference on contemporary computing (IC3) (pp. 1–5).
12.
Zurück zum Zitat Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., & Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using map reduce techniques on cloud. International Journal of Communication Networks and Distributed Systems, 20(4), 519–531. Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., & Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using map reduce techniques on cloud. International Journal of Communication Networks and Distributed Systems, 20(4), 519–531.
13.
Zurück zum Zitat Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems, 9(Sp-14), 2764–2777. Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems, 9(Sp-14), 2764–2777.
14.
Zurück zum Zitat Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2015). Secured temporal log management techniques for cloud. Procedia Computer Science, 46, 589–595. Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2015). Secured temporal log management techniques for cloud. Procedia Computer Science, 46, 589–595.
15.
Zurück zum Zitat Muthurajkumar, S., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2015). Agent based intelligent approach for the malware detection for infected cloud data storage files. In 2015 seventh international conference on advanced computing (ICoAC) (pp. 1–5). Muthurajkumar, S., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2015). Agent based intelligent approach for the malware detection for infected cloud data storage files. In 2015 seventh international conference on advanced computing (ICoAC) (pp. 1–5).
16.
Zurück zum Zitat Li, B., Huang, D., Wang, Z., & Zhu, Y. (2018). Attribute-based access control for ICN naming scheme. IEEE Transactions on Dependable and Secure Computing, 15(2), 194–206. Li, B., Huang, D., Wang, Z., & Zhu, Y. (2018). Attribute-based access control for ICN naming scheme. IEEE Transactions on Dependable and Secure Computing, 15(2), 194–206.
17.
Zurück zum Zitat Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 16(13), 5389–5396. Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 16(13), 5389–5396.
18.
Zurück zum Zitat Khan, F., Li, H., & Zhang, L. (2016). Owner specified excessive access control for attribute based encryption. IEEE Access, 6, 8967–8976. Khan, F., Li, H., & Zhang, L. (2016). Owner specified excessive access control for attribute based encryption. IEEE Access, 6, 8967–8976.
19.
Zurück zum Zitat Niu, X. (2017). Fine-grained access control scheme based on cloud storage. In 2017 international conference on computer network, electronic and automation (pp. 512–515). Niu, X. (2017). Fine-grained access control scheme based on cloud storage. In 2017 international conference on computer network, electronic and automation (pp. 512–515).
20.
Zurück zum Zitat Seol, K., Kim, Y.-G., Lee, E., Seo, Y.-D., & Baik, D.-K. (2018). Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access, 6, 9114–9128. Seol, K., Kim, Y.-G., Lee, E., Seo, Y.-D., & Baik, D.-K. (2018). Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access, 6, 9114–9128.
21.
Zurück zum Zitat Ding, S., Li, C., & Li, H. (2018). A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 6, 27336–27345. Ding, S., Li, C., & Li, H. (2018). A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 6, 27336–27345.
22.
Zurück zum Zitat Chen, Y.-H., & Huang, P.-C. (2018). Collaborative access control of cloud storage systems. IEEE International Conference on Applied System Innovation, 2018, 1063–1064. Chen, Y.-H., & Huang, P.-C. (2018). Collaborative access control of cloud storage systems. IEEE International Conference on Applied System Innovation, 2018, 1063–1064.
23.
Zurück zum Zitat Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450. Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.
24.
Zurück zum Zitat Sakthidasan, K., Vasudevan, N., Prakash, V. R., & Kumara Guru Diderot, P. (2019). Access control based efficient hybrid security mechanisms for cloud storage. In International conference on communication and signal processing (pp. 0564–0567). Sakthidasan, K., Vasudevan, N., Prakash, V. R., & Kumara Guru Diderot, P. (2019). Access control based efficient hybrid security mechanisms for cloud storage. In International conference on communication and signal processing (pp. 0564–0567).
25.
Zurück zum Zitat Sukmana, M. I. H., Torkura, K. A., Graupner, H., Cheng, F., & Meinel, C. (2019). Unified cloud access control model for cloud storage broker. In International conference on information networking (ICOIN 2019) (pp. 60–65). Sukmana, M. I. H., Torkura, K. A., Graupner, H., Cheng, F., & Meinel, C. (2019). Unified cloud access control model for cloud storage broker. In International conference on information networking (ICOIN 2019) (pp. 60–65).
26.
Zurück zum Zitat Bin, S., & Haopu, Y. (2019). Research of fine grit access control based on time in cloud computing. In 3rd information technology, networking, electronic and automation control conference (ITNEC 2019) (pp. 1897–1902). Bin, S., & Haopu, Y. (2019). Research of fine grit access control based on time in cloud computing. In 3rd information technology, networking, electronic and automation control conference (ITNEC 2019) (pp. 1897–1902).
27.
Zurück zum Zitat Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access, 7, 86384–86393. Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access, 7, 86384–86393.
28.
Zurück zum Zitat Teng, W., Yang, G., Xiang, Y., Zhang, T., & Wang, D. (2017). Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Transactions on Cloud Computing, 5(4), 617–627. Teng, W., Yang, G., Xiang, Y., Zhang, T., & Wang, D. (2017). Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Transactions on Cloud Computing, 5(4), 617–627.
29.
Zurück zum Zitat Lin, S., Zhang, R., Ma, H., & Wang, M. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10(10), 2119–2130. Lin, S., Zhang, R., Ma, H., & Wang, M. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10(10), 2119–2130.
30.
Zurück zum Zitat Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers, 65(6), 1992–2004.MathSciNetMATH Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers, 65(6), 1992–2004.MathSciNetMATH
31.
Zurück zum Zitat Chatterjee, A., & Sengupta, I. (2018). Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Transactions on Cloud Computing, 6(1), 287–300. Chatterjee, A., & Sengupta, I. (2018). Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Transactions on Cloud Computing, 6(1), 287–300.
32.
Zurück zum Zitat Li, J., Lin, X., Zhang, Y., & Han, J. (2017). KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 10(5), 715–725. Li, J., Lin, X., Zhang, Y., & Han, J. (2017). KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 10(5), 715–725.
33.
Zurück zum Zitat Wei, J., Liu, W., & Xuexian, H. (2018). Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing, 6(4), 1136–1148. Wei, J., Liu, W., & Xuexian, H. (2018). Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing, 6(4), 1136–1148.
34.
Zurück zum Zitat Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510–1523. Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510–1523.
35.
Zurück zum Zitat Li, Z., Li, W., Jin, Z., Zhang, H., & Wen, Q. (2019). An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access, 7, 29023–29037. Li, Z., Li, W., Jin, Z., Zhang, H., & Wen, Q. (2019). An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access, 7, 29023–29037.
36.
Zurück zum Zitat Fu, J., & Wang, N. (2019). A practical attribute-based document collection hierarchical encryption scheme in cloud computing. IEEE Access, 7, 36218–36232. Fu, J., & Wang, N. (2019). A practical attribute-based document collection hierarchical encryption scheme in cloud computing. IEEE Access, 7, 36218–36232.
37.
Zurück zum Zitat Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80–89. Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80–89.
38.
Zurück zum Zitat Yan, Y., Lei, W., Gao, G., Wang, H., & Wenyu, X. (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. Journal of Information Security and Applications, 39, 10–18. Yan, Y., Lei, W., Gao, G., Wang, H., & Wenyu, X. (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. Journal of Information Security and Applications, 39, 10–18.
39.
Zurück zum Zitat Daniel, R. M., Rajsingh, E. B., & Silas, S. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University—Computer and Information Sciences. (in press). Daniel, R. M., Rajsingh, E. B., & Silas, S. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University—Computer and Information Sciences. (in press).
40.
Zurück zum Zitat Ferretti, L., Marchetti, M., Andreolini, M., & Colajanni, M. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases. Information Sciences, 422, 497–515.MathSciNetMATH Ferretti, L., Marchetti, M., Andreolini, M., & Colajanni, M. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases. Information Sciences, 422, 497–515.MathSciNetMATH
41.
Zurück zum Zitat Hyunok, O., Kim, J., & Shin, J. S. (2018). Forward-secure ID based digital signature scheme with forward-secure private key generator. Information Sciences, 454–455, 96–109.MathSciNetMATH Hyunok, O., Kim, J., & Shin, J. S. (2018). Forward-secure ID based digital signature scheme with forward-secure private key generator. Information Sciences, 454–455, 96–109.MathSciNetMATH
42.
Zurück zum Zitat Zhang, X., Zhao, J., Mua, L., Tang, Y., & Xu, C. (2019). Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive and Mobile Computing, 56, 18–28. Zhang, X., Zhao, J., Mua, L., Tang, Y., & Xu, C. (2019). Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive and Mobile Computing, 56, 18–28.
43.
Zurück zum Zitat Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems, 96, 376–385. Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems, 96, 376–385.
44.
Zurück zum Zitat Stallings, W. (2006). Cryptography and network security principles and practices (4th ed.). London: Pearson Education. Stallings, W. (2006). Cryptography and network security principles and practices (4th ed.). London: Pearson Education.
Metadaten
Titel
An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA
verfasst von
Balasubramanian Prabhu Kavin
Sannasi Ganapathy
U. Kanimozhi
Arputharaj Kannan
Publikationsdatum
20.06.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07613-7

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt