Skip to main content
Erschienen in: Cluster Computing 2/2019

23.02.2018

Centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework in cloud computing environment

verfasst von: A. Amali Angel Punitha, G. Indumathi

Erschienen in: Cluster Computing | Sonderheft 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In cloud storage, without any complexity, the nearby information stockpiling and support, the clients can indirectly keep up their information and appreciate the on-request superb applications and administrations from a shared pool of configurable computing resources. Nevertheless, the data integrity protection in cloud computing becomes a tedious task, because the client doesn’t have physical possession of the outsourced data, especially for the users with the restricted computing resources. The essential component of the cloud services is that, the clients’ information will be prepared remotely in obscure machines, where the clients have no rights on it. In order to rectify this issue, a novel highly centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework is suggested to maintain the concrete usage of the users’ data in the cloud. It will encircle the logging mechanism together with users’ data and policies. Before initiating the imploding processing the cloud server, first it required to convert the general information & sensitive information into an extensible markup language file format and get saved inside file. After that, Java ARchive (JAR) label setting has to be done which will be completed at the side of the data owner, then the label attributes will work according to the following functionality such as signature key value, and unique identifier. Use the JAR programmable has the capacity for both to produce a dynamic and traveling object, and to guarantee that any entrance to clients’ information will trigger verification and robotized logging facilities for local in the JARs. CCIA-BKGA structure is platform-independent and profoundly decentralized, it doesn’t request any obsessive validation or capacity framework set up and furthermore it gives the broad exploratory examinations which clarify the proficiency and adequacy of the proposed CCIA-BKGA system and existing methodologies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy preserving approaches in e-health clouds. IEEE J. Biomed. Health Inf. 18(1), 1431–1441 (2014) Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy preserving approaches in e-health clouds. IEEE J. Biomed. Health Inf. 18(1), 1431–1441 (2014)
3.
Zurück zum Zitat Khan, A.N., Kiah, M.L.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. Future Gen. Comput. Syst. 29(5), 1278–1299 (2013) Khan, A.N., Kiah, M.L.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. Future Gen. Comput. Syst. 29(5), 1278–1299 (2013)
5.
Zurück zum Zitat Riley, D.A.: Using google wave and docs for group collaboration. Library Hi Tech News (2010) Riley, D.A.: Using google wave and docs for group collaboration. Library Hi Tech News (2010)
6.
Zurück zum Zitat Bender, D.: Privacy and security issues in cloud computing. Comput. Internet Lawyer 1–15 (2012) Bender, D.: Privacy and security issues in cloud computing. Comput. Internet Lawyer 1–15 (2012)
7.
Zurück zum Zitat Judith, H., Robin, B., Marcia, K., Fern, H.: Cloud computing for dummies. For Dummies (2009) Judith, H., Robin, B., Marcia, K., Fern, H.: Cloud computing for dummies. For Dummies (2009)
8.
Zurück zum Zitat SeongHan, S., Kobara, K., Imai, H.: A secure public cloud storage system. Int. Conf. Internet Technol. Secur. Trans. (ICITST) 2011, 103–109 (2011) SeongHan, S., Kobara, K., Imai, H.: A secure public cloud storage system. Int. Conf. Internet Technol. Secur. Trans. (ICITST) 2011, 103–109 (2011)
9.
Zurück zum Zitat Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. Sixth Int. Conf. Semant. Knowl. Grid (SKG) 2010, 105–112 (2010) Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. Sixth Int. Conf. Semant. Knowl. Grid (SKG) 2010, 105–112 (2010)
10.
Zurück zum Zitat Rocha, F., Abreu, S., Correia, M.: The final Frontier: confidentiality and privacy in the cloud. 44–50 (2011) Rocha, F., Abreu, S., Correia, M.: The final Frontier: confidentiality and privacy in the cloud. 44–50 (2011)
11.
Zurück zum Zitat Huang, R., Gui, X., Yu, S., Zhuang, W.: Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. Int. Conf. Netw. Comput. Inf. Secur. 2011, 93–97 (2011) Huang, R., Gui, X., Yu, S., Zhuang, W.: Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. Int. Conf. Netw. Comput. Inf. Secur. 2011, 93–97 (2011)
12.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014) Wei, L., Zhu, H., Cao, Z., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
14.
Zurück zum Zitat Khan, A.N., Kiah, M.M., Madani, S.A., Ali, M., Shamshir-band, S.: Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2), 624–651 (2014) Khan, A.N., Kiah, M.M., Madani, S.A., Ali, M., Shamshir-band, S.: Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2), 624–651 (2014)
15.
Zurück zum Zitat Reed, A., Rezek, C., Simmonds, P.: Security guidelines for critical areas of focus in cloud computing v3.0. Cloud Secur Alliance. 14–44 (2011) Reed, A., Rezek, C., Simmonds, P.: Security guidelines for critical areas of focus in cloud computing v3.0. Cloud Secur Alliance. 14–44 (2011)
16.
Zurück zum Zitat Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395–404 (2017) Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395–404 (2017)
17.
Zurück zum Zitat Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurr. Comput 26(5), 1052–1066 (2014) Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurr. Comput 26(5), 1052–1066 (2014)
18.
Zurück zum Zitat Fu, J.Y., Huang, Q.L., Yang, Y.X.: Secure personal data sharing in cloud computing using attribute-based broadcast encryption. J China Univ Posts Telecommun 21(6), 45–77 (2014) Fu, J.Y., Huang, Q.L., Yang, Y.X.: Secure personal data sharing in cloud computing using attribute-based broadcast encryption. J China Univ Posts Telecommun 21(6), 45–77 (2014)
19.
Zurück zum Zitat Seo, S., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2013) Seo, S., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2013)
20.
Zurück zum Zitat Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88 (2012) Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88 (2012)
21.
Zurück zum Zitat Chen, Y.R., Tzeng, W.G.: Efficient and provably-secure group key management scheme using key derivation. In: IEEE 11th International Conference on trust, Security and Privacy in Computing and Communications (TrustCom), pp. 295–302 (2012) Chen, Y.R., Tzeng, W.G.: Efficient and provably-secure group key management scheme using key derivation. In: IEEE 11th International Conference on trust, Security and Privacy in Computing and Communications (TrustCom), pp. 295–302 (2012)
22.
Zurück zum Zitat Brent, C., Bavier, A.C.: Decentralized trust management and accountability in federated systems. In: HICSS (2004) Brent, C., Bavier, A.C.: Decentralized trust management and accountability in federated systems. In: HICSS (2004)
23.
Zurück zum Zitat Lee, W., Squicciarini, A., Bertino, E. (2009) The design and evaluation of accountable grid computing system. In: 29th IEEE International Conference on Distributed Computing Systems, 2009 (ICDCS’09), pp. 145–154 Lee, W., Squicciarini, A., Bertino, E. (2009) The design and evaluation of accountable grid computing system. In: 29th IEEE International Conference on Distributed Computing Systems, 2009 (ICDCS’09), pp. 145–154
24.
Zurück zum Zitat Sundareswaran, S., Squicciarini, A., Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE Trans. Dependable Secure Comput. 9(4), 556–568 (2012) Sundareswaran, S., Squicciarini, A., Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE Trans. Dependable Secure Comput. 9(4), 556–568 (2012)
25.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007(SP’07), pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007(SP’07), pp. 321–334 (2007)
26.
Zurück zum Zitat Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptogr. 6571, 53–70 (2011) Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptogr. 6571, 53–70 (2011)
27.
Zurück zum Zitat Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), pp. 65–74. Springer, Berlin (2010) Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), pp. 65–74. Springer, Berlin (2010)
28.
Zurück zum Zitat Yang, X.S., Hossein Gandomi, A.: Bat algorithm: a novel approach for global engineering optimization. Eng. Comput. 29(5), 464–483 (2012) Yang, X.S., Hossein Gandomi, A.: Bat algorithm: a novel approach for global engineering optimization. Eng. Comput. 29(5), 464–483 (2012)
29.
Zurück zum Zitat Goyal, T., Singh, A., Agrawal, A.: Cloudsim: simulator for cloud computing infrastructure and modeling. Procedia Eng. 38, 3566–3572 (2012) Goyal, T., Singh, A., Agrawal, A.: Cloudsim: simulator for cloud computing infrastructure and modeling. Procedia Eng. 38, 3566–3572 (2012)
Metadaten
Titel
Centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework in cloud computing environment
verfasst von
A. Amali Angel Punitha
G. Indumathi
Publikationsdatum
23.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 2/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2009-2

Weitere Artikel der Sonderheft 2/2019

Cluster Computing 2/2019 Zur Ausgabe