Skip to main content
Top
Published in: The Journal of Supercomputing 8/2020

23-12-2019

Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location

Authors: J. Raja, M. Ramakrishnan

Published in: The Journal of Supercomputing | Issue 8/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Managing and using industrial Big Data is a big challenge for every industrial enterprise manager. By using the cloud technology, enterprises can handover the task of heavy data management to reliable hands and focus on their main business. Though cloud technology has numerous advantages, there are several privacy and security issues involved. One way in which cloud providers respond to this issue is with their key management service, where encryption keys are used to protect sensitive data present in the cloud. This paper discusses crucial hierarchy-based key management technique called Privacy-Preserving Based on Characteristic Encryption for privacy preservation in the cloud environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hu J, Cheung RCC (2017) Compact constant weight coding engines for the code based cryptography. IEEE Trans Circuits Syst 64(9):1092–1096CrossRef Hu J, Cheung RCC (2017) Compact constant weight coding engines for the code based cryptography. IEEE Trans Circuits Syst 64(9):1092–1096CrossRef
2.
go back to reference Banerjee A (2017) Cloak a stream cipher based encryption protocol for mobile cloud computing. IEEE Trans Cloud Comput 4(4):17678–17691 Banerjee A (2017) Cloak a stream cipher based encryption protocol for mobile cloud computing. IEEE Trans Cloud Comput 4(4):17678–17691
3.
go back to reference Khan F, Li H (2016) Owner specified excessive access control for attribute-based encryption. IEEE Trans Cloud Comput 11(10):8967–8976 Khan F, Li H (2016) Owner specified excessive access control for attribute-based encryption. IEEE Trans Cloud Comput 11(10):8967–8976
4.
go back to reference Sharma R, Joshi B (2016) Hype: hybrid-identity based encryption approach for cloud security with outsourced revocation. IEEE Int Conf Signal Process Commun Power Embed Syst 3(1) Sharma R, Joshi B (2016) Hype: hybrid-identity based encryption approach for cloud security with outsourced revocation. IEEE Int Conf Signal Process Commun Power Embed Syst 3(1)
5.
go back to reference Mohanty M (2016) 2dCrypt: image scaling and cropping in encrypted domains. IEEE Trans Inf Forens Secur 2(5):2542–2555CrossRef Mohanty M (2016) 2dCrypt: image scaling and cropping in encrypted domains. IEEE Trans Inf Forens Secur 2(5):2542–2555CrossRef
6.
go back to reference Yang J (2005) Improving memory encryption performance in secure processors. IEEE Trans Cloud Comput 54(5):630–640CrossRef Yang J (2005) Improving memory encryption performance in secure processors. IEEE Trans Cloud Comput 54(5):630–640CrossRef
7.
go back to reference Jayapandian N (2016) Improved cloud security trust on client-side data encryption using has been and blowfish. In: IEEE on Online International Conference on Green Engineering and Technologies (IC-GET), vol 11, issue 14 Jayapandian N (2016) Improved cloud security trust on client-side data encryption using has been and blowfish. In: IEEE on Online International Conference on Green Engineering and Technologies (IC-GET), vol 11, issue 14
8.
go back to reference Jung T, Li X-Y (2015) Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forens Secur 10(1):190–199CrossRef Jung T, Li X-Y (2015) Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forens Secur 10(1):190–199CrossRef
9.
go back to reference Asesh A (2015) Encryption technique for a trusted cloud computing environment. IOSR J Comput Eng 17(1):53–60 Asesh A (2015) Encryption technique for a trusted cloud computing environment. IOSR J Comput Eng 17(1):53–60
10.
go back to reference TC Chiueh, Simha DN (2012) Encryption domain text retrieval. In: IEEE International Conference on Cloud Computing and Intelligence Systems, vol 3, issue 1 TC Chiueh, Simha DN (2012) Encryption domain text retrieval. In: IEEE International Conference on Cloud Computing and Intelligence Systems, vol 3, issue 1
11.
go back to reference Ragini PM (2014) An efficient model for privacy and security in mobile cloud computing. In: IEEE International Conference on Recent Trends in Information Technology, vol 2, issue 8 Ragini PM (2014) An efficient model for privacy and security in mobile cloud computing. In: IEEE International Conference on Recent Trends in Information Technology, vol 2, issue 8
12.
go back to reference Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen PS (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458CrossRef Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen PS (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458CrossRef
13.
go back to reference Ali J, Zafar F, Khan GM (2013) Future client’s requests estimation for dynamic resource allocation in the cloud data center using cgpann. In: IEEE 12th International Conference on Machine Learning and Applications, vol 2, issue 2 Ali J, Zafar F, Khan GM (2013) Future client’s requests estimation for dynamic resource allocation in the cloud data center using cgpann. In: IEEE 12th International Conference on Machine Learning and Applications, vol 2, issue 2
14.
go back to reference Zhu H, Mei Z, Xie M (2016) Identity-based key management for cloud computing. Secur Commun Netw 9(13):2143–2156 Zhu H, Mei Z, Xie M (2016) Identity-based key management for cloud computing. Secur Commun Netw 9(13):2143–2156
15.
go back to reference Han J, Susilo W, Mu Y, Yan J (2012) Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 23(11):2150–2162CrossRef Han J, Susilo W, Mu Y, Yan J (2012) Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 23(11):2150–2162CrossRef
16.
go back to reference Song Y, Wang H, Wei X, Wu L (2019) Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secur Commun Netw 8:1–9 Song Y, Wang H, Wei X, Wu L (2019) Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secur Commun Netw 8:1–9
17.
go back to reference Kathirvel A, Madan S (2014) Efficient privacy preserving key management for public cloud networks. KTH Royal Institute of Technology School of Information and Communication Technology (ICT), Department of Communication Systems, Stockholm, Sweden Kathirvel A, Madan S (2014) Efficient privacy preserving key management for public cloud networks. KTH Royal Institute of Technology School of Information and Communication Technology (ICT), Department of Communication Systems, Stockholm, Sweden
18.
go back to reference Singh N, Singh AK (2017) Data privacy protection mechanisms in cloud. Data Sci Eng 3(1):24–39CrossRef Singh N, Singh AK (2017) Data privacy protection mechanisms in cloud. Data Sci Eng 3(1):24–39CrossRef
19.
go back to reference Hemant P, Chawande NP, Sonule A, Wani H (2011) Development of servers in cloud computing to solve issues related to security and backup. In: IEEE 12th International Conference on Machine Learning and Applications, vol 3, issue 1 Hemant P, Chawande NP, Sonule A, Wani H (2011) Development of servers in cloud computing to solve issues related to security and backup. In: IEEE 12th International Conference on Machine Learning and Applications, vol 3, issue 1
20.
go back to reference Tebaa M, El Hajji S, El Ghazi A (2012) Holomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol 3, issue 1 Tebaa M, El Hajji S, El Ghazi A (2012) Holomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol 3, issue 1
21.
go back to reference Zhong Q, Liu Z (2010) Increasing client satisfaction: request scheduling for information service. In: IEEE Transactions on Cloud Computing, vol 1, issue 4 Zhong Q, Liu Z (2010) Increasing client satisfaction: request scheduling for information service. In: IEEE Transactions on Cloud Computing, vol 1, issue 4
Metadata
Title
Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location
Authors
J. Raja
M. Ramakrishnan
Publication date
23-12-2019
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 8/2020
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03111-1

Other articles of this Issue 8/2020

The Journal of Supercomputing 8/2020 Go to the issue

Premium Partner