Skip to main content
Top
Published in: Cluster Computing 2/2019

13-03-2018

Secure and efficient data forwarding in untrusted cloud environment

Authors: Balamanigandan Ramachandran, Kamalraj Subramaniam

Published in: Cluster Computing | Special Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. In recent days one of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Due to user’s data security, the encrypted data is stored in cloud server to protect from unauthorized users. Existing methods offer either data transformation efficiency or security. They fail to maintain end to end security during massive transformations. However, existing methods are not capable of solving the key complexity and avoiding key secrecy disclosure. The main objective of this study is to design and develop a secured efficient data forwarding algorithm for increasing the security level. It is developed specially for untrusted cloud environment. In order to provide a better solution, an efficient framework is proposed for forwarding and retrieving the content in the untrusted cloud environment. Proposed system implements dual privacy for reliable data transmission in an untrusted cloud environment. It develops efficient secret key exposure to minimize the key complexity during data transmission. SEDFA is used for one to many communications as a public key used for encryption and decryption. This scheme provides reliable data transmission between the data owner and end user in untrusted Cloud Environment. Proposed mechanisms minimized the data encryption time, decryption time and improved the communication cost. Based on experimental results, SEDFA reduces the communication cost 5%, encryption time (ET), 2 s, decryption time (DT) 0.5 s.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yang, K., Jia, X.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems. Springer, New York, pp. 59–83, (2014) Yang, K., Jia, X.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems. Springer, New York, pp. 59–83, (2014)
2.
go back to reference Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transact. Parallel Distrib. Syst. 24(9), 1717–1726 (2013) Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transact. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
3.
go back to reference Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the Network and Service Management (CSM), 2012 8th International Conference and 2012 workshop on systems virtualization management (SVM). IEEE. pp. 37–45, (2012) Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the Network and Service Management (CSM), 2012 8th International Conference and 2012 workshop on systems virtualization management (SVM). IEEE. pp. 37–45, (2012)
4.
go back to reference Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y. T.: Lt codes-based secure and reliable cloud storage service. In: Proceedings of the INFOCOM. IEEE. pp. 693–701, (2012) Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y. T.: Lt codes-based secure and reliable cloud storage service. In: Proceedings of the INFOCOM. IEEE. pp. 693–701, (2012)
5.
go back to reference Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transact. Parallel Distrib. Syst. 25(7), 1735–1744 (2014) Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transact. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)
6.
go back to reference Wang, B., Chow, S. S., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: Proceedings of the Distributed Computing Systems (ICDCS), 33rd International Conference. IEEE. pp. 124–133, (2013) Wang, B., Chow, S. S., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: Proceedings of the Distributed Computing Systems (ICDCS), 33rd International Conference. IEEE. pp. 124–133, (2013)
7.
go back to reference Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012) Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012)
8.
go back to reference Mehto, K., Moriwal, R.: A secured and searchable encryption algorithm for cloud storage. Int. J. Comput. Appl. 120(5), 17–21 (2015) Mehto, K., Moriwal, R.: A secured and searchable encryption algorithm for cloud storage. Int. J. Comput. Appl. 120(5), 17–21 (2015)
9.
go back to reference Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transact. Parallel Distrib. Syst. 24(1), 131–143 (2013) Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transact. Parallel Distrib. Syst. 24(1), 131–143 (2013)
10.
go back to reference Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A cloud design for user-controlled storage and processing of sensor data. In: Proceedings of the Cloud Computing Technology and Science (CloudCom), 4th International Conference. IEEE. pp. 232–240, (2012) Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A cloud design for user-controlled storage and processing of sensor data. In: Proceedings of the Cloud Computing Technology and Science (CloudCom), 4th International Conference. IEEE. pp. 232–240, (2012)
11.
go back to reference Selva Kumar, C., Rathanam, G. J., Sumalatha, M. R.: PDDS-Improving cloud data storage security using data partitioning technique. In: Proceedings of the Advance Computing Conference (IACC), 3rd International. IEEE. pp. 7–11, (2013) Selva Kumar, C., Rathanam, G. J., Sumalatha, M. R.: PDDS-Improving cloud data storage security using data partitioning technique. In: Proceedings of the Advance Computing Conference (IACC), 3rd International. IEEE. pp. 7–11, (2013)
12.
go back to reference Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificates encryption for secure data sharing in public clouds. IEEE Transact. Knowl. Data Eng. 26(9), 2107–2119 (2014) Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificates encryption for secure data sharing in public clouds. IEEE Transact. Knowl. Data Eng. 26(9), 2107–2119 (2014)
13.
go back to reference Zhao, C., Tu, S., Chen, H., Huang, Y.: An efficient association rule mining algorithm based on user behavior for cloud security auditing. In: Proceedings of the Online Analysis and Computing Science (ICOACS), International Conference. IEEE. pp. 145–149, (2016) Zhao, C., Tu, S., Chen, H., Huang, Y.: An efficient association rule mining algorithm based on user behavior for cloud security auditing. In: Proceedings of the Online Analysis and Computing Science (ICOACS), International Conference. IEEE. pp. 145–149, (2016)
14.
go back to reference Xiao, M., Wang, M., Liu, X., Sun, J.: Efficient distributed access control for big data in clouds. In: Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS), Conference. IEEE. pp. 202–207, (2015) Xiao, M., Wang, M., Liu, X., Sun, J.: Efficient distributed access control for big data in clouds. In: Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS), Conference. IEEE. pp. 202–207, (2015)
15.
go back to reference Zhang, Y., Chen, J., Du, R., Deng, L., Xiang, Y., Zhou, Q.: Feacs: a flexible and efficient access control scheme for cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 13th International Conference. IEEE. pp. 310–319, (2014) Zhang, Y., Chen, J., Du, R., Deng, L., Xiang, Y., Zhou, Q.: Feacs: a flexible and efficient access control scheme for cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 13th International Conference. IEEE. pp. 310–319, (2014)
16.
go back to reference Shaikh, A., Gadge, J.: Framework for a security of shared data in a cloud environment. In: Proceedings of the Computing Communication Control and Automation (ICCUBEA), International Conference. IEEE. pp. 1–6, (2016) Shaikh, A., Gadge, J.: Framework for a security of shared data in a cloud environment. In: Proceedings of the Computing Communication Control and Automation (ICCUBEA), International Conference. IEEE. pp. 1–6, (2016)
17.
go back to reference Marwan, M., Kartit, A., Ouahmane, H.: A secure framework for medical image storage based on multi-cloud. In: Proceedings of the Cloud Computing Technologies and Applications (CloudTech), 2nd International Conference. IEEE. pp. 88–94, (2016) Marwan, M., Kartit, A., Ouahmane, H.: A secure framework for medical image storage based on multi-cloud. In: Proceedings of the Cloud Computing Technologies and Applications (CloudTech), 2nd International Conference. IEEE. pp. 88–94, (2016)
18.
go back to reference Brindha, S. J., Sujana, J. A. J., Revathi, T.: Agent-based bidirectional bidding mechanism for efficient scheduling of real-time tasks in cloud computing. In: Proceedings of the Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference. IEEE. pp. 130–135, (2016) Brindha, S. J., Sujana, J. A. J., Revathi, T.: Agent-based bidirectional bidding mechanism for efficient scheduling of real-time tasks in cloud computing. In: Proceedings of the Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference. IEEE. pp. 130–135, (2016)
19.
go back to reference Ren, S. Q., Meng, T. H., Yibin, N., Aung, K. M. M.: Privacy-preserved multi-party data merging with secure equality evaluation. In: Proceedings of the Cloud Computing Research and Innovations (ICCCRI), International Conference. IEEE. pp. 34–41, (2016) Ren, S. Q., Meng, T. H., Yibin, N., Aung, K. M. M.: Privacy-preserved multi-party data merging with secure equality evaluation. In: Proceedings of the Cloud Computing Research and Innovations (ICCCRI), International Conference. IEEE. pp. 34–41, (2016)
20.
go back to reference Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers. (2016) Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers. (2016)
Metadata
Title
Secure and efficient data forwarding in untrusted cloud environment
Authors
Balamanigandan Ramachandran
Kamalraj Subramaniam
Publication date
13-03-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 2/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2240-x

Other articles of this Special Issue 2/2019

Cluster Computing 2/2019 Go to the issue

Premium Partner