Skip to main content
Erschienen in: Soft Computing 3/2018

25.10.2016 | Methodologies and Application

A secure transaction of cloud data using conditional source trust attributes encryption mechanism

verfasst von: Thomas Brindha, Ramaswamy Swarnammal Shaji

Erschienen in: Soft Computing | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage enables users to store their data and enjoy high-quality cloud applications based on transaction processing. Normally, the wholesaler has real servers which host products and services from different locations, provide the end-users to simply log on to the network and perform transaction processing. However, the dynamic data update after transaction processing in cloud does not provide an optimal security framework. Besides, the cloud data storage is not focusing on maximizing the security on performing the transactions over cloud servers. In order to overcome such limitations in cloud, a novel framework named conditional source trust attribute encryption with particle swarm-based transaction optimization (CSTAE-PSTO) is proposed. The conditional attributes are encrypted using the conditional source trust attribute encryption technique along with the bilinear mapping transformation function in CSTAE-PSTO framework to improve the security level through unique secured identity number. The PSTO technique on cloud applications optimizes the result with minimal transaction completion time. Experiment is conducted based on factors such as throughput level on transaction, security rate on data layer and transaction completion time. Experimental analysis shows that the CSTAE-PSTO framework is able to improve the security rate on data layer and reduce the transaction completion time when compared to the state-of-the-art works.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al-maamari A, Omara FA (2015) Task scheduling using PSO algorithm in cloud computing environments. Int J Grid Distrib Comput 8(5):245–256CrossRef Al-maamari A, Omara FA (2015) Task scheduling using PSO algorithm in cloud computing environments. Int J Grid Distrib Comput 8(5):245–256CrossRef
Zurück zum Zitat Cheng L, Wang C (2013) Network performance isolation for latency-sensitive cloud applications. Future Gener Comput Syst 29(4):1073–1084CrossRef Cheng L, Wang C (2013) Network performance isolation for latency-sensitive cloud applications. Future Gener Comput Syst 29(4):1073–1084CrossRef
Zurück zum Zitat Di S, Wang C (2013a) Dynamic optimization of multiattribute resource allocation in self-organizing clouds. IEEE Trans Parallel Distrib Syst 24(3):464–478 Di S, Wang C (2013a) Dynamic optimization of multiattribute resource allocation in self-organizing clouds. IEEE Trans Parallel Distrib Syst 24(3):464–478
Zurück zum Zitat Di S, Wang C (2013b) Error-tolerant resource allocation and payment minimization for cloud system. IEEE Trans Parallel Distrib Syst 24(6):1097–1106 Di S, Wang C (2013b) Error-tolerant resource allocation and payment minimization for cloud system. IEEE Trans Parallel Distrib Syst 24(6):1097–1106
Zurück zum Zitat Di S, Wang C, Chen L (2013) Ex-post efficient resource allocation for self-organizing cloud. J Comput Electr Eng 39(7):2342–2356CrossRef Di S, Wang C, Chen L (2013) Ex-post efficient resource allocation for self-organizing cloud. J Comput Electr Eng 39(7):2342–2356CrossRef
Zurück zum Zitat He H, Li R, Dong X, Zhang Z (2014) Secure, efficient and fine-grained data control mechanism for P2P storage cloud. IEEE Trans Cloud Comput 2(4):471–484CrossRef He H, Li R, Dong X, Zhang Z (2014) Secure, efficient and fine-grained data control mechanism for P2P storage cloud. IEEE Trans Cloud Comput 2(4):471–484CrossRef
Zurück zum Zitat Inbarani WS, Shenbagamoorthy G, Paul CKC (2013) Proxy re-encryption schemes for data storage security in cloud—a survey. Int J Eng Res Technol 2(1):1–5CrossRef Inbarani WS, Shenbagamoorthy G, Paul CKC (2013) Proxy re-encryption schemes for data storage security in cloud—a survey. Int J Eng Res Technol 2(1):1–5CrossRef
Zurück zum Zitat Karimi M (2014) Hybrid discrete particle swarm optimization for task scheduling in grid computing. Int J Grid Distrib Comput 7(4):93–104 Karimi M (2014) Hybrid discrete particle swarm optimization for task scheduling in grid computing. Int J Grid Distrib Comput 7(4):93–104
Zurück zum Zitat Khedkar SV, Gawande AD (2014) Data partitioning technique to improve cloud data storage security. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3347–3350 Khedkar SV, Gawande AD (2014) Data partitioning technique to improve cloud data storage security. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3347–3350
Zurück zum Zitat Kumar GP, Reddy KS, Raviteja C, Arif SM (2014) PABKE: Provable attribute-based keyword explore over outsourced encrypted data. Int J Comput Eng Res Trends 1(5):271–276 Kumar GP, Reddy KS, Raviteja C, Arif SM (2014) PABKE: Provable attribute-based keyword explore over outsourced encrypted data. Int J Comput Eng Res Trends 1(5):271–276
Zurück zum Zitat Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef
Zurück zum Zitat Li K, Wang J, Zhang Y, Ma H (2014) Key policy attribute-based proxy re-encryption and RCCA secure scheme. J Internet Serv Inf Secur (JISIS) 4(2):70–82 Li K, Wang J, Zhang Y, Ma H (2014) Key policy attribute-based proxy re-encryption and RCCA secure scheme. J Internet Serv Inf Secur (JISIS) 4(2):70–82
Zurück zum Zitat Lin J, Chen C, Chang JM (2013) QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans Cloud Comput 1(1):101–115CrossRef Lin J, Chen C, Chang JM (2013) QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans Cloud Comput 1(1):101–115CrossRef
Zurück zum Zitat Naruse T, Mohri M, Shiraishi Y (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum Centric Comput Inf Sci 5(8):1–13 Naruse T, Mohri M, Shiraishi Y (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum Centric Comput Inf Sci 5(8):1–13
Zurück zum Zitat Shu J, Shen Z, Xue W (2014) Shield: a stackable secure storage system for file sharing in public storage. J Parallel Distrib Comput 74:2872–2883CrossRef Shu J, Shen Z, Xue W (2014) Shield: a stackable secure storage system for file sharing in public storage. J Parallel Distrib Comput 74:2872–2883CrossRef
Zurück zum Zitat Sookhak M, Talebian H, Ahmed E, Gani A, Khan MK (2014) A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43:121–141CrossRef Sookhak M, Talebian H, Ahmed E, Gani A, Khan MK (2014) A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43:121–141CrossRef
Zurück zum Zitat Zhou L, Aradharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960CrossRef Zhou L, Aradharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960CrossRef
Zurück zum Zitat Zhu Y, Hu H, Ahn G, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244CrossRef Zhu Y, Hu H, Ahn G, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244CrossRef
Metadaten
Titel
A secure transaction of cloud data using conditional source trust attributes encryption mechanism
verfasst von
Thomas Brindha
Ramaswamy Swarnammal Shaji
Publikationsdatum
25.10.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 3/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2405-6

Weitere Artikel der Ausgabe 3/2018

Soft Computing 3/2018 Zur Ausgabe

Methodologies and Application

Kripke semantics for fuzzy logics