Skip to main content
Erschienen in: Cluster Computing 2/2019

13.03.2018

Secure and efficient data forwarding in untrusted cloud environment

verfasst von: Balamanigandan Ramachandran, Kamalraj Subramaniam

Erschienen in: Cluster Computing | Sonderheft 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. In recent days one of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Due to user’s data security, the encrypted data is stored in cloud server to protect from unauthorized users. Existing methods offer either data transformation efficiency or security. They fail to maintain end to end security during massive transformations. However, existing methods are not capable of solving the key complexity and avoiding key secrecy disclosure. The main objective of this study is to design and develop a secured efficient data forwarding algorithm for increasing the security level. It is developed specially for untrusted cloud environment. In order to provide a better solution, an efficient framework is proposed for forwarding and retrieving the content in the untrusted cloud environment. Proposed system implements dual privacy for reliable data transmission in an untrusted cloud environment. It develops efficient secret key exposure to minimize the key complexity during data transmission. SEDFA is used for one to many communications as a public key used for encryption and decryption. This scheme provides reliable data transmission between the data owner and end user in untrusted Cloud Environment. Proposed mechanisms minimized the data encryption time, decryption time and improved the communication cost. Based on experimental results, SEDFA reduces the communication cost 5%, encryption time (ET), 2 s, decryption time (DT) 0.5 s.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yang, K., Jia, X.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems. Springer, New York, pp. 59–83, (2014) Yang, K., Jia, X.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems. Springer, New York, pp. 59–83, (2014)
2.
Zurück zum Zitat Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transact. Parallel Distrib. Syst. 24(9), 1717–1726 (2013) Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transact. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
3.
Zurück zum Zitat Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the Network and Service Management (CSM), 2012 8th International Conference and 2012 workshop on systems virtualization management (SVM). IEEE. pp. 37–45, (2012) Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the Network and Service Management (CSM), 2012 8th International Conference and 2012 workshop on systems virtualization management (SVM). IEEE. pp. 37–45, (2012)
4.
Zurück zum Zitat Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y. T.: Lt codes-based secure and reliable cloud storage service. In: Proceedings of the INFOCOM. IEEE. pp. 693–701, (2012) Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y. T.: Lt codes-based secure and reliable cloud storage service. In: Proceedings of the INFOCOM. IEEE. pp. 693–701, (2012)
5.
Zurück zum Zitat Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transact. Parallel Distrib. Syst. 25(7), 1735–1744 (2014) Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transact. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)
6.
Zurück zum Zitat Wang, B., Chow, S. S., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: Proceedings of the Distributed Computing Systems (ICDCS), 33rd International Conference. IEEE. pp. 124–133, (2013) Wang, B., Chow, S. S., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. In: Proceedings of the Distributed Computing Systems (ICDCS), 33rd International Conference. IEEE. pp. 124–133, (2013)
7.
Zurück zum Zitat Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012) Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012)
8.
Zurück zum Zitat Mehto, K., Moriwal, R.: A secured and searchable encryption algorithm for cloud storage. Int. J. Comput. Appl. 120(5), 17–21 (2015) Mehto, K., Moriwal, R.: A secured and searchable encryption algorithm for cloud storage. Int. J. Comput. Appl. 120(5), 17–21 (2015)
9.
Zurück zum Zitat Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transact. Parallel Distrib. Syst. 24(1), 131–143 (2013) Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transact. Parallel Distrib. Syst. 24(1), 131–143 (2013)
10.
Zurück zum Zitat Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A cloud design for user-controlled storage and processing of sensor data. In: Proceedings of the Cloud Computing Technology and Science (CloudCom), 4th International Conference. IEEE. pp. 232–240, (2012) Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A cloud design for user-controlled storage and processing of sensor data. In: Proceedings of the Cloud Computing Technology and Science (CloudCom), 4th International Conference. IEEE. pp. 232–240, (2012)
11.
Zurück zum Zitat Selva Kumar, C., Rathanam, G. J., Sumalatha, M. R.: PDDS-Improving cloud data storage security using data partitioning technique. In: Proceedings of the Advance Computing Conference (IACC), 3rd International. IEEE. pp. 7–11, (2013) Selva Kumar, C., Rathanam, G. J., Sumalatha, M. R.: PDDS-Improving cloud data storage security using data partitioning technique. In: Proceedings of the Advance Computing Conference (IACC), 3rd International. IEEE. pp. 7–11, (2013)
12.
Zurück zum Zitat Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificates encryption for secure data sharing in public clouds. IEEE Transact. Knowl. Data Eng. 26(9), 2107–2119 (2014) Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificates encryption for secure data sharing in public clouds. IEEE Transact. Knowl. Data Eng. 26(9), 2107–2119 (2014)
13.
Zurück zum Zitat Zhao, C., Tu, S., Chen, H., Huang, Y.: An efficient association rule mining algorithm based on user behavior for cloud security auditing. In: Proceedings of the Online Analysis and Computing Science (ICOACS), International Conference. IEEE. pp. 145–149, (2016) Zhao, C., Tu, S., Chen, H., Huang, Y.: An efficient association rule mining algorithm based on user behavior for cloud security auditing. In: Proceedings of the Online Analysis and Computing Science (ICOACS), International Conference. IEEE. pp. 145–149, (2016)
14.
Zurück zum Zitat Xiao, M., Wang, M., Liu, X., Sun, J.: Efficient distributed access control for big data in clouds. In: Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS), Conference. IEEE. pp. 202–207, (2015) Xiao, M., Wang, M., Liu, X., Sun, J.: Efficient distributed access control for big data in clouds. In: Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS), Conference. IEEE. pp. 202–207, (2015)
15.
Zurück zum Zitat Zhang, Y., Chen, J., Du, R., Deng, L., Xiang, Y., Zhou, Q.: Feacs: a flexible and efficient access control scheme for cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 13th International Conference. IEEE. pp. 310–319, (2014) Zhang, Y., Chen, J., Du, R., Deng, L., Xiang, Y., Zhou, Q.: Feacs: a flexible and efficient access control scheme for cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 13th International Conference. IEEE. pp. 310–319, (2014)
16.
Zurück zum Zitat Shaikh, A., Gadge, J.: Framework for a security of shared data in a cloud environment. In: Proceedings of the Computing Communication Control and Automation (ICCUBEA), International Conference. IEEE. pp. 1–6, (2016) Shaikh, A., Gadge, J.: Framework for a security of shared data in a cloud environment. In: Proceedings of the Computing Communication Control and Automation (ICCUBEA), International Conference. IEEE. pp. 1–6, (2016)
17.
Zurück zum Zitat Marwan, M., Kartit, A., Ouahmane, H.: A secure framework for medical image storage based on multi-cloud. In: Proceedings of the Cloud Computing Technologies and Applications (CloudTech), 2nd International Conference. IEEE. pp. 88–94, (2016) Marwan, M., Kartit, A., Ouahmane, H.: A secure framework for medical image storage based on multi-cloud. In: Proceedings of the Cloud Computing Technologies and Applications (CloudTech), 2nd International Conference. IEEE. pp. 88–94, (2016)
18.
Zurück zum Zitat Brindha, S. J., Sujana, J. A. J., Revathi, T.: Agent-based bidirectional bidding mechanism for efficient scheduling of real-time tasks in cloud computing. In: Proceedings of the Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference. IEEE. pp. 130–135, (2016) Brindha, S. J., Sujana, J. A. J., Revathi, T.: Agent-based bidirectional bidding mechanism for efficient scheduling of real-time tasks in cloud computing. In: Proceedings of the Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference. IEEE. pp. 130–135, (2016)
19.
Zurück zum Zitat Ren, S. Q., Meng, T. H., Yibin, N., Aung, K. M. M.: Privacy-preserved multi-party data merging with secure equality evaluation. In: Proceedings of the Cloud Computing Research and Innovations (ICCCRI), International Conference. IEEE. pp. 34–41, (2016) Ren, S. Q., Meng, T. H., Yibin, N., Aung, K. M. M.: Privacy-preserved multi-party data merging with secure equality evaluation. In: Proceedings of the Cloud Computing Research and Innovations (ICCCRI), International Conference. IEEE. pp. 34–41, (2016)
20.
Zurück zum Zitat Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers. (2016) Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers. (2016)
Metadaten
Titel
Secure and efficient data forwarding in untrusted cloud environment
verfasst von
Balamanigandan Ramachandran
Kamalraj Subramaniam
Publikationsdatum
13.03.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 2/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2240-x

Weitere Artikel der Sonderheft 2/2019

Cluster Computing 2/2019 Zur Ausgabe