EDES-ACM: Enigma Diagonal Encryption Standard Access Control Model for Data Security in Cloud Environment

被引:0
作者
Sameer [1 ]
Rohil, Harish [1 ]
机构
[1] Chaudhary Devi Lal Univ, Dept Comp Sci & Applicat, Sirsa 125055, India
关键词
Cloud; security; multiuser; EDES-ACM; computation cost; STORAGE;
D O I
10.14569/IJACSA.2020.0110841
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The data management across the different domains is the foremost requirement for many organizations universally. The organization establishes the cloud computing paradigm to handle the data effectively due to its robust scaling at a low cost. In recent times the usage of cloud and its data is increasing with the multiuser environments. This resulted in the issue of ensuring the security of data in the cloud environment uploaded by the owners. The cloud service providers and researchers implemented several schemes to ensure data security. However, the task of providing security with multiuser remains tedious with data leakage. A novel Enigmatic Diagonal Encryption Standard (EDES) algorithm to provide access control over the cloud is proposed. The framework with the proposed algorithm is named as EDES-ACM. The Inverse Decisional Diffie Hellman (IDDH) technique is used for generating the signature of the group. The data is encrypted with the EDES algorithm by the data owner. The encrypted data is provided to the user and is accessed by the EDES based private key. The group manager monitors the cloud and provides the activity report to owners based on which the revocation is performed. The framework is validated for its performance on security parameters and compared with the existing models on computation cost. The EDES-ACM framework is effective with low computation cost. The future notion for the proposed framework is to include the block chain technology that may improve the security and better accumulation of data.
引用
收藏
页码:317 / 323
页数:7
相关论文
共 21 条
[1]  
Akhil K M, 2017, P 2017 INT C INTELLI, P1
[2]  
[Anonymous], 2007, INT J COMPUT SCI ENG
[3]  
Crampton J, 2017, J COMPUT SECUR, V25, P511, DOI 10.3233/JCS-16863
[4]   Large universe attribute based access control with efficient decryption in cloud storage system [J].
Fu, Xingbing ;
Nie, Xuyun ;
Wu, Ting ;
Li, Fagen .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 135 :157-164
[5]  
Hoeppner Joseph A., 2015, COMP CLOUD COMPUTING
[6]  
Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
[7]  
Hu YW, 2018, 2018 IEEE PHOTONICS SOCIETY SUMMER TOPICAL MEETING SERIES (SUM), P95, DOI 10.1109/PHOSST.2018.8456721
[8]  
Kalaiprasath R., 2017, International Journal of Mechanical Engineering and Technology (IJMET), V8, P987
[9]  
Kanthale Akash, 2015, SURVEY CLOUD COMPUTI, V5
[10]   Secure attribute-based data sharing for resource-limited users in cloud computing [J].
Li, Jin ;
Zhang, Yinghui ;
Chen, Xiaofeng ;
Xiang, Yang .
COMPUTERS & SECURITY, 2018, 72 :1-12