An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA

被引:29
作者
Prabhu Kavin, Balasubramanian [1 ]
Ganapathy, Sannasi [1 ]
Kanimozhi, U. [2 ]
Kannan, Arputharaj [3 ]
机构
[1] Vellore Inst Technol Chennai, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Crayon Data India Pvt Ltd, Chennai, Tamil Nadu, India
[3] Vellore Inst Technol Vellore, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Cloud computing; Elliptic curve cryptography; Access control; Digital signature; Modulo function; Binary function; Encryption; Decryption; INTEGRITY VERIFICATION SCHEME; ENCRYPTION; MANAGEMENT;
D O I
10.1007/s11277-020-07613-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose an enhanced security framework for securing the cloud users data in the cloud environment. This new security framework consists of access control methodology, encryption/decryption technique and digital signature algorithms. Here, a new Elliptic Curve Cryptography based key generation algorithm is proposed for generating highly secured keys. Moreover, a new Identity based Elliptic curve Access Control mechanism (Id-EAC) is also proposed in this paper for restricting the cloud user's data accessibility over the different kind of data. In addition, a new binary value based two phase encryption and decryption algorithm that referred the elliptic curve cryptographic based key values is introduced to secure the cloud user's data in the cloud environment. Finally, a new modulo function based Lightweight Digital Signature Algorithm is also proposed to ensure the data integrity in this proposed security framework. This security framework is provided the high data security, accessibility and integrity for the user data. The experimental results show that the efficiency of the proposed algorithms in this security framework is proved as better than other existing algorithms in terms of security and performance.
引用
收藏
页码:1107 / 1135
页数:29
相关论文
共 44 条
[1]  
[Anonymous], 2017, J ADV RES DYNAMICAL
[2]   A temporal access control mechanism for database systems [J].
Bertino, E ;
Bettini, C ;
Ferrari, E ;
Samarati, P .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1996, 8 (01) :67-80
[3]   Hierarchical and Shared Access Control [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara ;
Palmieri, Francesco ;
Castiglione, Aniello ;
Li, Jin ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :850-865
[4]   Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud [J].
Chatterjee, Ayantika ;
Sengupta, Indranil .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) :287-300
[5]  
Chen YH, 2018, PROCEEDINGS OF 4TH IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION 2018 ( IEEE ICASI 2018 ), P1063, DOI 10.1109/ICASI.2018.8394460
[6]  
Daniel R. M., J KING SAUD U COMPUT
[7]   A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT [J].
Ding, Sheng ;
Li, Chen ;
Li, Hui .
IEEE ACCESS, 2018, 6 :27336-27345
[8]   One secure data integrity verification scheme for cloud storage [J].
Fan, Yongkai ;
Lin, Xiaodong ;
Tan, Gang ;
Zhang, Yuqing ;
Dong, Wei ;
Lei, Jing .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :376-385
[9]   A symmetric cryptographic scheme for data integrity verification in cloud databases [J].
Ferretti, Luca ;
Marchetti, Mirco ;
Andreolini, Mauro ;
Colajanni, Michele .
INFORMATION SCIENCES, 2018, 422 :497-515
[10]   A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing [J].
Fu, Junsong ;
Wang, Na .
IEEE ACCESS, 2019, 7 :36218-36232