A Flexible and Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing

被引:0
|
作者
Thushara, G. A. [1 ]
Bhanu, S. Mary Saira [1 ]
机构
[1] Natl Inst Technol Tiruchirappalli, Dept CSE, Tiruchirappalli 620015, Tamil Nadu, India
来源
2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON | 2022年
关键词
Cloud Computing; Data-Sharing; Security; Privacy; ABE; Access Control; ENCRYPTION;
D O I
10.1109/INDICON56171.2022.10039726
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Secure data-sharing in cloud computing is receiving greater attention in information communication systems since it provides users with efficient and effective data transmission. Cryptographic techniques are frequently employed to protect the confidentiality of shared sensitive data. However, data security remains a serious concern in centralized cloud-based data transfers. The key challenge with cloud data-sharing is determining how to authorize and access data securely. A secure data-sharing mechanism in a multi-cloud environment is introduced to address effective fine-grained access control, data privacy, and confidentiality. Fine-grained data access control is possible with Ciphertext Policy Attribute-Based Encryption. Since this encryption method is unsuitable for attribute coordination among numerous users and critical enforcement and attributes abuse difficulties, an additional encryption approach is required. Blowfish's key scheduling takes a long time relative to other symmetric algorithms, which might be advantageous when brute force assaults are more complex. Combining the Blowfish technique for re-encryption gives the shared data an extra layer of security. There is still a risk of key generation and insider attacks. The proposed method uses an indexed-based file slicing and merging associated with the SHA-256 hash scheme to address these threats. Furthermore, the security analysis and performance evaluation of the proposed method shows that it is both secure and effective.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Secure Sharing of Health Data Over Cloud
    Alamri, Fahad Saeed
    Lee, Ki Dong
    2015 5TH NATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY: TOWARDS NEW SMART WORLD (NSITNSW), 2015,
  • [22] Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
    Fatima, Shahin
    Ahmad, Shish
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2020, 16 (01) : 1 - 15
  • [23] City on the Sky: Extending XACML for Flexible, Secure Data Sharing on the Cloud
    Tien Tuan Anh Dinh
    Wang Wenqiang
    Datta, Anwitaman
    JOURNAL OF GRID COMPUTING, 2012, 10 (01) : 151 - 172
  • [24] Secure Multiparty Data Sharing in the Cloud using Hardware-based TPM Devices
    Thilakanathan, Danan
    Calvo, Rafael A.
    Chen, Shiping
    Nepal, Surya
    Liu, Dongxi
    Zic, John
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 224 - 231
  • [25] Hybrid Encryption Techniques for Secure Sharing of a Sensitive Data for Banking Systems Over Cloud
    More, Prachi
    Chandugade, Shubham
    Rafiq, Shaikh Mohammad Shafi
    Pise, Priya
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 93 - 96
  • [26] A new hybrid encryption in fog–cloud environment for secure medical data-sharing
    G. A. Thushara
    S. Mary Saira Bhanu
    Iran Journal of Computer Science, 2023, 6 (2) : 169 - 183
  • [27] Secure attribute-based data sharing for resource-limited users in cloud computing
    Li, Jin
    Zhang, Yinghui
    Chen, Xiaofeng
    Xiang, Yang
    COMPUTERS & SECURITY, 2018, 72 : 1 - 12
  • [28] A secure data sharing and query processing framework via federation of cloud computing
    Samanthula, Bharath K.
    Elmehdwi, Yousef
    Howser, Gerry
    Madria, Sanjay
    INFORMATION SYSTEMS, 2015, 48 : 196 - 212
  • [29] Secure Data Sharing for Multiple Dynamic Groups in Cloud
    Poornima, E.
    Kasiviswanth, N.
    Bindu, C. Shoba
    2015 CONFERENCE ON POWER, CONTROL, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES FOR SUSTAINABLE GROWTH (PCCCTSG), 2015, : 326 - 331
  • [30] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Kotha, Sita Kumari
    Rani, Meesala Shobha
    Subedi, Bharat
    Chunduru, Anilkumar
    Karrothu, Aravind
    Neupane, Bipana
    Sathishkumar, V. E.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2161 - 2188