Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

被引:0
作者
Shunmuganathan, Saraswathi [1 ]
Kannan, Sridharan [2 ]
Rao, T. V. Madhusudhana [3 ]
Ambika, K. [4 ]
Jayasankar, T. [5 ]
机构
[1] SSN Coll Engn, Dept Comp Sci & Engn, Chennai 603110, Tamil Nadu, India
[2] JKK Munirajah Coll Technol, Dept Comp Sci & Engn, Erode 638506, Tamil Nadu, India
[3] Vignans Inst Informat Technol, Dept Comp Sci & Engn, Visakhapatnam 530049, Andhra Pradesh, India
[4] Anna Univ, Univ Coll Engn, Dept Comp Sci & Engn, BIT Campus, Tiruchirappalli 620024, Tamil Nadu, India
[5] Anna Univ, Univ Coll Engn, Dept Elect & Commun Engn, BIT Campus, Tiruchirappalli 620024, India
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2022年 / 43卷 / 02期
关键词
Data sharing; cloud environments; big data; chosen-plaintext attack; security; AUTHENTICATION; PROTOCOL;
D O I
10.32604/csse.2022.022424
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing (ISIMSDS) to hold the DS of big data in CCEs. The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs. An access control Encryption Method (EM) is used to improve the encryption. The Complexity is measured to increase the authentication standard. The active attack is protected using this ISIMSDS methodology. Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user's population is increasing rapidly. The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText (PT) attack and provides more efficient computation and storage space than the related methods. The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption, decryption, and retrieval of the data.
引用
收藏
页码:785 / 801
页数:17
相关论文
共 28 条
[1]  
ArunPrakash R., 2018, APPL MATH INFORM SCI, V12, P255
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
[4]  
Bamini A. M. Anusha, 2017, INT J INTELL ENG SYS, V10, P125
[5]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[6]   Improved Network Traffic by Attacking Denial of Service to Protect Resource Using Z-Test Based 4-Tier Geomark Traceback (Z4TGT) [J].
Ganesh Kumar, K. ;
Sengan, Sudhakar .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) :3541-3575
[7]  
Ganeshkumar K., 2014, INDIAN J SCI TECHNOL, V7, P1
[8]   CP-ABE With Constant-Size Keys for Lightweight Devices [J].
Guo, Fuchun ;
Mu, Yi ;
Susilo, Willy ;
Wong, Duncan S. ;
Varadharajan, Vijay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :763-771
[9]   Hybrid-LRU Caching for Optimizing Data Storage and Retrieval in Edge Computing-Based Wearable Sensors [J].
Jia, Gangyong ;
Han, Guangjie ;
Xie, Hongtianchen ;
Du, Jiaxin .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1342-1351
[10]  
Karuppiah M., 2010, INT J E-HEALTH MED C, V10, P102