Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

被引:0
作者
Shunmuganathan, Saraswathi [1 ]
Kannan, Sridharan [2 ]
Rao, T. V. Madhusudhana [3 ]
Ambika, K. [4 ]
Jayasankar, T. [5 ]
机构
[1] SSN Coll Engn, Dept Comp Sci & Engn, Chennai 603110, Tamil Nadu, India
[2] JKK Munirajah Coll Technol, Dept Comp Sci & Engn, Erode 638506, Tamil Nadu, India
[3] Vignans Inst Informat Technol, Dept Comp Sci & Engn, Visakhapatnam 530049, Andhra Pradesh, India
[4] Anna Univ, Univ Coll Engn, Dept Comp Sci & Engn, BIT Campus, Tiruchirappalli 620024, Tamil Nadu, India
[5] Anna Univ, Univ Coll Engn, Dept Elect & Commun Engn, BIT Campus, Tiruchirappalli 620024, India
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2022年 / 43卷 / 02期
关键词
Data sharing; cloud environments; big data; chosen-plaintext attack; security; AUTHENTICATION; PROTOCOL;
D O I
10.32604/csse.2022.022424
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing (ISIMSDS) to hold the DS of big data in CCEs. The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs. An access control Encryption Method (EM) is used to improve the encryption. The Complexity is measured to increase the authentication standard. The active attack is protected using this ISIMSDS methodology. Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user's population is increasing rapidly. The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText (PT) attack and provides more efficient computation and storage space than the related methods. The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption, decryption, and retrieval of the data.
引用
收藏
页码:785 / 801
页数:17
相关论文
共 28 条
[11]  
Kirubakaramoorthi R., 2015, Indian Journal of Science and Technology, V8, P1, DOI [DOI 10.17485/IJST/2015/V8I21/79144, 10.17485/ijst/2015/v8i21/79144]
[12]   Secure attribute-based data sharing for resource-limited users in cloud computing [J].
Li, Jin ;
Zhang, Yinghui ;
Chen, Xiaofeng ;
Xiang, Yang .
COMPUTERS & SECURITY, 2018, 72 :1-12
[13]   Privacy-preserving outsourced classification in cloud computing [J].
Li, Ping ;
Li, Jin ;
Huang, Zhengan ;
Gao, Chong-Zhi ;
Chen, Wen-Bin ;
Chen, Kai .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01) :277-286
[14]  
Libert B, 2008, LECT NOTES COMPUT SC, V4939, P360, DOI 10.1007/978-3-540-78440-1_21
[15]   Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health [J].
Liu, Hong ;
Yao, Xuanxia ;
Yang, Tao ;
Ning, Huansheng .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1352-1362
[16]   Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms [J].
Mazini, Mehrnaz ;
Shirazi, Babak ;
Mahdavi, Iraj .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (04) :541-553
[17]  
Miao Y., 2020, IEEE Transactions on Cloud Computing, V99, P1
[18]   Prediction of availability and integrity of cloud data using soft computing technique [J].
Pitchai, R. ;
Babu, S. ;
Supraja, P. ;
Anjanayya, S. .
SOFT COMPUTING, 2019, 23 (18) :8555-8562
[19]  
Sangho Lee, 2010, 2010 IEEE Symposium on Computers and Communications (ISCC), P75, DOI 10.1109/ISCC.2010.5546755
[20]   A secure cloud-assisted urban data sharing framework for ubiquitous-cities [J].
Shen, Jian ;
Liu, Dengzhi ;
Shen, Jun ;
Liu, Qi ;
Sun, Xingming .
PERVASIVE AND MOBILE COMPUTING, 2017, 41 :219-230