An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA

被引:0
作者
Balasubramanian Prabhu Kavin
Sannasi Ganapathy
U. Kanimozhi
Arputharaj Kannan
机构
[1] Vellore Institute of Technology-Chennai,School of Computer Science and Engineering
[2] Crayon Data India Pvt Ltd,School of Computer Science and Engineering
[3] Vellore Institute of Technology-Vellore,undefined
来源
Wireless Personal Communications | 2020年 / 115卷
关键词
Cloud computing; Elliptic curve cryptography; Access control; Digital signature; Modulo function; Binary function; Encryption; Decryption;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose an enhanced security framework for securing the cloud users data in the cloud environment. This new security framework consists of access control methodology, encryption/decryption technique and digital signature algorithms. Here, a new Elliptic Curve Cryptography based key generation algorithm is proposed for generating highly secured keys. Moreover, a new Identity based Elliptic curve Access Control mechanism (Id-EAC) is also proposed in this paper for restricting the cloud user’s data accessibility over the different kind of data. In addition, a new binary value based two phase encryption and decryption algorithm that referred the elliptic curve cryptographic based key values is introduced to secure the cloud user’s data in the cloud environment. Finally, a new modulo function based Lightweight Digital Signature Algorithm is also proposed to ensure the data integrity in this proposed security framework. This security framework is provided the high data security, accessibility and integrity for the user data. The experimental results show that the efficiency of the proposed algorithms in this security framework is proved as better than other existing algorithms in terms of security and performance.
引用
收藏
页码:1107 / 1135
页数:28
相关论文
共 135 条
[1]  
Bertino E(1996)A temporal access control mechanism for database systems IEEE Transactions on Knowledge and Data Engineering 8 67-80
[2]  
Bettini C(1998)Access control and signatures via quorum secret sharing IEEE Transactions on Parallel and Distributed Systems 9 909-922
[3]  
Ferrari E(2017)Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud IEEE Transactions on Computers 66 891-904
[4]  
Samarati P(2009)KTR: An efficient key management scheme for secure data access control in wireless broadcast services IEEE Transactions on Dependable and Secure Computing 6 188-201
[5]  
Naor M(2013)A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting IEEE Transactions on Multimedia 15 1353-1364
[6]  
Wool A(2016)Fine-grained two-factor access control for web-based cloud computing services IEEE Transactions on Information Forensics and Security 11 484-497
[7]  
Patranabis S(2016)Privacy preserving and delegated access control for cloud applications Tsinghua Science and Technology 21 40-54
[8]  
Shrivastava Y(2016)Hierarchical and shared access control IEEE Transactions on Information Forensics and Security 11 850-865
[9]  
Mukhopadhyay D(2019)A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT based applications Computer Networks 151 181-190
[10]  
Qijun G(2018)Optimal and energy efficient scheduling techniques for resource management in public cloud networks National Academy Science Letters 41 219-223