Secure and Efficient Enhanced Sharing of Data Over Cloud Using Attribute Based Encryption with Hash Functions

Cloud computing is a model on which association and people can work with application from anywhere on demand. The real issue of cloud computing is preserving integrity and confidentiality of data in data security. The essential solution for this issue is data encryption on cloud. Security in cloud computing being one of the great research subjects. Numerous strategies have been proposed on attribute-based encryption systems. Attribute Based Encryption (ABE) is a cryptographic crude that understands the thought of cryptographic access control. This research work proposed attribute-based encryption method based on hash function associated with asymmetric encryption. The performance of the proposed algorithm has been evaluated by simulation using Cloudsim toolkit. For simulation we have analyzed the results on the basis of different File Size and simulated the results of proposed algorithm. Encryption Time, Key Generation Time and decryption time are evaluated and compared with the existing algorithm. Performance of proposed hash-based ABE algorithm is compared with the existing ABE algorithm. Experimental results demonstrate that proposed technique takes less time for encryption, decryption and for computing key than the existing technique and hence, performs better than existing algorithm. The average improvement is 13.54% in the proposed ABE with hashing as compared to existing ABE on the basis of encryption time; average approximate increase in the efficiency of key computation time is 3.72% as compared with the existing; 11.08% of improvement in decryption time.

[1]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[2]  Haibo Chen,et al.  Security-Preserving Live Migration of Virtual Machines in the Cloud , 2012, Journal of Network and Systems Management.

[3]  Xiaojiang Du,et al.  Prometheus: Privacy-aware data retrieval on hybrid cloud , 2013, 2013 Proceedings IEEE INFOCOM.

[4]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[5]  Jian Shen,et al.  Secure Data Access and Sharing Scheme for Cloud Storage , 2017, Wirel. Pers. Commun..

[6]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[7]  M. Lilly Florence,et al.  Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search , 2017, Cluster Computing.

[8]  Feipei Lai,et al.  Confidentiality Protection of Digital Health Records in Cloud Computing , 2016, Journal of Medical Systems.

[9]  Ehud Gudes,et al.  Security and privacy aspects in MapReduce on clouds: A survey , 2016, Comput. Sci. Rev..

[10]  Radu Sion Secure Data Outsourcing , 2007, VLDB.

[11]  Albert Y. Zomaya,et al.  Trends and challenges in cloud datacenters , 2014, IEEE Cloud Computing.

[12]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[13]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[14]  Murat Kantarcioglu,et al.  SEMROD: Secure and Efficient MapReduce Over HybriD Clouds , 2015, SIGMOD Conference.

[15]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[16]  Ying Yin,et al.  Privacy protection and integrity verification of aggregate queries in cloud computing , 2019, Cluster Computing.

[17]  Nik Bessis,et al.  CS-PSO: chaotic particle swarm optimization algorithm for solving combinatorial optimization problems , 2016, Soft Computing.

[18]  Ilaria Matteucci,et al.  Towards safer information sharing in the cloud , 2014, International Journal of Information Security.

[19]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[20]  Jérôme Darmont,et al.  Secret sharing for cloud data security: a survey , 2017, The VLDB Journal.

[21]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[22]  Jenq-Shiou Leu,et al.  Enhancing security and privacy of images on cloud by histogram shifting and secret sharing , 2017, Multimedia Tools and Applications.

[23]  Daan Broeder,et al.  A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.

[24]  Le Gruenwald,et al.  A survey of data replication techniques for mobile ad hoc network databases , 2008, The VLDB Journal.

[25]  Mihir Bellare,et al.  Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.

[26]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[27]  Yong Wang,et al.  A new usage control protocol for data protection of cloud environment , 2016, EURASIP J. Inf. Secur..

[28]  Minhaj Ahmad Khan,et al.  A survey of security issues for cloud computing , 2016, J. Netw. Comput. Appl..

[29]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[30]  Wenfen Liu,et al.  Forward and backward secure fuzzy encryption for data sharing in cloud computing , 2019, Soft Comput..

[31]  Divesh Srivastava,et al.  Anonymized Data: Generation, models, usage , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[32]  Roland H. C. Yap,et al.  Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds , 2014, 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[33]  Qinglin Zhao,et al.  Support for spot virtual machine purchasing simulation , 2018, Cluster Computing.