Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE

Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their data on cloud. The data forwarded to cloud can be protected using some cryptographic techniques based on identity, attributes, and prediction. But these algorithms lack their performance when a revoked user collude with cloud; therefore, it becomes essential to develop a secure data sharing framework with some enhanced cryptographic techniques. The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption. The technique ensures the privacy, integrity, and security of the data while retrieving through the cloud. The framework is implemented in the cloud sim with java language. Experimental results proved that proposed frame work attains reasonable results compared to traditional methods.

[1]  Hai Jin,et al.  Fine-grained and heterogeneous proxy re-encryption for secure cloud storage , 2014 .

[2]  Jie Wu,et al.  Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..

[3]  Zhen Liu,et al.  White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Robert H. Deng,et al.  Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings , 2010, Inf. Sci..

[5]  Wen-Guey Tzeng,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  Javier López,et al.  On the application of generic CCA-secure transformations to proxy re-encryption , 2016, Secur. Commun. Networks.

[7]  Sanjay Kumar Madria,et al.  A secure data sharing and query processing framework via federation of cloud computing , 2015, Inf. Syst..

[8]  Namje Park,et al.  Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment , 2011 .

[9]  Laid Kahloul,et al.  Network security: distributed intrusion detection system using mobile agent technology , 2016 .

[10]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[11]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[12]  Pil Joong Lee,et al.  Comments on “Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption” , 2013, IEEE Transactions on Information Theory.

[13]  Kefei Chen,et al.  Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing , 2014 .

[14]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[15]  Wen-Guey Tzeng,et al.  Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.

[16]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[17]  V VasilakosAthanasios,et al.  Security in cloud computing , 2015 .

[18]  Wenhong Wei,et al.  A DDOS defence scheme based on two-stage traffic flow control , 2014, Int. J. Commun. Networks Distributed Syst..

[19]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[20]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Hui Li,et al.  Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.

[22]  Kire Jakimoski Security Techniques for Data Protection in Cloud Computing , 2016 .

[23]  N. Jeyanthi,et al.  Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP , 2013, Int. J. Commun. Networks Distributed Syst..

[24]  Yonggang Wen,et al.  Towards end-to-end secure content storage and delivery with public cloud , 2012, CODASPY '12.

[25]  Yanjiang Yang,et al.  A Generic Scheme for Secure Data Sharing in Cloud , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[26]  Joseph K. Liu,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..

[27]  DongHai,et al.  Cloud service selection , 2014 .

[28]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[29]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[30]  Kim-Kwang Raymond Choo,et al.  Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.

[31]  Nishant Doshi,et al.  Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption , 2014, Secur. Commun. Networks.

[32]  Bernd Zwattendorfer,et al.  CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[33]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[34]  Eric Pardede,et al.  A new model to ensure security in cloud computing services , 2012, J. Serv. Sci. Res..

[35]  Nader Mbarek,et al.  A new proposed cloud computing based architecture for space ground data systems , 2018, Int. J. Commun. Networks Distributed Syst..

[36]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[37]  Jin Li,et al.  Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.

[38]  Elizabeth Chang,et al.  Cloud service selection: State-of-the-art and future research directions , 2014, J. Netw. Comput. Appl..

[39]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[40]  Xiaohua Jia,et al.  Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.

[41]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[42]  Yang Lu,et al.  A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds , 2016, Future Gener. Comput. Syst..

[43]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[44]  Okba Kazar,et al.  SaaS-DCS: software-as-a-service discovery and composition system-based existence degree , 2015, Int. J. Commun. Networks Distributed Syst..

[45]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[46]  Stephen S. Yau,et al.  Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.

[47]  Sunilkumar S. Manvi,et al.  Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..

[48]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[49]  Samiran Chattopadhyay,et al.  A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata , 2017 .

[50]  Sanjay Kumar,et al.  Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN , 2016, Int. J. Commun. Networks Distributed Syst..

[51]  Feng-Hao Liu,et al.  Various Proxy Re-Encryption Schemes from Lattices , 2016, IACR Cryptol. ePrint Arch..

[52]  Chris Peikert,et al.  Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..

[53]  Benoît Libert,et al.  Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.

[54]  Sudip Misra,et al.  Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.

[55]  Sugata Sanyal,et al.  A framework for phishing attack identification using rough set and formal concept analysis , 2017, Int. J. Commun. Networks Distributed Syst..

[56]  Piotr K. Tysowski,et al.  Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds , 2013, IEEE Transactions on Cloud Computing.

[57]  Fuchun Guo,et al.  CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.

[58]  S. L. Aarthy,et al.  Scalable and efficient attribute based encryption scheme for point to multi-point communication in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[59]  Jie Wu,et al.  Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..