Ensure Hierarchal Identity Based Data Security in Cloud Environment

Cloud computing has emerged as a new promising field in the internet. It can be thought as a newarchitectureforthenextgenerationofITenterprises.Itallowstheusertoaccessvirtualized resourcesovertheinternetwhichcanbedynamicallyscaled.Here,theowner’sdataisstoredata distributeddatacentre,whichareresponsibleforitssecurityconstraintssuchasaccesscontroland datatransmissiontouser.Astheownerdoesnothavephysicalaccessontheirowndata,thedata centresarenottrustworthy,thisresultedintheclouddatasecuritydemand.Today,manycloudservice providers(CSPs)areusingtheasymmetricandpublickeycryptography(PKG)forauthenticating anddatasecuritypurposesusingthedigitalidentityoftheuser.Tothisend,thisarticlefocuseson clouddatastorageanditsdeliverytoauthorizeduser.Forthispurpose,ahierarchalidentity-based cryptographymethodisusedfordatasecurityandcheckingthedataintegrity,inordertomakesure thatthereisnoalterationormodificationdonebyamaliciousattackerorCSPforitsownbenefit. KEywoRDS Cloud Computing, Confidentiality, Decryption, Encryption, Hierarchal Structure, ID Based Cryptography (IBC), Satisfaction, Security, Signature, Trust, Verification

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Masao Kasahara,et al.  ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..

[3]  B. B. Gupta,et al.  Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment , 2013, ArXiv.

[4]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[5]  Giuseppe Ateniese,et al.  Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.

[6]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  Liqun Chen,et al.  An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction , 2006, IACR Cryptol. ePrint Arch..

[9]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[10]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[11]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[12]  Dan Boneh,et al.  Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.

[13]  Dharma P. Agrawal,et al.  Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing , 2017, Multimedia Tools and Applications.

[14]  Preeti Garg,et al.  A Survey on Mobile Cloud Computing , 2012 .

[15]  Bernd Freisleben,et al.  An identity-based security infrastructure for Cloud environments , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[16]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[17]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[18]  Gregory Levitin,et al.  Reliability and performance of tree-structured grid services , 2006, IEEE Transactions on Reliability.

[19]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[20]  Brij Bhooshan Gupta,et al.  Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network , 2018, Future Gener. Comput. Syst..

[21]  Tao Li,et al.  Socially-conforming cooperative computation in cloud networks , 2017, J. Parallel Distributed Comput..