Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile

Abstract

Cloud computing becomes more sophisticated to provide different services at different levels of user access. Even though various services are accessed at a different level, the security of data being accessed is a highly challenging one. However, there is a number of encryption approaches discussed toward the problem of cloud security; they suffer to achieve higher security as required. The previous ABFD (attribute-based flexible delegation) algorithm uses a set of policies in encrypting the data with specific keys mentioned in the policy. However, the leakage of encryption policy would introduce poor security which can be overcome by adopting multitype encryption standards in different time windows. According to this, an efficient time-variant attribute-based multitype encryption algorithm (TAM) is presented in this paper. The TAM algorithm maintains a taxonomy of attributes and related keys to be used for encryption and decryption. The corresponding keys have been used to generate the ciphertext. The content of taxonomy has been dynamically changing in each time window which makes the difference in integrity management and security performance than previous algorithms. The TAM approach introduces a higher security performance up to 89.6%. The method also reduces the time complexity up to 21 s and increases the throughput performance up to 96%.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

References

  1. 1.

    Paladi N, Gehrmann C, Michalas A (2017) Providing user security guarantees in public infrastructure clouds. In: IEEE Transaction on Cloud Computing, vol 5(3)

  2. 2.

    Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the Conference on Hot Topics Cloud Computer

  3. 3.

    Schiffman J, Moyer T, Vijayakumar H, Jaeger T, McDaniel P 2010 Seeding clouds with trust anchors. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp 43–46

  4. 4.

    Paladi N, Michalas A, Gehrmann C (2014) Domain-based storage protection with secure access control for the cloud. In: Proceedings of the International Workshop on Cloud Computing Security, pp 35–42

  5. 5.

    Liao J, Trahay F, Xiao G (2017) Performing initiative data prefetching in distributed file systems for cloud computing. IEEE Trans Cloud Comput 5(3):550–562

    Article  Google Scholar 

  6. 6.

    Sehgal P, Tarasov V, Zadok E (2010) Evaluating performance and energy in file system server workloads. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, pp 253–266

  7. 7.

    Tarasov V, Bhanage S, Zadok E (2011) Benchmarking file system benchmarking: It* is* rocket science. In: Proceedings of the 13th Workshop Hot Topics Operating Systems, pp 1–5

  8. 8.

    Liao J, Ishikawa Y (2012) Partial replication of metadata to achieve high metadata availability in parallel file systems. Proceedings of the 41st International Conference on Parallel Processing, pp 168–177

  9. 9.

    Noble RB, Haile Y (2010) Distributing private data in challenging network environments. In: Proceedings of the 19th International Conference on World Wide Web, pp 801–810

  10. 10.

    Jiang S, Ding X, Xu Y, Davis K (2013) A prefetching scheme exploiting both data layout and access history on disk. ACM Trans Storage 9(3):23

    Article  Google Scholar 

  11. 11.

    He J, Bent J, Torres A (2013) I/O acceleration with pattern detection. In: Proceedings of the 22nd International ACM Symposium on High-Performance Parallel and Distributed Computing, pp 26–35

  12. 12.

    Al Assaf M, Jiang X, Abid M, Qin X (2013) Eco-storage: a hybrid storage system with energy-efficient informed prefetching. J Signal Process Syst 72(3):165–180

    Article  Google Scholar 

  13. 13.

    Song H, Yin Y, Sun X, Thakur R, Lang S (2011) Server-side I/O coordination for parallel file systems. In: Proceedings of the International Conference on High-Performance Computing, Networking, Storage, and Analysis, pp 1–11

  14. 14.

    Obaidat MS (2014) QoS-guaranteed bandwidth shifting and redistribution in a mobile cloud environment. IEEE Trans Cloud Comput 2(2):181–193

    Article  Google Scholar 

  15. 15.

    Bertholon B, Varrette S, Bouvry P (2011) Certicloud: a novel TPM-based approach to ensure cloud IaaS security. In: Proceedings of the IEEE International Conference on Cloud Computing, pp 121–130

  16. 16.

    Wang W, Li Z, Owens R, Bhargava B (2009) Secure and efficient access to outsourced data. In: Proceedings of the ACM Cloud Computing Security Workshop, pp 55–66

  17. 17.

    Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. IEEE Comput 45(1):39–45

    Article  Google Scholar 

  18. 18.

    Graf S, Lang P, Hohenadel SA, Waldvogel M (2012) Versatile key management for secure cloud storage. In: Proceedings of the IEEE 31st Symposium Reliable Distribution Systems, pp 469–474

  19. 19.

    Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: Financial Cryptography and Data Security, Springer, New York, NY, USA. pp 258–274

  20. 20.

    Paladi N, Gehrmann C, Morenius F (2013) Domain-based storage protection (DBSP) in public infrastructure clouds. In: Proceedings of the Secure IT Systems, pp 279–296

  21. 21.

    Michalas A, Komninos N, Prasad N, Oleshchuk V (2010) New client puzzle approach for DoS resistance in ad hoc networks. In: IEEE International Conference on Information Theory Information Security, Dec 2010 pp 568–573

  22. 22.

    Blanchet B (2001) An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings. 14th IEEE Computer Security Foundations Workshop

  23. 23.

    Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval in multiple clouds. IEEE Trans Cloud Comput 5(3):499–509

    Article  Google Scholar 

  24. 24.

    Ma X, Yang LT, Xiang Y, Zeng WK, Zou D, Jin H (2017) Fully reversible privacy region protection for cloud video surveillance. IEEE Trans Cloud Comput 5(3):510–522

    Article  Google Scholar 

  25. 25.

    Ahuja R, Mohanty SK (2017) A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2017.2751471

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to S. Kumaresan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Kumaresan, S., Shanmugam, V. Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile. J Supercomput 76, 6094–6112 (2020). https://doi.org/10.1007/s11227-019-03118-8

Download citation

Keywords

  • Cloud security
  • Data security
  • Encryption
  • TAM
  • Encryption standards
  • User profile
  • Taxonomy