In this paper, we propose an enhanced security framework for securing the cloud users data in the cloud environment. This new security framework consists of access control methodology, encryption/decryption technique and digital signature algorithms. Here, a new Elliptic Curve Cryptography based key generation algorithm is proposed for generating highly secured keys. Moreover, a new Identity based Elliptic curve Access Control mechanism (Id-EAC) is also proposed in this paper for restricting the cloud user’s data accessibility over the different kind of data. In addition, a new binary value based two phase encryption and decryption algorithm that referred the elliptic curve cryptographic based key values is introduced to secure the cloud user’s data in the cloud environment. Finally, a new modulo function based Lightweight Digital Signature Algorithm is also proposed to ensure the data integrity in this proposed security framework. This security framework is provided the high data security, accessibility and integrity for the user data. The experimental results show that the efficiency of the proposed algorithms in this security framework is proved as better than other existing algorithms in terms of security and performance.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1996). A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering,8(1), 67–80.
Naor, M., & Wool, A. (1998). Access control and signatures via quorum secret sharing. IEEE Transactions on Parallel and Distributed Systems,9(9), 909–922.
Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE Transactions on Computers,66(5), 891–904.
Qijun, G., Liu, P., Lee, W.-C., & Chu, C.-H. (2009). KTR: An efficient key management scheme for secure data access control in wireless broadcast services. IEEE Transactions on Dependable and Secure Computing,6(3), 188–201.
Wan, Zhiguo, Liu, J., Zhang, R., & Deng, R. H. (2013). A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Transactions on Multimedia,15(6), 1353–1364.
Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security,11(3), 484–497.
Ye, X. (2016). Privacy preserving and delegated access control for cloud applications. Tsinghua Science and Technology,21(1), 40–54.
Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., et al. (2016). Hierarchical and shared access control. IEEE Transactions on Information Forensics and Security,11(4), 850–865.
Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT based applications. Computer Networks,151, 181–190.
Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018). Optimal and energy efficient scheduling techniques for resource management in public cloud networks. National Academy Science Letters,41(4), 219–223.
Kavin, B. P., Ganapathy, S., & Karman, A. (2018). An intelligent task scheduling approach for cloud using IPSO and A* search algorithm. In 2018 eleventh international conference on contemporary computing (IC3) (pp. 1–5).
Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., & Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using map reduce techniques on cloud. International Journal of Communication Networks and Distributed Systems,20(4), 519–531.
Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems,9(Sp-14), 2764–2777.
Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2015). Secured temporal log management techniques for cloud. Procedia Computer Science,46, 589–595.
Muthurajkumar, S., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2015). Agent based intelligent approach for the malware detection for infected cloud data storage files. In 2015 seventh international conference on advanced computing (ICoAC) (pp. 1–5).
Li, B., Huang, D., Wang, Z., & Zhu, Y. (2018). Attribute-based access control for ICN naming scheme. IEEE Transactions on Dependable and Secure Computing,15(2), 194–206.
Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal,16(13), 5389–5396.
Khan, F., Li, H., & Zhang, L. (2016). Owner specified excessive access control for attribute based encryption. IEEE Access,6, 8967–8976.
Niu, X. (2017). Fine-grained access control scheme based on cloud storage. In 2017 international conference on computer network, electronic and automation (pp. 512–515).
Seol, K., Kim, Y.-G., Lee, E., Seo, Y.-D., & Baik, D.-K. (2018). Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access,6, 9114–9128.
Ding, S., Li, C., & Li, H. (2018). A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access,6, 27336–27345.
Chen, Y.-H., & Huang, P.-C. (2018). Collaborative access control of cloud storage systems. IEEE International Conference on Applied System Innovation,2018, 1063–1064.
Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access,6, 38437–38450.
Sakthidasan, K., Vasudevan, N., Prakash, V. R., & Kumara Guru Diderot, P. (2019). Access control based efficient hybrid security mechanisms for cloud storage. In International conference on communication and signal processing (pp. 0564–0567).
Sukmana, M. I. H., Torkura, K. A., Graupner, H., Cheng, F., & Meinel, C. (2019). Unified cloud access control model for cloud storage broker. In International conference on information networking (ICOIN 2019) (pp. 60–65).
Bin, S., & Haopu, Y. (2019). Research of fine grit access control based on time in cloud computing. In 3rd information technology, networking, electronic and automation control conference (ITNEC 2019) (pp. 1897–1902).
Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access,7, 86384–86393.
Teng, W., Yang, G., Xiang, Y., Zhang, T., & Wang, D. (2017). Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Transactions on Cloud Computing,5(4), 617–627.
Lin, S., Zhang, R., Ma, H., & Wang, M. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security,10(10), 2119–2130.
Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers,65(6), 1992–2004.
Chatterjee, A., & Sengupta, I. (2018). Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Transactions on Cloud Computing,6(1), 287–300.
Li, J., Lin, X., Zhang, Y., & Han, J. (2017). KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing,10(5), 715–725.
Wei, J., Liu, W., & Xuexian, H. (2018). Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing,6(4), 1136–1148.
Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access,5, 1510–1523.
Li, Z., Li, W., Jin, Z., Zhang, H., & Wen, Q. (2019). An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access,7, 29023–29037.
Fu, J., & Wang, N. (2019). A practical attribute-based document collection hierarchical encryption scheme in cloud computing. IEEE Access,7, 36218–36232.
Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems,18, 80–89.
Yan, Y., Lei, W., Gao, G., Wang, H., & Wenyu, X. (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. Journal of Information Security and Applications,39, 10–18.
Daniel, R. M., Rajsingh, E. B., & Silas, S. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University—Computer and Information Sciences. (in press).
Ferretti, L., Marchetti, M., Andreolini, M., & Colajanni, M. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases. Information Sciences,422, 497–515.
Hyunok, O., Kim, J., & Shin, J. S. (2018). Forward-secure ID based digital signature scheme with forward-secure private key generator. Information Sciences,454–455, 96–109.
Zhang, X., Zhao, J., Mua, L., Tang, Y., & Xu, C. (2019). Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive and Mobile Computing,56, 18–28.
Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems,96, 376–385.
Stallings, W. (2006). Cryptography and network security principles and practices (4th ed.). London: Pearson Education.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Prabhu Kavin, B., Ganapathy, S., Kanimozhi, U. et al. An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA. Wireless Pers Commun (2020). https://doi.org/10.1007/s11277-020-07613-7
- Cloud computing
- Elliptic curve cryptography
- Access control
- Digital signature
- Modulo function
- Binary function