An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA


In this paper, we propose an enhanced security framework for securing the cloud users data in the cloud environment. This new security framework consists of access control methodology, encryption/decryption technique and digital signature algorithms. Here, a new Elliptic Curve Cryptography based key generation algorithm is proposed for generating highly secured keys. Moreover, a new Identity based Elliptic curve Access Control mechanism (Id-EAC) is also proposed in this paper for restricting the cloud user’s data accessibility over the different kind of data. In addition, a new binary value based two phase encryption and decryption algorithm that referred the elliptic curve cryptographic based key values is introduced to secure the cloud user’s data in the cloud environment. Finally, a new modulo function based Lightweight Digital Signature Algorithm is also proposed to ensure the data integrity in this proposed security framework. This security framework is provided the high data security, accessibility and integrity for the user data. The experimental results show that the efficiency of the proposed algorithms in this security framework is proved as better than other existing algorithms in terms of security and performance.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4


  1. 1.

    Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1996). A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering,8(1), 67–80.

    Article  Google Scholar 

  2. 2.

    Naor, M., & Wool, A. (1998). Access control and signatures via quorum secret sharing. IEEE Transactions on Parallel and Distributed Systems,9(9), 909–922.

    Article  Google Scholar 

  3. 3.

    Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE Transactions on Computers,66(5), 891–904.

    MathSciNet  Article  Google Scholar 

  4. 4.

    Qijun, G., Liu, P., Lee, W.-C., & Chu, C.-H. (2009). KTR: An efficient key management scheme for secure data access control in wireless broadcast services. IEEE Transactions on Dependable and Secure Computing,6(3), 188–201.

    Article  Google Scholar 

  5. 5.

    Wan, Zhiguo, Liu, J., Zhang, R., & Deng, R. H. (2013). A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Transactions on Multimedia,15(6), 1353–1364.

    Article  Google Scholar 

  6. 6.

    Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security,11(3), 484–497.

    Article  Google Scholar 

  7. 7.

    Ye, X. (2016). Privacy preserving and delegated access control for cloud applications. Tsinghua Science and Technology,21(1), 40–54.

    Article  Google Scholar 

  8. 8.

    Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., et al. (2016). Hierarchical and shared access control. IEEE Transactions on Information Forensics and Security,11(4), 850–865.

    Google Scholar 

  9. 9.

    Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT based applications. Computer Networks,151, 181–190.

    Article  Google Scholar 

  10. 10.

    Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018). Optimal and energy efficient scheduling techniques for resource management in public cloud networks. National Academy Science Letters,41(4), 219–223.

    MathSciNet  Article  Google Scholar 

  11. 11.

    Kavin, B. P., Ganapathy, S., & Karman, A. (2018). An intelligent task scheduling approach for cloud using IPSO and A* search algorithm. In 2018 eleventh international conference on contemporary computing (IC3) (pp. 1–5).

  12. 12.

    Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., & Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using map reduce techniques on cloud. International Journal of Communication Networks and Distributed Systems,20(4), 519–531.

    Article  Google Scholar 

  13. 13.

    Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems,9(Sp-14), 2764–2777.

    Google Scholar 

  14. 14.

    Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2015). Secured temporal log management techniques for cloud. Procedia Computer Science,46, 589–595.

    Article  Google Scholar 

  15. 15.

    Muthurajkumar, S., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2015). Agent based intelligent approach for the malware detection for infected cloud data storage files. In 2015 seventh international conference on advanced computing (ICoAC) (pp. 1–5).

  16. 16.

    Li, B., Huang, D., Wang, Z., & Zhu, Y. (2018). Attribute-based access control for ICN naming scheme. IEEE Transactions on Dependable and Secure Computing,15(2), 194–206.

    Article  Google Scholar 

  17. 17.

    Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal,16(13), 5389–5396.

    Article  Google Scholar 

  18. 18.

    Khan, F., Li, H., & Zhang, L. (2016). Owner specified excessive access control for attribute based encryption. IEEE Access,6, 8967–8976.

    Article  Google Scholar 

  19. 19.

    Niu, X. (2017). Fine-grained access control scheme based on cloud storage. In 2017 international conference on computer network, electronic and automation (pp. 512–515).

  20. 20.

    Seol, K., Kim, Y.-G., Lee, E., Seo, Y.-D., & Baik, D.-K. (2018). Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access,6, 9114–9128.

    Article  Google Scholar 

  21. 21.

    Ding, S., Li, C., & Li, H. (2018). A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access,6, 27336–27345.

    Article  Google Scholar 

  22. 22.

    Chen, Y.-H., & Huang, P.-C. (2018). Collaborative access control of cloud storage systems. IEEE International Conference on Applied System Innovation,2018, 1063–1064.

    Google Scholar 

  23. 23.

    Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access,6, 38437–38450.

    Article  Google Scholar 

  24. 24.

    Sakthidasan, K., Vasudevan, N., Prakash, V. R., & Kumara Guru Diderot, P. (2019). Access control based efficient hybrid security mechanisms for cloud storage. In International conference on communication and signal processing (pp. 0564–0567).

  25. 25.

    Sukmana, M. I. H., Torkura, K. A., Graupner, H., Cheng, F., & Meinel, C. (2019). Unified cloud access control model for cloud storage broker. In International conference on information networking (ICOIN 2019) (pp. 60–65).

  26. 26.

    Bin, S., & Haopu, Y. (2019). Research of fine grit access control based on time in cloud computing. In 3rd information technology, networking, electronic and automation control conference (ITNEC 2019) (pp. 1897–1902).

  27. 27.

    Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access,7, 86384–86393.

    Article  Google Scholar 

  28. 28.

    Teng, W., Yang, G., Xiang, Y., Zhang, T., & Wang, D. (2017). Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Transactions on Cloud Computing,5(4), 617–627.

    Article  Google Scholar 

  29. 29.

    Lin, S., Zhang, R., Ma, H., & Wang, M. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security,10(10), 2119–2130.

    Article  Google Scholar 

  30. 30.

    Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers,65(6), 1992–2004.

    MathSciNet  Article  Google Scholar 

  31. 31.

    Chatterjee, A., & Sengupta, I. (2018). Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Transactions on Cloud Computing,6(1), 287–300.

    Article  Google Scholar 

  32. 32.

    Li, J., Lin, X., Zhang, Y., & Han, J. (2017). KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing,10(5), 715–725.

    Article  Google Scholar 

  33. 33.

    Wei, J., Liu, W., & Xuexian, H. (2018). Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing,6(4), 1136–1148.

    Article  Google Scholar 

  34. 34.

    Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access,5, 1510–1523.

    Article  Google Scholar 

  35. 35.

    Li, Z., Li, W., Jin, Z., Zhang, H., & Wen, Q. (2019). An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access,7, 29023–29037.

    Article  Google Scholar 

  36. 36.

    Fu, J., & Wang, N. (2019). A practical attribute-based document collection hierarchical encryption scheme in cloud computing. IEEE Access,7, 36218–36232.

    Article  Google Scholar 

  37. 37.

    Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems,18, 80–89.

    Google Scholar 

  38. 38.

    Yan, Y., Lei, W., Gao, G., Wang, H., & Wenyu, X. (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. Journal of Information Security and Applications,39, 10–18.

    Article  Google Scholar 

  39. 39.

    Daniel, R. M., Rajsingh, E. B., & Silas, S. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University—Computer and Information Sciences. (in press).

  40. 40.

    Ferretti, L., Marchetti, M., Andreolini, M., & Colajanni, M. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases. Information Sciences,422, 497–515.

    MathSciNet  Article  Google Scholar 

  41. 41.

    Hyunok, O., Kim, J., & Shin, J. S. (2018). Forward-secure ID based digital signature scheme with forward-secure private key generator. Information Sciences,454–455, 96–109.

    MathSciNet  Google Scholar 

  42. 42.

    Zhang, X., Zhao, J., Mua, L., Tang, Y., & Xu, C. (2019). Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive and Mobile Computing,56, 18–28.

    Article  Google Scholar 

  43. 43.

    Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems,96, 376–385.

    Article  Google Scholar 

  44. 44.

    Stallings, W. (2006). Cryptography and network security principles and practices (4th ed.). London: Pearson Education.

    Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Balasubramanian Prabhu Kavin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Prabhu Kavin, B., Ganapathy, S., Kanimozhi, U. et al. An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA. Wireless Pers Commun (2020).

Download citation


  • Cloud computing
  • Elliptic curve cryptography
  • Access control
  • Digital signature
  • Modulo function
  • Binary function
  • Encryption
  • Decryption