Advertisement

Matrix-Based Data Security in Cloud Computing Using Advanced Cramer–Shoup Cryptosystem

  • Y. Mohamed SirajudeenEmail author
  • R. Anitha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 755)

Abstract

Cloud computing allows users to store data in a distributed cloud storage. So the data are stored in different geographical locations which will predominantly increase the vulnerability of the data. The natural way to safeguard the data from the intruders is to encrypt the data before storing in the cloud. This paper proposes an Advanced Cramer–Shoup Cryptosystem to resolve the security threats in cloud environment. The proposed encryption method withstands well against the adaptive chosen cipher text attack (CCA2). While considering high velocity, encryption method has to work as fast as possible to improve the efficiency. The proposed ACS Cryptosystem supports batch encryption and decryption to increase the efficiency and reduces the computation overhead. The experimental analysis for the proposed method is carried out and observed that the proposed encryption technique improves the security of the data and results are compared with existing security algorithms.

Keywords

Cloud security Advanced cramer–shoup cryptosystem Cloud encryption Data security 

Notes

Acknowledgements

The work of this paper is financially supported by Science and Engineering Research Board (SERB), Department of Science and Technology, Government of India. The Grant number is ECR/2016/000546.

References

  1. 1.
    Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology, NIST Special publication, pp. 800–145 (2011)Google Scholar
  2. 2.
    Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen cipher text attack. Int. Cryptol. Conf. 1462, 13–25 (1998)zbMATHGoogle Scholar
  3. 3.
    Diffie, W., Hellman, E.: New direction in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1976)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology-CRYPTO ’84, pp. 10–18 (1985)Google Scholar
  6. 6.
    Miller, V.S.: Use of elliptic curves in cryptography. In: Advances in Cryptology CRYPTO ’85, pp. 418–426 (1986)Google Scholar
  7. 7.
    Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT, pp. 223–238. Springer (1999)Google Scholar
  8. 8.
    Mamvong, N.J., Aboiyar, T., Gbaden, T.: A hybrid cryptosystem using elgamal algorithm and matrix encryption. African J. Comput. ICT 8(3), 43–50 (2015)Google Scholar
  9. 9.
    Anitha, R., Mukherjee, S.: Metadata driven Efficient CRE based cipher key generation and distribution in cloud security. Int. J. Secur. Appl. 8(3), 377–392 (2014)Google Scholar
  10. 10.
    Chowdhury, N.: An efficient method of stenography using matrix approach. Int. J. Intell. Syst. Appl. 1, 32–38 (2012)Google Scholar
  11. 11.
    Anitha, R., Pratheepan, P., Yogesh, P., Mukherjee, S.: Data storage security in cloud using meta data. In: International Conference on Machine Learning and Computer Science, pp. 26–30 (2014)Google Scholar
  12. 12.
    Libert, B., Yung, M.: Adaptively secure non-interactive threshold cryptosystem. Theor. Comput. Sci. 478, 76–100 (2013)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Kaur, J., Duhan, M., Kumar, A., Yadav, R.K.: Matrix matching method for secret communication using image steganography. Int. J. Eng. 3, 45–49 (2013)Google Scholar
  14. 14.
    Zhang, S., Li, X., Wang, B.: Study on the protection method of data privacy based on cloud storage. Int. J. Inf. Comput. Sci. 1(2), 46–51 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.DST-SERB Cloud Research LabSri Venkateswara College of EngineeringSriperumbudurIndia

Personalised recommendations