Matrix-Based Data Security in Cloud Computing Using Advanced Cramer–Shoup Cryptosystem
Cloud computing allows users to store data in a distributed cloud storage. So the data are stored in different geographical locations which will predominantly increase the vulnerability of the data. The natural way to safeguard the data from the intruders is to encrypt the data before storing in the cloud. This paper proposes an Advanced Cramer–Shoup Cryptosystem to resolve the security threats in cloud environment. The proposed encryption method withstands well against the adaptive chosen cipher text attack (CCA2). While considering high velocity, encryption method has to work as fast as possible to improve the efficiency. The proposed ACS Cryptosystem supports batch encryption and decryption to increase the efficiency and reduces the computation overhead. The experimental analysis for the proposed method is carried out and observed that the proposed encryption technique improves the security of the data and results are compared with existing security algorithms.
KeywordsCloud security Advanced cramer–shoup cryptosystem Cloud encryption Data security
The work of this paper is financially supported by Science and Engineering Research Board (SERB), Department of Science and Technology, Government of India. The Grant number is ECR/2016/000546.
- 1.Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology, NIST Special publication, pp. 800–145 (2011)Google Scholar
- 5.Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology-CRYPTO ’84, pp. 10–18 (1985)Google Scholar
- 6.Miller, V.S.: Use of elliptic curves in cryptography. In: Advances in Cryptology CRYPTO ’85, pp. 418–426 (1986)Google Scholar
- 7.Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT, pp. 223–238. Springer (1999)Google Scholar
- 8.Mamvong, N.J., Aboiyar, T., Gbaden, T.: A hybrid cryptosystem using elgamal algorithm and matrix encryption. African J. Comput. ICT 8(3), 43–50 (2015)Google Scholar
- 9.Anitha, R., Mukherjee, S.: Metadata driven Efficient CRE based cipher key generation and distribution in cloud security. Int. J. Secur. Appl. 8(3), 377–392 (2014)Google Scholar
- 10.Chowdhury, N.: An efficient method of stenography using matrix approach. Int. J. Intell. Syst. Appl. 1, 32–38 (2012)Google Scholar
- 11.Anitha, R., Pratheepan, P., Yogesh, P., Mukherjee, S.: Data storage security in cloud using meta data. In: International Conference on Machine Learning and Computer Science, pp. 26–30 (2014)Google Scholar
- 13.Kaur, J., Duhan, M., Kumar, A., Yadav, R.K.: Matrix matching method for secret communication using image steganography. Int. J. Eng. 3, 45–49 (2013)Google Scholar