Metadata Attribute Based Cipher-Key Generation System in Cloud

  • R. Anitha
  • Saswati Mukherjee
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)


With rapid development of cloud computing, more and more IT industries outsources their sensitive data at cloud data storage location. To keep the stored data confidential against untrusted cloud service providers, a natural way is to store only the encrypted data and providing an efficient access control mechanism using a competent cipher key-Cmxn, which is becoming a promising cryptographic solution. In this proposed model the cipher key is generated based on attributes of metadata. The key problems of this approach includes, the generation of cipher key and establishing an access control mechanism for the encrypted data using cipher key where keys cannot be revoked without the involvement of data owner and the metadata data server (MDS), hence makes data owner feels comfortable about the data stored. From this study, we propose a novel Metadata Attribute Based Key Generation scheme for cloud data security system by exploiting the characteristic of the data stored. We have implemented a security model that incorporates our ideas and evaluated the performance and scalability of the secured model.


Cloud Security Cipher-key Data Storage Metadata 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cammert, G.M., Kramer, J., Seeger, B.: Dynamic Metadata Management for Scalable Stream Processing Systems. In: IEEE International Conference on Data Engineering Workshop, pp. 644–653 (2007)Google Scholar
  2. 2.
    Wu, J.-J., Liu, P., Chung, Y.-C.: Metadata Partitioning for Large-scale Distributed Storage Systems. In: IEEE International Conference on Cloud Computing (2010)Google Scholar
  3. 3.
    Verma, A., Venkataraman, S., Caesar, M., Campbell, R.: Efficient Metadata Management for Cloud Computing Applications. In: International Conference on Communication Software and Networks (2010)Google Scholar
  4. 4.
    Hua, Y., Yifeng, Jiang, H., Feng, D., Tian, L.: Supporting Scalable and Metadata Management in Ultra Large Scale File Systems. IEEE Transactions on Parellel and Distributed Systems 22(4) (2011)Google Scholar
  5. 5.
    Anitha, R., Mukherjee, S.: A Dynamic Semantic Metadata Model in Cloud Computing. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds.) ObCom 2011, Part II. CCIS, vol. 270, pp. 13–21. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  6. 6.
    Kuyoro, S.O.: Ibikunle.F and Awodele. O.: Cloud Computing Security Issues and Challenges. International Journal of Computer Networks 3(5), 247–255 (2011)Google Scholar
  7. 7.
    Mathew, A.: Survey Paper on Security & Privacy Issues in Cloud Storage Systems. In: Electrical Engineering Seminar and Special Problems 571B (2012)Google Scholar
  8. 8.
    Heurix, J., Karlinger, M., Neubauer, T.: Perimeter – Pseudonymization and Personal Metadata Encryption for Privacy-Preserving Searchable Documents. In: International Conference on Health Systems, vol. 1(1), pp. 46–57 (2012)Google Scholar
  9. 9.
    Ravi kumar, J., Revati, M.: Efficient Data Storage and Security in Cloud. Proc. International Journal of Emerging trends in Engineering and Development 6(2) (2012)Google Scholar
  10. 10.
    Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of Cloud computing. Journal of SuperComputers, 561–592 (2013)Google Scholar
  11. 11.
    Aguilera, M.K., Lillibridge, M., Maccormick: Block-Level Security for Network-attached disks. In: The 2nd Usenix Conference on File and Storage Technologies, pp. 159–174 (2003)Google Scholar
  12. 12.
    Anitha, R., Paramjothi, P., Yogesh, P., Mukherjee, S.: Data Storage Security in Cloud using Metadata. In: International Conference on Machine learning and Computer Science, pp. 35–39 (2013)Google Scholar
  13. 13.
    Anitha, R., Paramjothi, P., Mukherjee, S.: Security as a Service using Data Steganography in Cloud computing. In: International Conference on Cloud Security Management, pp.81–89 (2013)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • R. Anitha
    • 1
  • Saswati Mukherjee
    • 1
  1. 1.Department of Information Science and TechnologyAnna UniversityChennaiIndia

Personalised recommendations