Skip to main content

Non-deterministic Paillier Endorsement Asymmetric Key Cryptosystem-Based Whirlpool Hashing Quotient Filter for Secured Data Access on Cloud Storage

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 159))

Abstract

A non-deterministic Paillier endorsement asymmetric key cryptosystem-based Whirlpool hashing quotient filter (NPEAKC-WHQF) model is proposed with aim of securing cloud storage and data access with lower space complexity. Initially, the user registers his/her detail to cloud server (CS). After registering, the CS generates endorsement public key and private key. Then, cloud user (CU) encrypts data with their endorsement public key and sends to CS. CS stores ciphertext of data in Whirlpool hashing quotient filter (WHQF) with minimal memory space. During data access, CU sends request message. After receiving the request, CS checks endorsement public key of CU and allows only authorized user to access data. After verifying endorsement public key, user decrypts data with their endorsement private key. This helps for NPEAKC-WHQF model to improve data access security. NPEAKC-WHQF model conducts an experiment using factors, namely space complexity, data confidentiality rate, and authentication accuracy with respect to diverse number of user and data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, W.-M., Li, X.-L., Wen, Q.-Y., Zhang, S., Zhang, H.: Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. J. Comput. Sci. Technol. 32(5), 974–990 (2017). Springer

    Article  MathSciNet  Google Scholar 

  2. Wu, X.L., Jiang, R., Bhargava, B.: On the security of data access control for multi-authority cloud storage systems. IEEE Trans. Serv. Comput. 10(2), 258–272 (2017)

    Article  Google Scholar 

  3. Zhou, L., Varadharajan, V., Hitchens, M.: Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans. Inf. Forensics Secur. 10(11) (2015)

    Article  Google Scholar 

  4. Liu, H., Li, X., Mengfan, X., Mo, R., Ma, J.: A fair data access control towards rational users in cloud storage. Inf. Sci. 418–419, 258–271 (2017)

    Article  Google Scholar 

  5. Kim, J., Nepal, S.: A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage. Data Sci. Eng. 1(3), 149–160 (2016)

    Article  Google Scholar 

  6. Hong, J., Xue, K., Li, W.: DAC-MACS: effective data access control for multiauthority cloud storage systems/Security analysis of attribute revocation in multiauthority data access control for cloud storage systems. IEEE Trans. Inf. Forensics Secur. 10(6), 1315–1317 (2015)

    Article  Google Scholar 

  7. Zhou, Y., Dan Feng, Y., Xi, W., Min, F., Huang, F., Zhang, Y.: A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Future Gener. Comput. Syst. 84, 177–189 (2018). Elsevier

    Article  Google Scholar 

  8. Tameem, E., Cho, G.: Providing privacy and access control in cloud storage services using a KPABE system with secret attributes. Arab. J. Sci. Eng. 39(11), 7877–7884 (2014)

    Article  Google Scholar 

  9. Xue, K., Chen, W., Li, W., Hong, J., Hong, P.: Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans. Inf. Forensics Secur. 13(8), 2062–2074 (2018)

    Article  Google Scholar 

  10. Kaaniche, N., Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)

    Article  Google Scholar 

  11. Ren, S.Q., Tan, B.H.M., Sundaram, S., Wang, T., Ng, Y., Victor, C., Aung, K.M.M.: Secure searching on cloud storage enhanced by homomorphic indexing. Future Gener. Comput. Syst. 65, 102–110 (2016)

    Article  Google Scholar 

  12. Huang, Q., Yang, Y., Shen, M.: Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener. Comput. Syst. 72, 239–249 (2017). Elsevier

    Article  Google Scholar 

  13. Salam, M.I., Yau, W.-C., Chin, J.-J., Heng, S.-H., Ling, H.C., Phan, R.C.-W., Poh, G.S., Tan, S.-Y., Yap, W.-S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum.-Centric Comput. Inf. Sci. 5(19), 1–16 (2015)

    Google Scholar 

  14. Helil, N., Rahman, K.: CP-ABE access control scheme for sensitive data set constraint with hidden access policy and constraint policy. Secur. Commun. Netw. 2017, Article ID 2713595, 1–13 (2017)

    Google Scholar 

  15. Chattaraj, D., Sarma, M., Das, A.K.: A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput. Netw. 131, 144–164 (2018)

    Article  Google Scholar 

  16. Qian, X., Tan, C., Fan, Z., Zhu, W., Xiao, Ya., Cheng, F.: Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6, 34051–34074 (2018)

    Article  Google Scholar 

  17. Ahuja, R., Kumar, S., Mohanty, K.S.: A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57, 241–256 (2017)

    Article  Google Scholar 

  18. Dong, J., Zhu, H., Song, C., Li, Q., Xiao, R.: Task-oriented multilevel cooperative access control scheme for environment with virtualization and IoT. Wirel. Commun. Mob. Comput. 2018, Article ID 5938152, 1–11 (2018)

    Google Scholar 

  19. Sharma, G., Kalra, S.: Identity-based secure authentication scheme based on quantum key distribution for cloud computing. In: Peer-to-Peer Networking and Applications, pp. 1–15. Springer (2016)

    Google Scholar 

  20. Singla, S., Singh, J.: Cloud data security using authentication and encryption technique. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(7), 2232–2235 (2013)

    Google Scholar 

  21. Amazon Access Samples Dataset: https://archive.ics.uci.edu/ml/datasets/Amazon+Access+Samples

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Jayasree .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jayasree, P., Saravanan, V. (2020). Non-deterministic Paillier Endorsement Asymmetric Key Cryptosystem-Based Whirlpool Hashing Quotient Filter for Secured Data Access on Cloud Storage. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_13

Download citation

Publish with us

Policies and ethics