Abstract
A non-deterministic Paillier endorsement asymmetric key cryptosystem-based Whirlpool hashing quotient filter (NPEAKC-WHQF) model is proposed with aim of securing cloud storage and data access with lower space complexity. Initially, the user registers his/her detail to cloud server (CS). After registering, the CS generates endorsement public key and private key. Then, cloud user (CU) encrypts data with their endorsement public key and sends to CS. CS stores ciphertext of data in Whirlpool hashing quotient filter (WHQF) with minimal memory space. During data access, CU sends request message. After receiving the request, CS checks endorsement public key of CU and allows only authorized user to access data. After verifying endorsement public key, user decrypts data with their endorsement private key. This helps for NPEAKC-WHQF model to improve data access security. NPEAKC-WHQF model conducts an experiment using factors, namely space complexity, data confidentiality rate, and authentication accuracy with respect to diverse number of user and data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, W.-M., Li, X.-L., Wen, Q.-Y., Zhang, S., Zhang, H.: Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. J. Comput. Sci. Technol. 32(5), 974–990 (2017). Springer
Wu, X.L., Jiang, R., Bhargava, B.: On the security of data access control for multi-authority cloud storage systems. IEEE Trans. Serv. Comput. 10(2), 258–272 (2017)
Zhou, L., Varadharajan, V., Hitchens, M.: Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans. Inf. Forensics Secur. 10(11) (2015)
Liu, H., Li, X., Mengfan, X., Mo, R., Ma, J.: A fair data access control towards rational users in cloud storage. Inf. Sci. 418–419, 258–271 (2017)
Kim, J., Nepal, S.: A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage. Data Sci. Eng. 1(3), 149–160 (2016)
Hong, J., Xue, K., Li, W.: DAC-MACS: effective data access control for multiauthority cloud storage systems/Security analysis of attribute revocation in multiauthority data access control for cloud storage systems. IEEE Trans. Inf. Forensics Secur. 10(6), 1315–1317 (2015)
Zhou, Y., Dan Feng, Y., Xi, W., Min, F., Huang, F., Zhang, Y.: A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Future Gener. Comput. Syst. 84, 177–189 (2018). Elsevier
Tameem, E., Cho, G.: Providing privacy and access control in cloud storage services using a KPABE system with secret attributes. Arab. J. Sci. Eng. 39(11), 7877–7884 (2014)
Xue, K., Chen, W., Li, W., Hong, J., Hong, P.: Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans. Inf. Forensics Secur. 13(8), 2062–2074 (2018)
Kaaniche, N., Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)
Ren, S.Q., Tan, B.H.M., Sundaram, S., Wang, T., Ng, Y., Victor, C., Aung, K.M.M.: Secure searching on cloud storage enhanced by homomorphic indexing. Future Gener. Comput. Syst. 65, 102–110 (2016)
Huang, Q., Yang, Y., Shen, M.: Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener. Comput. Syst. 72, 239–249 (2017). Elsevier
Salam, M.I., Yau, W.-C., Chin, J.-J., Heng, S.-H., Ling, H.C., Phan, R.C.-W., Poh, G.S., Tan, S.-Y., Yap, W.-S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum.-Centric Comput. Inf. Sci. 5(19), 1–16 (2015)
Helil, N., Rahman, K.: CP-ABE access control scheme for sensitive data set constraint with hidden access policy and constraint policy. Secur. Commun. Netw. 2017, Article ID 2713595, 1–13 (2017)
Chattaraj, D., Sarma, M., Das, A.K.: A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput. Netw. 131, 144–164 (2018)
Qian, X., Tan, C., Fan, Z., Zhu, W., Xiao, Ya., Cheng, F.: Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6, 34051–34074 (2018)
Ahuja, R., Kumar, S., Mohanty, K.S.: A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57, 241–256 (2017)
Dong, J., Zhu, H., Song, C., Li, Q., Xiao, R.: Task-oriented multilevel cooperative access control scheme for environment with virtualization and IoT. Wirel. Commun. Mob. Comput. 2018, Article ID 5938152, 1–11 (2018)
Sharma, G., Kalra, S.: Identity-based secure authentication scheme based on quantum key distribution for cloud computing. In: Peer-to-Peer Networking and Applications, pp. 1–15. Springer (2016)
Singla, S., Singh, J.: Cloud data security using authentication and encryption technique. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(7), 2232–2235 (2013)
Amazon Access Samples Dataset: https://archive.ics.uci.edu/ml/datasets/Amazon+Access+Samples
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jayasree, P., Saravanan, V. (2020). Non-deterministic Paillier Endorsement Asymmetric Key Cryptosystem-Based Whirlpool Hashing Quotient Filter for Secured Data Access on Cloud Storage. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-9282-5_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9281-8
Online ISBN: 978-981-13-9282-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)