Abstract
Managing and using industrial Big Data is a big challenge for every industrial enterprise manager. By using the cloud technology, enterprises can handover the task of heavy data management to reliable hands and focus on their main business. Though cloud technology has numerous advantages, there are several privacy and security issues involved. One way in which cloud providers respond to this issue is with their key management service, where encryption keys are used to protect sensitive data present in the cloud. This paper discusses crucial hierarchy-based key management technique called Privacy-Preserving Based on Characteristic Encryption for privacy preservation in the cloud environment.
Similar content being viewed by others
References
Hu J, Cheung RCC (2017) Compact constant weight coding engines for the code based cryptography. IEEE Trans Circuits Syst 64(9):1092–1096
Banerjee A (2017) Cloak a stream cipher based encryption protocol for mobile cloud computing. IEEE Trans Cloud Comput 4(4):17678–17691
Khan F, Li H (2016) Owner specified excessive access control for attribute-based encryption. IEEE Trans Cloud Comput 11(10):8967–8976
Sharma R, Joshi B (2016) Hype: hybrid-identity based encryption approach for cloud security with outsourced revocation. IEEE Int Conf Signal Process Commun Power Embed Syst 3(1)
Mohanty M (2016) 2dCrypt: image scaling and cropping in encrypted domains. IEEE Trans Inf Forens Secur 2(5):2542–2555
Yang J (2005) Improving memory encryption performance in secure processors. IEEE Trans Cloud Comput 54(5):630–640
Jayapandian N (2016) Improved cloud security trust on client-side data encryption using has been and blowfish. In: IEEE on Online International Conference on Green Engineering and Technologies (IC-GET), vol 11, issue 14
Jung T, Li X-Y (2015) Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forens Secur 10(1):190–199
Asesh A (2015) Encryption technique for a trusted cloud computing environment. IOSR J Comput Eng 17(1):53–60
TC Chiueh, Simha DN (2012) Encryption domain text retrieval. In: IEEE International Conference on Cloud Computing and Intelligence Systems, vol 3, issue 1
Ragini PM (2014) An efficient model for privacy and security in mobile cloud computing. In: IEEE International Conference on Recent Trends in Information Technology, vol 2, issue 8
Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen PS (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458
Ali J, Zafar F, Khan GM (2013) Future client’s requests estimation for dynamic resource allocation in the cloud data center using cgpann. In: IEEE 12th International Conference on Machine Learning and Applications, vol 2, issue 2
Zhu H, Mei Z, Xie M (2016) Identity-based key management for cloud computing. Secur Commun Netw 9(13):2143–2156
Han J, Susilo W, Mu Y, Yan J (2012) Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 23(11):2150–2162
Song Y, Wang H, Wei X, Wu L (2019) Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secur Commun Netw 8:1–9
Kathirvel A, Madan S (2014) Efficient privacy preserving key management for public cloud networks. KTH Royal Institute of Technology School of Information and Communication Technology (ICT), Department of Communication Systems, Stockholm, Sweden
Singh N, Singh AK (2017) Data privacy protection mechanisms in cloud. Data Sci Eng 3(1):24–39
Hemant P, Chawande NP, Sonule A, Wani H (2011) Development of servers in cloud computing to solve issues related to security and backup. In: IEEE 12th International Conference on Machine Learning and Applications, vol 3, issue 1
Tebaa M, El Hajji S, El Ghazi A (2012) Holomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol 3, issue 1
Zhong Q, Liu Z (2010) Increasing client satisfaction: request scheduling for information service. In: IEEE Transactions on Cloud Computing, vol 1, issue 4
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Raja, J., Ramakrishnan, M. Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location. J Supercomput 76, 6026–6039 (2020). https://doi.org/10.1007/s11227-019-03111-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-03111-1