Skip to main content
Log in

Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Managing and using industrial Big Data is a big challenge for every industrial enterprise manager. By using the cloud technology, enterprises can handover the task of heavy data management to reliable hands and focus on their main business. Though cloud technology has numerous advantages, there are several privacy and security issues involved. One way in which cloud providers respond to this issue is with their key management service, where encryption keys are used to protect sensitive data present in the cloud. This paper discusses crucial hierarchy-based key management technique called Privacy-Preserving Based on Characteristic Encryption for privacy preservation in the cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Hu J, Cheung RCC (2017) Compact constant weight coding engines for the code based cryptography. IEEE Trans Circuits Syst 64(9):1092–1096

    Article  Google Scholar 

  2. Banerjee A (2017) Cloak a stream cipher based encryption protocol for mobile cloud computing. IEEE Trans Cloud Comput 4(4):17678–17691

    Google Scholar 

  3. Khan F, Li H (2016) Owner specified excessive access control for attribute-based encryption. IEEE Trans Cloud Comput 11(10):8967–8976

    Google Scholar 

  4. Sharma R, Joshi B (2016) Hype: hybrid-identity based encryption approach for cloud security with outsourced revocation. IEEE Int Conf Signal Process Commun Power Embed Syst 3(1)

  5. Mohanty M (2016) 2dCrypt: image scaling and cropping in encrypted domains. IEEE Trans Inf Forens Secur 2(5):2542–2555

    Article  Google Scholar 

  6. Yang J (2005) Improving memory encryption performance in secure processors. IEEE Trans Cloud Comput 54(5):630–640

    Article  Google Scholar 

  7. Jayapandian N (2016) Improved cloud security trust on client-side data encryption using has been and blowfish. In: IEEE on Online International Conference on Green Engineering and Technologies (IC-GET), vol 11, issue 14

  8. Jung T, Li X-Y (2015) Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forens Secur 10(1):190–199

    Article  Google Scholar 

  9. Asesh A (2015) Encryption technique for a trusted cloud computing environment. IOSR J Comput Eng 17(1):53–60

    Google Scholar 

  10. TC Chiueh, Simha DN (2012) Encryption domain text retrieval. In: IEEE International Conference on Cloud Computing and Intelligence Systems, vol 3, issue 1

  11. Ragini PM (2014) An efficient model for privacy and security in mobile cloud computing. In: IEEE International Conference on Recent Trends in Information Technology, vol 2, issue 8

  12. Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen PS (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458

    Article  Google Scholar 

  13. Ali J, Zafar F, Khan GM (2013) Future client’s requests estimation for dynamic resource allocation in the cloud data center using cgpann. In: IEEE 12th International Conference on Machine Learning and Applications, vol 2, issue 2

  14. Zhu H, Mei Z, Xie M (2016) Identity-based key management for cloud computing. Secur Commun Netw 9(13):2143–2156

    Google Scholar 

  15. Han J, Susilo W, Mu Y, Yan J (2012) Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 23(11):2150–2162

    Article  Google Scholar 

  16. Song Y, Wang H, Wei X, Wu L (2019) Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secur Commun Netw 8:1–9

    Google Scholar 

  17. Kathirvel A, Madan S (2014) Efficient privacy preserving key management for public cloud networks. KTH Royal Institute of Technology School of Information and Communication Technology (ICT), Department of Communication Systems, Stockholm, Sweden

  18. Singh N, Singh AK (2017) Data privacy protection mechanisms in cloud. Data Sci Eng 3(1):24–39

    Article  Google Scholar 

  19. Hemant P, Chawande NP, Sonule A, Wani H (2011) Development of servers in cloud computing to solve issues related to security and backup. In: IEEE 12th International Conference on Machine Learning and Applications, vol 3, issue 1

  20. Tebaa M, El Hajji S, El Ghazi A (2012) Holomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol 3, issue 1

  21. Zhong Q, Liu Z (2010) Increasing client satisfaction: request scheduling for information service. In: IEEE Transactions on Cloud Computing, vol 1, issue 4

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Raja.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raja, J., Ramakrishnan, M. Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location. J Supercomput 76, 6026–6039 (2020). https://doi.org/10.1007/s11227-019-03111-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-03111-1

Keywords

Navigation