Abstract
Data security in centralized storage needs advancement in privacy standards because of all of the cloud. The data security in the cloud has been well provided by security industries like cloud network security, data center security, distributed security and soon, also their exist numerous techniques to preserve the privacy of cloud users. The earlier methods enforce user privacy by restricting the malicious access from various users. Data authentication is provable access to keep privacy among other standards. However, the privacy of cloud users has been breached on several occasions. To improve cloud security and enforce efficient privacy preservation, a multi-level micro access restriction algorithm has been presented in this paper. The cloud data has been indexed in multiple levels, the data present in each level has been restricted using the profile and set if encryption standards. The user request has been evaluated for its trusted access according to the access grant present in profile data. Similarly, the cloud data has been encrypted with the user key and the key belongs to the data owner. The method estimates micro access trust weight (MATW), which has been used to restrict the user from malicious access and to preserve user privacy. The method improves the performance of cloud security and introduces higher privacy preservation accuracy.
Similar content being viewed by others
Change history
19 May 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-03930-w
References
Agrawal D et al (2013) Secure and privacy-preserving database services in the cloud. In: International conference on data engineering (ICDE)
Cao M (2019) A lightweight fine-grained search scheme over encrypted data in cloud-assisted wireless body area networks. In: Wireless communications and mobile computing, vol 2019, Article ID 9340808. Hindawi, p 12
Dhasarathan C (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144–150
Dong X et al (2014) Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput Secur 42:151–164
Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Human Comput 11:1309–1324. https://doi.org/10.1007/s12652-019-01493-x
Kibiwott KP (2019) Privacy preservation for eHealth big data in cloud accessed using resource-constrained devices: survey. Int J Netw Secur 21(2):312–325
Li D et al (2017) Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption. Springer International Publishing, Cham
Qin Z et al (2018) Privacy-preserving image processing in the cloud. In: IEEE cloud computing
Saxena R (2019) Data integrity verification: a novel approach for cloud computing. Springer
Sun Y (2014) Data security and privacy in cloud computing. Int J Distrib Sens Netw
Thangavel M et al (2013) An analysis of privacy preservation schemes in cloud computing. In: IEEE international conference on engineering and technology (ICETECH)
Wang Z, Liu W (2016) CP-ABE with outsourced decryption and directionally hidden policy. Secur Commun Netw 9(14):2387–2396
Wang S et al (2019) Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms”. PLoS ONE 14(2):e0212761
Xue J (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci China Inf Sci 62:32104
Yang K et al (2017) (2017) Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf Sci 387(C):116–131
Zuo C et al (2018) CCA-secure ABE with outsourced decryption for fog computing. Future Gener Comput Syst 78:730–738
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03930-w
About this article
Cite this article
Vijayakumar, V., Umadevi, K. RETRACTED ARTICLE: Protecting user profile based on attribute-based encryption using multilevel access security by restricting unauthorization in the cloud environment. J Ambient Intell Human Comput 12, 7245–7252 (2021). https://doi.org/10.1007/s12652-020-02400-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02400-5