Skip to main content
Log in

Enhanced encryption for light weight data in a multi-cloud system

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

Cloud storage is a cloud deployment that allows the setup of in-house data storage facilities by organizations. Cloud computing's popularity allows mobile devices to store/retrieve personal data from anywhere at any time. Consequently, the problem of data security in the mobile cloud is becoming increasingly serious and prevents further mobile cloud development. In order to improve cloud security, substantial studies have been conducted. However, most of them are not applicable for mobile cloud since mobile devices particularly have limited computing resources and power. This article proposes an enhanced Attribute-based encryption scheme for lightweight distributed cloud data. Multiple cloud computing provides storage assistance in a single heterogeneous environment. The proposed method ensures confidentiality, secure data storage, and file sharing through the multi-cloud environment. In comparison to traditional schemes, quantitative results suggest the feasibility of the proposed mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Shafiq, B., Ghayyur, S., Masood, A., Pervaiz, Z., Almutairi, A., Khan, F., Ghafoor, A.: Composability verification of multi-service workflows in a policy-driven cloud computing environment. IEEE Trans. Depend. Secure Comput. 14(5), 478–493 (2017)

    Article  Google Scholar 

  2. Liu, P.: Secure symmetric key fuzzy identity-based encryption. Appl. Mech. Mater. 321–324, 2665–2668 (2013)

    Article  Google Scholar 

  3. Lai, J., Deng, R., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forens Secur. 8(8), 1343–1354 (2013)

    Article  Google Scholar 

  4. Botta, A., de Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gen. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  5. Yang, J., He, S., Lin, Y., Lv, Z.: Multimedia cloud transmission and storage system based on internet of things. Multimedia Tools Appl. 76(17), 17735–17750 (2015)

    Article  Google Scholar 

  6. Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)

    Article  Google Scholar 

  7. Esposito, C., Ficco, M., Palmieri, F., Castiglione, A.: Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans. Comput. 65(8), 2348–2362 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  8. Limkar, S., Bhalerao, R., Shinde, P., Raut, A.: Multi-owner architecture system using visual cryptography and watermarking for secure ownership in cloud environment. Smart Comput. Inf. (2017). https://doi.org/10.1007/978-981-10-5547-8_61

    Article  Google Scholar 

  9. Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., Attia, R.: PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Netw. 133, 141–156 (2018)

    Article  Google Scholar 

  10. Reddy, G., Rao, B., Vurukonda, N.: A review on active data access control for multi-authority cloud storage systems with users. In: Proceedings of the 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), 2017.

  11. Sun, W., Yu, S., Lou, W., Hou, Y., Li, H.: Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications (2014)

  12. Wang, H., Dong, X., Cao, Z.: Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans. Serv. Comput., pp. 1-1 (2017)

  13. Sangeetha, D., Vaidehi, V.: A secure cloud based Personal Health Record framework for a multi owner environment. Ann. Telecommun. 72(1–2), 95–104 (2016)

    Google Scholar 

  14. Guo, Z., Zhang, H., Sun, C., Wen, Q., Li, W.: Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137, 380–395 (2018)

    Article  Google Scholar 

  15. Shao, J., Zhu, Y., Ji, Q.: Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption. In: Proceedings of the 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS) (2017)

  16. Zhang, W., Lin, Y., Wu, J., Zhou, T.: Inference attack-resistant e-healthcare cloud system with fine-grained access control. IEEE Trans. Serv. Comput. (2018)

  17. Zhang, K., Li, H., Ma, J., Liu, X.: Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci. China Inf. Sci. (2017). https://doi.org/10.1007/s11432-016-9019-8

    Article  Google Scholar 

  18. Shajina, A., Varalakshmi, P.: A novel dual authentication protocol (DAP) for multi-owners in cloud computing. Clust. Comput. 20(1), 507–523 (2017)

    Article  Google Scholar 

  19. Fan, Y., Liu, Z.: Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In: Proceedings of the 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), 2017.

  20. Zhong, H., Zhu, W., Xu, Y., Cui, J.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 22(1), 243–251 (2016)

    Article  MATH  Google Scholar 

  21. Ali, M., Dhamotharan, R., Khan, E., Khan, S., Vasilakos, A., Li, K., Zomaya, A.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395–404 (2017)

    Article  Google Scholar 

  22. Liu, C.-W., Hsien, W.-F., Yang, C.-C., Hwang, M.-S.: A survey of attribute-based access control with user revocation in cloud data storage. Int. J. Netw. Security 18(5), 900–916 (2016)

    Google Scholar 

  23. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst 24(6), 1182–1191 (2013)

    Article  Google Scholar 

  24. Li, X., Tang, S., Xu, L., Wang, H., Chen, J.: Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access 5, 393–405 (2017)

    Article  Google Scholar 

  25. Deepika, K.S., Balakrishnan, R.: Secure multiowner data sharing in the cloud. In: Proceedings of the IEEE Sponsored 2nd International Conference on Innovations in Information, Embedded and Communication systems (ICIIECS) (2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shani Raj.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raj, S., Arunkumar, B. Enhanced encryption for light weight data in a multi-cloud system. Distrib Parallel Databases 41, 65–74 (2023). https://doi.org/10.1007/s10619-021-07340-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-021-07340-3

Keywords

Navigation