+
Skip to main content

A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage

  • Conference paper
  • First Online:
Advances in Industrial Automation and Smart Manufacturing

Part of the book series: Lecture Notes in Mechanical Engineering ((LNME))

  • 1836 Accesses

  • 17 Citations

Abstract

In day-to-day life, cloud computing plays an important role in storing and retrieving the huge volumes of data. Data’s which are taken from social media (Whatsapp, Facebook, Twitter etc.), Organizaitons (MNC companies), Business data (Sensex, Forbes Global, Forbes cloud, TS Historical bus cycles etc.,) and other datas from our day to day life records are not enough memory to store in Big Data. While the storage size is increasing, the security problem also increases simultaneously. Therefore, there is a security issue in cloud computing. There are large numbers of studies conducted to improve security in cloud computing. However, most of the survey is not applicable for cloud providing security in mobile devices because of less power consuming and computing resources. The issue in the existing mobile application is no proper security of data on cloud storage. In this paper, we propose a lightweight data sharing scheme for mobile cloud computing. It accesses a control from the ciphertext-policy attribute-based encryption technology which is used in the basic environment of cloud and makes some changes in the structure of the access control tree that is suitable for mobile cloud computing. This technology in the mobile cloud will remove the major portions in the access control tree, and it transforms by using the external proxy servers. Additionally, it is used to reduce the cost of user revocation. The experimental results of our LDSS system can efficiently reduce the mobile device overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gentry C, Halevi S (2011) Implementing gentry’s fully-homomorphic encryption scheme. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 129–148

    Google Scholar 

  2. Kwon H, Kim D, Hahn C, Hur J (2017) Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multim Tools Appl 76(19):19507–19521

    Article  Google Scholar 

  3. Zhang Y, Dong Z, Xiaofeng C, Jin L, Hui L (2016) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149

    Google Scholar 

  4. Skillen A, Mohammad M (2013) On implementing deniable storage encryption for mobile devices

    Google Scholar 

  5. Jiang, Y, Willy S, Yi M, Fuchun G (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729

    Google Scholar 

  6. Wang Q, Li P, Hu X, Jianfei S, Zhiguang Q (2017) Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6:760–771

    Article  Google Scholar 

  7. Yang, K, Xiaohua J, Kui R (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, pp 523–528

    Google Scholar 

  8. Han J, Susilo W, Mu Y, Zhou J, Au MH (2014) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10(3):665–678

    MATH  Google Scholar 

  9. Zhou Z, Huang D, Wang Z (2013) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126–138

    Article  MathSciNet  Google Scholar 

  10. Jayakumar L, Janakiraman S, Latchoumi TP, Shanthoshini (2017) Dynamic virtual server for optimized web service interaction. Int J Pure Appl Math 117(19):371–377

    Google Scholar 

  11. Latchoumi TP, Jayakumar L, Ezhilarasi TP (2017) Detecting generic objects by using an adaptation of spatial features. J Adv Res Dyn Control Syst 1401–1408

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. P. Latchoumi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ezhilarasi, T.P., Sudheer Kumar, N., Latchoumi, T.P., Balayesu, N. (2021). A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage. In: Arockiarajan, A., Duraiselvam, M., Raju, R. (eds) Advances in Industrial Automation and Smart Manufacturing. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-15-4739-3_92

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4739-3_92

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4738-6

  • Online ISBN: 978-981-15-4739-3

  • eBook Packages: EngineeringEngineering (R0)

Keywords

Publish with us

Policies and ethics

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载