Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile

2020 ◽  
Vol 76 (8) ◽  
pp. 6094-6112
Author(s):  
S. Kumaresan ◽  
Vijayaragavan Shanmugam

Data security is the most predominant measure that should be followed in any organization to prevent uncertified access to user’s data. A data breach is a security event in which sensitive data is viewed, transmitted, stolen or used by an unauthorized individual. A number of breaches include compromised password files which reveal the passwords of millions of users in an organization. The paper is intended to identify such password breaches through honey encryption technique. Using the concept of honey words, each user has a list of sweet words corresponding to their account, out of which only one is original password and remaining are fake passwords. During Honey Encryption, Distribution-transforming encoder (DTE) is applied on the password to acquire the seed space which is then encrypted by using secret key. The proposed model can be efficiently implemented in cloud applications to highly reduce cloud data breaches.


The data security in cloud has been well studied towards the data present in the cloud environment. Number of techniques has been discussed earlier and each produces different performance results in data security. But still there are gaps in performance in security which should be optimized. To improve the security performance, an efficient class based encryption (CBE) with User profile (UP) is presented. The proposed CBE-UP method groups the cloud data at attribute level based on the importance mentioned in the taxonomy. The data taxonomy covers various information related to the attribute of any data point like their sensitivity, importance in different class and so on. According to the taxonomy, the method estimates the Class Sensitivity Measure (CSM) for each attribute, which has been used to classify the data attribute. Further, for each Attribute class, the method generates different key from the key set and assigns various scheme to perform encryption and decryption. The selection of key and method has been iterated at each time window. The performance of data security has been improved and reduces the network overhead in distribution of keys to the registered users.


Author(s):  
Y. Ts. Alaverdyan ◽  
E. G. Satimova

A way to increase the robustness of a cryptographic algorithm toward unauthorized inversion can be obtained through application of non-commutative or non-associative algebraic structures. In this regard, data security became a great issue in adaptation of cloud computing over Internet. While in the traditional encryption methods, security to data in storage state and transmission state is provided, in cloud data processing state, decryption of data is assumed, data being available to cloud provider. In this paper, we propose a special homomorphism between self-distributed and non-associative algebraic structures, which can stand as a premise to construct a homomorphic encryption algorithm aimed at the cloud data security in processing state. Homomorphic encryption so developed will allow users to operate encrypted data directly bypassing the decryption.


Author(s):  
S.Noordeen , Et. al.

The growing size of information, security became the risk of access from centralized resource providers deploy them into cloud, where authorized users could access them. The nearly combined nature of cloud environment does not yet allow users to perceive the cloud resources and services in a split second. At the same time, they are upgrading. Also, attribute based encryption techniques are used towards the security development in few methods. Also, profile based approaches are used which uses different encryption keys according to user profile. However, all the methods suffer to achieve higher performance in datasecurity. To solve this issue and to improve the security performance, an efficient Service LevelAttributeBasedEncryption (SLABE)ispresented.Inthisapproach,themethoduses different key set of different services. For each attribute, the method maintains different keys for various services. According to the key belongs to the attributes and service, the method performs encryption and decryption. The method improves the performance in security and increases the throughput aswell. Further to improve the security performance, a multi attribute randomized key Service Level Encryption (MARK-SLE) scheme has been presented. In this approach, the method classifies the service and for each service, the method generates different key set according to the attributes accessed. The method selects the keys in a randomized approach and chooses the keys at different time session. Generated key has been used to perform encryption or decryption where the schemes of encryption also selected in a random manner. The proposed MARK-SLE algorithm improves the security performance than previous SLABEalgorithm. Third, a Service Level Scheduler Based Encryption (SLSBE) Scheme is presented. In this approach, the security in service level and scheduling strategy is considered. For each service available, the method maintains the set of attributes being accessed. For each level of service and attributes, the method uses different keys and encryption standards. At the reception of user request, the method identifies the service claimed and set of attributes.  


Sign in / Sign up

Export Citation Format

Share Document