Efficient sensitivity orient blockchain encryption for improved data security in cloud

被引:11
|
作者
Siva Kumar, A. [1 ]
Godfrey Winster, S. [2 ]
Ramesh, R. [3 ]
机构
[1] Sri Sai Ram Engn Coll, Dept Informat Technol, Chennai 600044, TN, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Sch Comp, Coll Engn & Technol, Kattankulathur, TN, India
[3] Saveetha Engn Coll, Dept Elect & Commun Engn, Thandalam, TN, India
来源
关键词
cloud security; data manipulation; blockchain; data encryption; RSFSA; access restriction;
D O I
10.1177/1063293X211008586
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data security in the cloud has become a dominant topic being discussed in recent times as the security of data in the cloud has been focused on by several researchers. However, the data security was enforced at the attribute level, the adversaries are capable of learning the method of data encryption even there are access restrictions are enforced at an attribute level. To challenge the adversaries with more sophisticated security measures, an efficient real-time service-centric feature sensitivity analysis (RSFSA) model is proposed in this paper. The RSFSA model analyses the sensitivity of different features being accessed by any service and at multiple levels. At each level, the method checks the set of features being accessed and the number of features the user has access grant to compute the FLAG value for the user according to the profile given. Based on the value of FLAG, the user has been granted or denied service access. On the other side, the method maintains different encryption schemes and keys for each level of features. As the features are organized in multiple levels, the method maintains a set of schemes and keys for each level dedicative. Based on the service level and data, the method selects an encryption scheme and key to perform data encryption. According to that, the service access data has been encrypted at the attribute level with a specific scheme and key. Data encrypted has been uploaded to the blockchain and the method modifies the reference part of the chain to connect only the blocks to which the user has access. The chain given to the user would do not contain any reference from a specific block to which the user has no access. The proposed method improves the performance of data security and access restriction greatly.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 50 条
  • [1] Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain
    Premkumar R.
    Sathya Priya S.
    Measurement: Sensors, 2022, 24
  • [2] Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security
    Shakor, Mohammed Y.
    Khaleel, Mustafa Ibrahim
    Safran, Mejdl
    Alfarhood, Sultan
    Zhu, Michelle
    IEEE ACCESS, 2024, 12 : 26334 - 26343
  • [3] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [4] Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy
    Raj, Rahul
    Peker, Yesem Kurt
    Mutlu, Zeynep Delal
    ELECTRONICS, 2024, 13 (15)
  • [5] An intelligent blockchain-based cryptographic data security model for an efficient data sharing in cloud
    Ramya, Ponnada Naga
    Reddy, I. Ravi Prakash
    Supreethi, K.P.
    International Journal of Cloud Computing, 2024, 13 (05) : 405 - 424
  • [6] A data encryption scheme for cloud storage security
    Wu, Wei-nong
    Zheng, Yuan-bing
    Wu, Bin
    Wu, Lie
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 666 - 674
  • [7] Encryption as a Service for Data Healthcare Cloud Security
    El Bouchti, Abdelali
    Bahsani, Samir
    Nahhal, Tank
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 48 - 54
  • [8] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [9] Cloud data security with hybrid symmetric encryption
    Kaushik, Shweta
    Gandhi, Charu
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [10] Enhancing Data Security in Cloud Using Blockchain
    Yadav, Dhananjay
    Shinde, Aditi
    Nair, Akash
    Patil, Yamini
    Kanchan, Sneha
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 753 - 757