Efficient sensitivity orient blockchain encryption for improved data security in cloud

被引:11
|
作者
Siva Kumar, A. [1 ]
Godfrey Winster, S. [2 ]
Ramesh, R. [3 ]
机构
[1] Sri Sai Ram Engn Coll, Dept Informat Technol, Chennai 600044, TN, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Sch Comp, Coll Engn & Technol, Kattankulathur, TN, India
[3] Saveetha Engn Coll, Dept Elect & Commun Engn, Thandalam, TN, India
来源
关键词
cloud security; data manipulation; blockchain; data encryption; RSFSA; access restriction;
D O I
10.1177/1063293X211008586
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data security in the cloud has become a dominant topic being discussed in recent times as the security of data in the cloud has been focused on by several researchers. However, the data security was enforced at the attribute level, the adversaries are capable of learning the method of data encryption even there are access restrictions are enforced at an attribute level. To challenge the adversaries with more sophisticated security measures, an efficient real-time service-centric feature sensitivity analysis (RSFSA) model is proposed in this paper. The RSFSA model analyses the sensitivity of different features being accessed by any service and at multiple levels. At each level, the method checks the set of features being accessed and the number of features the user has access grant to compute the FLAG value for the user according to the profile given. Based on the value of FLAG, the user has been granted or denied service access. On the other side, the method maintains different encryption schemes and keys for each level of features. As the features are organized in multiple levels, the method maintains a set of schemes and keys for each level dedicative. Based on the service level and data, the method selects an encryption scheme and key to perform data encryption. According to that, the service access data has been encrypted at the attribute level with a specific scheme and key. Data encrypted has been uploaded to the blockchain and the method modifies the reference part of the chain to connect only the blocks to which the user has access. The chain given to the user would do not contain any reference from a specific block to which the user has no access. The proposed method improves the performance of data security and access restriction greatly.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 50 条
  • [21] SECURITY MODEL BASED ENCRYPTION TO PROTECT DATA ON CLOUD
    Ghebghoub, Yasmina
    Boussaid, Omar
    Oukid, Saliha
    PROCEEDINGS OF INTERNATIONAL CONFERENCE INFORMATION SYSTEMS AND DESIGN OF COMMUNICATION (ISDOC2014), 2014, : 50 - 55
  • [22] Protecting personal sensitive data security in the cloud with blockchain
    Yang, Zhen
    Chen, Yingying
    Huang, Yongfeng
    Li, Xing
    AI AND CLOUD COMPUTING, 2021, 120 : 195 - 231
  • [23] Enhanced Encryption and Decryption Gateway Model for Cloud Data Security in Cloud Storage
    Boopathy, D.
    Sundaresan, M.
    EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 415 - 421
  • [24] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [25] Applying encryption algorithm to enhance data security in cloud storage
    Laboratory of Research in Informatics and Telecommunication , University of Mohammed V,Faculty of Science, Rabat, Morocco
    Eng. Lett., 4 (277-282):
  • [26] An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT Environment
    Kumar, Sanjay
    Abhishek, Kumar
    Jhaveri, Rutvij H.
    Alabdulatif, Abdulatif
    Gaur, Rajkumar
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1782 - 1788
  • [27] Applying Encryption Algorithm to Enhance Data Security in Cloud Storage
    Kartit, Zaid
    El Marraki, Mohamed
    ENGINEERING LETTERS, 2015, 23 (04) : 277 - 282
  • [28] A blockchain-based security model for cloud accounting data
    Gou C.
    Deng X.
    International Journal of Ambient Computing and Intelligence, 2023, 14 (01)
  • [29] Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud
    Qureshi, Muhammad Bilal
    Qureshi, Muhammad Shuaib
    Tahir, Saqib
    Anwar, Aamir
    Hussain, Saddam
    Uddin, Mueen
    Chen, Chin-Ling
    SYMMETRY-BASEL, 2022, 14 (04):
  • [30] An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment
    Yang, Guangcan
    Li, Peixuan
    Xiao, Ke
    He, Yunhua
    Xu, Gang
    Wang, Chao
    Chen, Xiubo
    ELECTRONICS, 2023, 12 (20)