Efficient sensitivity orient blockchain encryption for improved data security in cloud

被引:11
|
作者
Siva Kumar, A. [1 ]
Godfrey Winster, S. [2 ]
Ramesh, R. [3 ]
机构
[1] Sri Sai Ram Engn Coll, Dept Informat Technol, Chennai 600044, TN, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Sch Comp, Coll Engn & Technol, Kattankulathur, TN, India
[3] Saveetha Engn Coll, Dept Elect & Commun Engn, Thandalam, TN, India
来源
关键词
cloud security; data manipulation; blockchain; data encryption; RSFSA; access restriction;
D O I
10.1177/1063293X211008586
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data security in the cloud has become a dominant topic being discussed in recent times as the security of data in the cloud has been focused on by several researchers. However, the data security was enforced at the attribute level, the adversaries are capable of learning the method of data encryption even there are access restrictions are enforced at an attribute level. To challenge the adversaries with more sophisticated security measures, an efficient real-time service-centric feature sensitivity analysis (RSFSA) model is proposed in this paper. The RSFSA model analyses the sensitivity of different features being accessed by any service and at multiple levels. At each level, the method checks the set of features being accessed and the number of features the user has access grant to compute the FLAG value for the user according to the profile given. Based on the value of FLAG, the user has been granted or denied service access. On the other side, the method maintains different encryption schemes and keys for each level of features. As the features are organized in multiple levels, the method maintains a set of schemes and keys for each level dedicative. Based on the service level and data, the method selects an encryption scheme and key to perform data encryption. According to that, the service access data has been encrypted at the attribute level with a specific scheme and key. Data encrypted has been uploaded to the blockchain and the method modifies the reference part of the chain to connect only the blocks to which the user has access. The chain given to the user would do not contain any reference from a specific block to which the user has no access. The proposed method improves the performance of data security and access restriction greatly.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 50 条
  • [31] Data Security Encryption Analysis Based on Blockchain Trusted Big Data Artificial Intelligence
    Wang, Hongwu
    Cui, Hua
    Zhang, Yan
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [32] An Efficient Approach for Increasing Security to Symmetric Data Encryption
    Islam, Muhammad Nazrul
    Mia, Md. Monir Hossain
    Islam, Md. Foizul
    Matin, M. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 16 - 20
  • [33] Blockchain Chain Based Cloud Security Using Provable Partitioned Folding Encryption for Integrity Proofing in Cloud Environment
    P. Tamilselvi
    SN Computer Science, 5 (8)
  • [34] An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security
    Vengadapurvaja, A. M.
    Nisha, G.
    Aarthy, R.
    Sasikaladevi, N.
    7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 643 - 650
  • [35] BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
    Zuo, Yuting
    Kang, Zhaozhe
    Xu, Jian
    Chen, Zhide
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (03)
  • [36] A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center
    Qin, Peng
    Li, Wei
    Ding, Ke
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] An efficient algorithm for data security in cloud storage
    Azougaghe, Ali
    Kartit, Zaid
    Hedabou, Mustapha
    Belkasmi, Mostafa
    El Marraki, Mohamed
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 421 - 427
  • [38] Enhanced Cloud Security Framework To Confirm Data Security on Asymmetric And Symmetric Key Encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    Radhikadevi, S.
    Koushikaa, M.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [39] Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption
    Mohammed, Mohanad A.
    Wahab, Hala B. Abdul
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (02): : 1731 - 1748
  • [40] Enhancing Cloud Communication Security: A Blockchain-Powered Framework with Attribute-Aware Encryption
    Raghunandan, K. R.
    Kallapu, Bhavya
    Dodmane, Radhakrishna
    Rao, N. S. Krishnaraj
    Thota, Srinivasarao
    Sahu, Aditya Kumar
    ELECTRONICS, 2023, 12 (18)