Efficient sensitivity orient blockchain encryption for improved data security in cloud

被引:11
|
作者
Siva Kumar, A. [1 ]
Godfrey Winster, S. [2 ]
Ramesh, R. [3 ]
机构
[1] Sri Sai Ram Engn Coll, Dept Informat Technol, Chennai 600044, TN, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Sch Comp, Coll Engn & Technol, Kattankulathur, TN, India
[3] Saveetha Engn Coll, Dept Elect & Commun Engn, Thandalam, TN, India
来源
关键词
cloud security; data manipulation; blockchain; data encryption; RSFSA; access restriction;
D O I
10.1177/1063293X211008586
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data security in the cloud has become a dominant topic being discussed in recent times as the security of data in the cloud has been focused on by several researchers. However, the data security was enforced at the attribute level, the adversaries are capable of learning the method of data encryption even there are access restrictions are enforced at an attribute level. To challenge the adversaries with more sophisticated security measures, an efficient real-time service-centric feature sensitivity analysis (RSFSA) model is proposed in this paper. The RSFSA model analyses the sensitivity of different features being accessed by any service and at multiple levels. At each level, the method checks the set of features being accessed and the number of features the user has access grant to compute the FLAG value for the user according to the profile given. Based on the value of FLAG, the user has been granted or denied service access. On the other side, the method maintains different encryption schemes and keys for each level of features. As the features are organized in multiple levels, the method maintains a set of schemes and keys for each level dedicative. Based on the service level and data, the method selects an encryption scheme and key to perform data encryption. According to that, the service access data has been encrypted at the attribute level with a specific scheme and key. Data encrypted has been uploaded to the blockchain and the method modifies the reference part of the chain to connect only the blocks to which the user has access. The chain given to the user would do not contain any reference from a specific block to which the user has no access. The proposed method improves the performance of data security and access restriction greatly.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 50 条
  • [41] Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud
    Hou, Zesen
    Ning, Jianting
    Huang, Xinyi
    Xu, Shengmin
    Zhang, Leo Yu
    COMPUTER STANDARDS & INTERFACES, 2024, 90
  • [42] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [43] Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment
    Dutta, Aritra
    Bose, Rajesh
    Roy, Sandip
    Sutradhar, Shrabani
    ARCHIVES OF PHARMACY PRACTICE, 2023, 14 (03) : 41 - 47
  • [44] Performance Analysis of Attribute based Encryption and Cloud Health data Security
    Priyanka, J.
    Ramakrishnan, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 989 - 994
  • [45] Cloud Data Life Cycle Security Issues and Research of Encryption Technology
    Li, Nengneng
    Zhang, Yongsheng
    Fan, Yueqin
    Chang, Liang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 356 - 359
  • [46] Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    Veloudis, Simeon
    Paraskakis, Iraklis
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 497 - 502
  • [47] An improved blockchain framework for ORAP verification and data security in healthcare
    Rastogi P.
    Singh D.
    Bedi S.S.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (06) : 2853 - 2868
  • [48] Secure Cloud Data Deduplication with Efficient Re-Encryption
    Yuan, Haoran
    Chen, Xiaofeng
    Li, Jin
    Jiang, Tao
    Wang, Jianfeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 442 - 456
  • [49] Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing
    Rajput, Snehal
    Dhobi, J. S.
    Gadhavi, Lata J.
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 135 - 143
  • [50] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138