Skip to main content

A Novel AckIBE-Based Secure Cloud Data Management Framework

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

A smart grid of cloud includes various operations and other measures like smart meters, smart appliances, and renewable energy efficiency resources. The primary issues of this grid are how to manage various kinds of front-end devices such as smart meters and power assets efficiently and also, to efficiently process an enormous amount of data of participating devices. Since the cloud environment possesses various properties like scalability, cost saving, energy saving, and flexibility, it can serve as an efficient entrant to face these issues and challenges. This chapter introduces a more secure smart cloud computing framework-based AckIBE for data management, which we term as “Smart-Model.” The aim is to construct a hierarchical structure of homogeneous and heterogeneous cloud centers that delivers various types of computing services to support big data analysis and information management. Furthermore, we introduce a security-related solution based on acknowledgment identity-based encryption (AckIBE), signature and proxy re-encryption to face critical security issues of the proposed framework. Additionally, we introduce acknowledgments sent by the end-user to the provider to ensure that the data have been received by the end-user and not lost in the environment of cloud communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Farhangi, H. (2010). The path of the smart grid. IEEE Power and Energy Magazine, 8(1), 18.

    Article  MathSciNet  Google Scholar 

  2. Bojkovic, Z., & Bakmaz, B. (2012). Smart grid communications architecture: a survey and challenges. In Proceedings of the 11th International Conference on Applied Computer and Applied Computational Science (ACACOS) (pp. 83–89).

    Google Scholar 

  3. McDaniel, P., & McLaughlin, S. (2009). Security and privacy challenges in the smart grid. IEEE Security and Privacy, 7(3), 75–77.

    Article  Google Scholar 

  4. Fan, Z., Kulkarni, P., Gormus, S., Efthymiou, C., Kalogridis, G., Sooriyabandara, M., et al. (2013). Smart grid communications: overview of research challenges, solutions, and standardization activities. IEEE Communications Surveys and Tutorials, 15(1), 21–38.

    Article  Google Scholar 

  5. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

    Book  Google Scholar 

  6. Rusitschka, S., Eger, K., & Gerdes, C. (2010). Smart grid data cloud: a model for utilizing cloud computing in the smart grid domain. In: Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 483–488). IEEE.

    Google Scholar 

  7. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Annual International Cryptology Conference (pp. 213–229). Berlin: Springer.

    Google Scholar 

  8. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques (pp. 47–53). Berlin: Springer.

    Google Scholar 

  9. Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Applied cryptography and network security (pp. 288–306). Berlin: Springer.

    Chapter  Google Scholar 

  10. Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604–3629.

    Article  Google Scholar 

  11. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.

    Article  Google Scholar 

  12. Efthymiou, C., & Kalogridis, G. (2010). Smart grid privacy via anonymization of smart metering data. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 238–243). IEEE.

    Google Scholar 

  13. Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., & Cepeda, R. (2010). Privacy for smart meters: towards undetectable appliance load signatures. In: Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 232–237). IEEE.

    Google Scholar 

  14. Li, H., Mao, R., Lai, L., & Qiu, R. C. (2010). Compressed meter reading for delay-sensitive and secure load report in smart grid. In: Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 114–119). IEEE.

    Google Scholar 

  15. Chu, C. K., Liu, J. K., Wong, J. W., Zhao, Y., & Zhou, J. (2013). Privacy-preserving smart metering with regional statistics and personal enquiry services. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (pp. 369–380). ACM.

    Google Scholar 

  16. Zhang, T., Lin, W., Wang, Y., Deng, S., Shi, C., & Chen, L. (2010). The design of information security protection framework to support smart grid. In Power System Technology (POWERCON), 2010 International Conference on (pp. 1–5), IEEE.

    Google Scholar 

  17. Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber-attacks. In Innovative smart grid technologies (ISGT), 2010 (pp. 1–7). IEEE.

    Google Scholar 

  18. Rogers, K. M., Klump, R., Khurana, H., Aquino-Lugo, A. A., & Overbye, T. J. (2010). An authenticated control framework for distributed voltage support on the smart grid. IEEE Transactions on Smart Grid, 1(1), 40–47.

    Article  Google Scholar 

  19. Liang, K., Liu, J. K., Wong, D. S., & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In European symposium on research in computer security (pp. 257–272). Cham: Springer.

    Google Scholar 

  20. Ateniese, G., Fu, K., Green, M., & Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC), 9(1), 1–30.

    Article  Google Scholar 

  21. Ramesh, D., Mishra, R., & Edla, D. R. (2017). Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy. Arabian Journal for Science and Engineering, 42(2), 873–883.

    Article  MathSciNet  Google Scholar 

  22. Hu, X., Zhang, X., Wang, J., Xu, H., Tan, W., & Yang, Y. (2017). Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie–Hellman problem. Arabian Journal for Science and Engineering, 42(2), 639–649.

    Article  MathSciNet  Google Scholar 

  23. Gentry, C., & Silverberg, A. (2002). Hierarchical ID-based cryptography. In International conference on the theory and application of cryptology and information security (pp. 548–566). Berlin, Heidelberg: Springer.

    Google Scholar 

  24. Khurana, H., Hadley, M., Lu, N., & Frincke, D. A. (2010). Smart-grid security issues. IEEE Security and Privacy, 8(1), 81–85.

    Article  Google Scholar 

  25. Li, H., Dai, Y., Tian, L., & Yang, H. (2009). Identity-based authentication for cloud computing. In IEEE international conference on cloud computing (pp. 157–166). Berlin: Springer.

    Chapter  Google Scholar 

  26. Lim, H. W., & Paterson, K. G. (2005). Identity-based cryptography for grid security. In e-Science and Grid Computing, 2005. First International Conference on (10 pp). IEEE.

    Google Scholar 

  27. Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2015). A secure cloud computing based framework for big data information management of smart grid. IEEE Transactions on Cloud Computing, 3(2), 233–244.

    Article  Google Scholar 

  28. Ramesh, D., Mishra, R., & Pandit, A. K. (2018). An efficient stream cipher based secure and dynamic updation method for cloud data centre. In International Conference on Soft Computing Systems (pp. 505–516). Springer, Singapore.

    Google Scholar 

  29. Ramesh, D., Mishra, R., & Nayak, B. S. (2016). Cha-Cha 20: stream cipher based encryption for cloud data centre. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ACM, 40

    Google Scholar 

  30. Ramesh, D., & Priya, R. (2016). Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In Microelectronics, Computing and Communications (MicroCom), 2016 International Conference on (pp. 1–4). IEEE

    Google Scholar 

Download references

Acknowledgment

This work is supported by the Indian Institute of Technology (ISM), Dhanbad, Govt. of India. The authors wish to express their gratitude and heartiest thanks to the Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad, India for providing their research support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharavath Ramesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ramesh, D., Pasupuleti, S.K. (2020). A Novel AckIBE-Based Secure Cloud Data Management Framework. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics