Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 516))

Abstract

In this paper, we provide a secure storage of data in the cloud server using Identity-Based Encryption. Where the data owner shares the stored data with the cloud users on the basics of pay-as-you-use principle. The cloud user request for the encrypted data, stored on the cloud server’s database (by applying encryption on keyword) and the server verifies the request by performing test on encrypted data. So, that illegal users or unauthorized servers cannot attack on the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in IEEE Symposium on Security and Privacy. S&P, Proceedings. IEEE 2000, 44–55 (2000)

    Google Scholar 

  2. E.J. Goh, Secure Indexes. IACR Cryptology ePrint Archive, 216 (2003)

    Google Scholar 

  3. Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Applied Cryptography and Network Security (Springer, Berlin, 2005)

    MATH  Google Scholar 

  4. P. Golle, J. Staddon, B. Waters, Secure conjunctive search over encrypted data, in ACNS 2004, Lecture Notes in Computer Science, vol. 3089 (Springer, 2004), p. 314

    Google Scholar 

  5. D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proceedings of EUROCRYP04, LNCS, vol. 3027 (Springer, 2004)

    Google Scholar 

  6. R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM Conference on Computer and Communications Security (ACM, 2006), pp. 79–88

    Google Scholar 

  7. K. Kurosawa, Y. Ohtaki, UC-secure searchable symmetric encryption, Financial Cryptography and Data Security (Springer, Berlin, 2012)

    Google Scholar 

  8. Z. Jianhong, D. Qiaocui, Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)

    MathSciNet  Google Scholar 

  9. V. Chang, W. Gary, A model to compare cloud and non-cloud storage of big data. Future Gener. Comput. Syst. 57, 56–76 (2016)

    Article  Google Scholar 

  10. L. Yan, C. Rong, G. Zhao, Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, in Cloud Computing (2009), pp. 167–177

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prerna Mohit .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Mohit, P., Biswas, G.P. (2017). Confidentiality and Storage of Data in Cloud Environment. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3156-4_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3155-7

  • Online ISBN: 978-981-10-3156-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics