Abstract
Cloud storage enables users to store their data and enjoy high-quality cloud applications based on transaction processing. Normally, the wholesaler has real servers which host products and services from different locations, provide the end-users to simply log on to the network and perform transaction processing. However, the dynamic data update after transaction processing in cloud does not provide an optimal security framework. Besides, the cloud data storage is not focusing on maximizing the security on performing the transactions over cloud servers. In order to overcome such limitations in cloud, a novel framework named conditional source trust attribute encryption with particle swarm-based transaction optimization (CSTAE-PSTO) is proposed. The conditional attributes are encrypted using the conditional source trust attribute encryption technique along with the bilinear mapping transformation function in CSTAE-PSTO framework to improve the security level through unique secured identity number. The PSTO technique on cloud applications optimizes the result with minimal transaction completion time. Experiment is conducted based on factors such as throughput level on transaction, security rate on data layer and transaction completion time. Experimental analysis shows that the CSTAE-PSTO framework is able to improve the security rate on data layer and reduce the transaction completion time when compared to the state-of-the-art works.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Al-maamari A, Omara FA (2015) Task scheduling using PSO algorithm in cloud computing environments. Int J Grid Distrib Comput 8(5):245–256
Cheng L, Wang C (2013) Network performance isolation for latency-sensitive cloud applications. Future Gener Comput Syst 29(4):1073–1084
Di S, Wang C (2013a) Dynamic optimization of multiattribute resource allocation in self-organizing clouds. IEEE Trans Parallel Distrib Syst 24(3):464–478
Di S, Wang C (2013b) Error-tolerant resource allocation and payment minimization for cloud system. IEEE Trans Parallel Distrib Syst 24(6):1097–1106
Di S, Wang C, Chen L (2013) Ex-post efficient resource allocation for self-organizing cloud. J Comput Electr Eng 39(7):2342–2356
He H, Li R, Dong X, Zhang Z (2014) Secure, efficient and fine-grained data control mechanism for P2P storage cloud. IEEE Trans Cloud Comput 2(4):471–484
Inbarani WS, Shenbagamoorthy G, Paul CKC (2013) Proxy re-encryption schemes for data storage security in cloud—a survey. Int J Eng Res Technol 2(1):1–5
Karimi M (2014) Hybrid discrete particle swarm optimization for task scheduling in grid computing. Int J Grid Distrib Comput 7(4):93–104
Khedkar SV, Gawande AD (2014) Data partitioning technique to improve cloud data storage security. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3347–3350
Kumar GP, Reddy KS, Raviteja C, Arif SM (2014) PABKE: Provable attribute-based keyword explore over outsourced encrypted data. Int J Comput Eng Res Trends 1(5):271–276
Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354
Li K, Wang J, Zhang Y, Ma H (2014) Key policy attribute-based proxy re-encryption and RCCA secure scheme. J Internet Serv Inf Secur (JISIS) 4(2):70–82
Lin J, Chen C, Chang JM (2013) QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans Cloud Comput 1(1):101–115
Naruse T, Mohri M, Shiraishi Y (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum Centric Comput Inf Sci 5(8):1–13
Shu J, Shen Z, Xue W (2014) Shield: a stackable secure storage system for file sharing in public storage. J Parallel Distrib Comput 74:2872–2883
Sookhak M, Talebian H, Ahmed E, Gani A, Khan MK (2014) A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43:121–141
Zhou L, Aradharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960
Zhu Y, Hu H, Ahn G, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Brindha, T., Shaji, R.S. A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Comput 22, 1013–1022 (2018). https://doi.org/10.1007/s00500-016-2405-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-016-2405-6