Skip to main content
Log in

Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniques were posited for securely amassing the data in the cloud; however, during massive transmission, none of them maintain end-to-end security. And, prevailing methods are also unable to solve the key intricacy and avoid key secrecy exposé. Thus, for trouncing these disadvantages and also assuring the data transmission (DT) as of the source–destination, a secure DT scheme with the help of a distributed cloud server (CS) and data deduplication is proposed. The uploaded user data can well be amassed in disparate CS to ameliorate the user data’s security. It can be done by, first, extracting the features of the user data along with the CS. After that, the Hybrid Meerkat clan algorithm (HMCA) chose the CS, which is optimally centered on the features. Next, the SHA512 algorithm performs the data deduplication of the input user data. Subsequent to data deduplication, the input file is compressed and encrypted using a two-stage lempel–ziv algorithm and optimized CP-ABE-ECC algorithm. Lastly, the encrypted file is stored in the chosen CS. The experimentation is implemented to analyze the proposed method’s performance. The outcomes exhibited that the proposed work performed better contrasted to other prevailing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Velapure, S.S., Barde, S.S.: A hybrid cloud approach for secure authorized deduplication. Int. J. Sci. Res. (IJSR) 26(5), 1206–1216 (2014)

    Google Scholar 

  2. Yan, Z., Ding, W., Yu, X., Zhu, H., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2(2), 138–150 (2016)

    Article  Google Scholar 

  3. Yan, Z., Zhang, L., Ding, W., Zheng, Q.: Heterogeneous data storage management with deduplication in cloud computing. IEEE Trans. Big Data 5(3), 393–407 (2017)

    Article  Google Scholar 

  4. Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2015)

    Article  Google Scholar 

  5. Suzic, B., Reiter, A., Reimair, F., Venturi, D., Kubo, B.: Secure data sharing and processing in heterogeneous clouds. Proc. Comput. Sci. 68, 116–126 (2015)

    Article  Google Scholar 

  6. Luo, S., Zhang, G., Wu, C., Khan, S., Li, K.: Boafft: distributed deduplication for big data storage in the cloud. IEEE Trans. Cloud Comput. 61(11), 1–13 (2015)

    Google Scholar 

  7. Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2013)

    Article  Google Scholar 

  8. Zhou, L., Varadharajan, V., Hitchens, M.: Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans. Inf. Forensics Secur. 10(11), 2381–2395 (2015)

    Article  Google Scholar 

  9. Pravin, A., Prem Jacob, T., Nagarajan, G.: Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique. J. Ambient Intell. Humanized Comput. (2019). https://doi.org/10.1007/s12652-019-01563-0

    Article  Google Scholar 

  10. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Architect. 102, 101653 (2020)

    Article  Google Scholar 

  11. Thangavel, M., Varalakshmi, P.: Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Comput. 21(2), 1411–1437 (2018)

    Article  Google Scholar 

  12. Attasena, V., Darmont, J., Harbi, N.: Secret sharing for cloud data security: a survey, VLDB J. Int. J. Very Large Data Bases 26(5), 657–681 (2017)

    Article  Google Scholar 

  13. Fan, K., Liu, T., Zhang, K., Li, H., Yang, Y.: A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distrib. Comput. 135, 169–176 (2020)

    Article  Google Scholar 

  14. Kiraz, M.S.: A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J. Ambient Intell. Humanized Comput. 7(5), 731–760 (2016)

    Article  Google Scholar 

  15. Pradeep, K.V., Vijayakumar, V., Subramaniyaswamy, V.: An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment. J. Comput. Netw. Commun. 8(5), 14799–14805 (2019)

    Google Scholar 

  16. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)

    Article  Google Scholar 

  17. Pitchai, R., Jayashri, S., Raja, J.: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Pers. Commun. 90(2), 947–960 (2016)

    Article  Google Scholar 

  18. Jayapandian, N., MdZubair Rahman, A.M.J.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Comput. 20(2), 1561–1573 (2017)

    Article  Google Scholar 

  19. Maram, B., Gnanasekar, J.M., Manogaran, G., et al.: Intelligent security algorithm for UNICODE data privacy and security in IOT. SOCA 13, 3–15 (2019)

    Article  Google Scholar 

  20. Tian, G., Ma, H., Xie, Y., Liu, Z.: Randomized deduplication with ownership management and data sharing in cloud storage. J. Inf. Secur. Appl. 51, 102432 (2020)

    Google Scholar 

  21. Rani, D.R., Geethakumari, G.: Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN. Comput. Commun. 150, 799–810 (2019)

    Article  Google Scholar 

  22. Fan, Y., Lin, X., Liang, W., Tan, G., Nanda, P.: A secure privacy preserving deduplication scheme for cloud computing. Fut. Gener. Comput. Syst. 101, 127–135 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dilip Venkata Kumar Vengala.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vengala, D.V.K., Kavitha, D. & Kumar, A.P.S. Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Cluster Comput 23, 1683–1696 (2020). https://doi.org/10.1007/s10586-020-03114-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03114-1

Keywords

Navigation