Abstract
The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniques were posited for securely amassing the data in the cloud; however, during massive transmission, none of them maintain end-to-end security. And, prevailing methods are also unable to solve the key intricacy and avoid key secrecy exposé. Thus, for trouncing these disadvantages and also assuring the data transmission (DT) as of the source–destination, a secure DT scheme with the help of a distributed cloud server (CS) and data deduplication is proposed. The uploaded user data can well be amassed in disparate CS to ameliorate the user data’s security. It can be done by, first, extracting the features of the user data along with the CS. After that, the Hybrid Meerkat clan algorithm (HMCA) chose the CS, which is optimally centered on the features. Next, the SHA512 algorithm performs the data deduplication of the input user data. Subsequent to data deduplication, the input file is compressed and encrypted using a two-stage lempel–ziv algorithm and optimized CP-ABE-ECC algorithm. Lastly, the encrypted file is stored in the chosen CS. The experimentation is implemented to analyze the proposed method’s performance. The outcomes exhibited that the proposed work performed better contrasted to other prevailing algorithms.











Similar content being viewed by others
References
Velapure, S.S., Barde, S.S.: A hybrid cloud approach for secure authorized deduplication. Int. J. Sci. Res. (IJSR) 26(5), 1206–1216 (2014)
Yan, Z., Ding, W., Yu, X., Zhu, H., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2(2), 138–150 (2016)
Yan, Z., Zhang, L., Ding, W., Zheng, Q.: Heterogeneous data storage management with deduplication in cloud computing. IEEE Trans. Big Data 5(3), 393–407 (2017)
Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2015)
Suzic, B., Reiter, A., Reimair, F., Venturi, D., Kubo, B.: Secure data sharing and processing in heterogeneous clouds. Proc. Comput. Sci. 68, 116–126 (2015)
Luo, S., Zhang, G., Wu, C., Khan, S., Li, K.: Boafft: distributed deduplication for big data storage in the cloud. IEEE Trans. Cloud Comput. 61(11), 1–13 (2015)
Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2013)
Zhou, L., Varadharajan, V., Hitchens, M.: Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans. Inf. Forensics Secur. 10(11), 2381–2395 (2015)
Pravin, A., Prem Jacob, T., Nagarajan, G.: Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique. J. Ambient Intell. Humanized Comput. (2019). https://doi.org/10.1007/s12652-019-01563-0
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Architect. 102, 101653 (2020)
Thangavel, M., Varalakshmi, P.: Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Comput. 21(2), 1411–1437 (2018)
Attasena, V., Darmont, J., Harbi, N.: Secret sharing for cloud data security: a survey, VLDB J. Int. J. Very Large Data Bases 26(5), 657–681 (2017)
Fan, K., Liu, T., Zhang, K., Li, H., Yang, Y.: A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distrib. Comput. 135, 169–176 (2020)
Kiraz, M.S.: A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J. Ambient Intell. Humanized Comput. 7(5), 731–760 (2016)
Pradeep, K.V., Vijayakumar, V., Subramaniyaswamy, V.: An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment. J. Comput. Netw. Commun. 8(5), 14799–14805 (2019)
Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)
Pitchai, R., Jayashri, S., Raja, J.: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Pers. Commun. 90(2), 947–960 (2016)
Jayapandian, N., MdZubair Rahman, A.M.J.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Comput. 20(2), 1561–1573 (2017)
Maram, B., Gnanasekar, J.M., Manogaran, G., et al.: Intelligent security algorithm for UNICODE data privacy and security in IOT. SOCA 13, 3–15 (2019)
Tian, G., Ma, H., Xie, Y., Liu, Z.: Randomized deduplication with ownership management and data sharing in cloud storage. J. Inf. Secur. Appl. 51, 102432 (2020)
Rani, D.R., Geethakumari, G.: Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN. Comput. Commun. 150, 799–810 (2019)
Fan, Y., Lin, X., Liang, W., Tan, G., Nanda, P.: A secure privacy preserving deduplication scheme for cloud computing. Fut. Gener. Comput. Syst. 101, 127–135 (2019)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vengala, D.V.K., Kavitha, D. & Kumar, A.P.S. Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Cluster Comput 23, 1683–1696 (2020). https://doi.org/10.1007/s10586-020-03114-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-020-03114-1