Abstract
Cloud computing becomes more sophisticated to provide different services at different levels of user access. Even though various services are accessed at a different level, the security of data being accessed is a highly challenging one. However, there is a number of encryption approaches discussed toward the problem of cloud security; they suffer to achieve higher security as required. The previous ABFD (attribute-based flexible delegation) algorithm uses a set of policies in encrypting the data with specific keys mentioned in the policy. However, the leakage of encryption policy would introduce poor security which can be overcome by adopting multitype encryption standards in different time windows. According to this, an efficient time-variant attribute-based multitype encryption algorithm (TAM) is presented in this paper. The TAM algorithm maintains a taxonomy of attributes and related keys to be used for encryption and decryption. The corresponding keys have been used to generate the ciphertext. The content of taxonomy has been dynamically changing in each time window which makes the difference in integrity management and security performance than previous algorithms. The TAM approach introduces a higher security performance up to 89.6%. The method also reduces the time complexity up to 21 s and increases the throughput performance up to 96%.







Similar content being viewed by others
References
Paladi N, Gehrmann C, Michalas A (2017) Providing user security guarantees in public infrastructure clouds. In: IEEE Transaction on Cloud Computing, vol 5(3)
Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the Conference on Hot Topics Cloud Computer
Schiffman J, Moyer T, Vijayakumar H, Jaeger T, McDaniel P 2010 Seeding clouds with trust anchors. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp 43–46
Paladi N, Michalas A, Gehrmann C (2014) Domain-based storage protection with secure access control for the cloud. In: Proceedings of the International Workshop on Cloud Computing Security, pp 35–42
Liao J, Trahay F, Xiao G (2017) Performing initiative data prefetching in distributed file systems for cloud computing. IEEE Trans Cloud Comput 5(3):550–562
Sehgal P, Tarasov V, Zadok E (2010) Evaluating performance and energy in file system server workloads. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, pp 253–266
Tarasov V, Bhanage S, Zadok E (2011) Benchmarking file system benchmarking: It* is* rocket science. In: Proceedings of the 13th Workshop Hot Topics Operating Systems, pp 1–5
Liao J, Ishikawa Y (2012) Partial replication of metadata to achieve high metadata availability in parallel file systems. Proceedings of the 41st International Conference on Parallel Processing, pp 168–177
Noble RB, Haile Y (2010) Distributing private data in challenging network environments. In: Proceedings of the 19th International Conference on World Wide Web, pp 801–810
Jiang S, Ding X, Xu Y, Davis K (2013) A prefetching scheme exploiting both data layout and access history on disk. ACM Trans Storage 9(3):23
He J, Bent J, Torres A (2013) I/O acceleration with pattern detection. In: Proceedings of the 22nd International ACM Symposium on High-Performance Parallel and Distributed Computing, pp 26–35
Al Assaf M, Jiang X, Abid M, Qin X (2013) Eco-storage: a hybrid storage system with energy-efficient informed prefetching. J Signal Process Syst 72(3):165–180
Song H, Yin Y, Sun X, Thakur R, Lang S (2011) Server-side I/O coordination for parallel file systems. In: Proceedings of the International Conference on High-Performance Computing, Networking, Storage, and Analysis, pp 1–11
Obaidat MS (2014) QoS-guaranteed bandwidth shifting and redistribution in a mobile cloud environment. IEEE Trans Cloud Comput 2(2):181–193
Bertholon B, Varrette S, Bouvry P (2011) Certicloud: a novel TPM-based approach to ensure cloud IaaS security. In: Proceedings of the IEEE International Conference on Cloud Computing, pp 121–130
Wang W, Li Z, Owens R, Bhargava B (2009) Secure and efficient access to outsourced data. In: Proceedings of the ACM Cloud Computing Security Workshop, pp 55–66
Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. IEEE Comput 45(1):39–45
Graf S, Lang P, Hohenadel SA, Waldvogel M (2012) Versatile key management for secure cloud storage. In: Proceedings of the IEEE 31st Symposium Reliable Distribution Systems, pp 469–474
Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: Financial Cryptography and Data Security, Springer, New York, NY, USA. pp 258–274
Paladi N, Gehrmann C, Morenius F (2013) Domain-based storage protection (DBSP) in public infrastructure clouds. In: Proceedings of the Secure IT Systems, pp 279–296
Michalas A, Komninos N, Prasad N, Oleshchuk V (2010) New client puzzle approach for DoS resistance in ad hoc networks. In: IEEE International Conference on Information Theory Information Security, Dec 2010 pp 568–573
Blanchet B (2001) An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings. 14th IEEE Computer Security Foundations Workshop
Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval in multiple clouds. IEEE Trans Cloud Comput 5(3):499–509
Ma X, Yang LT, Xiang Y, Zeng WK, Zou D, Jin H (2017) Fully reversible privacy region protection for cloud video surveillance. IEEE Trans Cloud Comput 5(3):510–522
Ahuja R, Mohanty SK (2017) A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2017.2751471
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumaresan, S., Shanmugam, V. Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile. J Supercomput 76, 6094–6112 (2020). https://doi.org/10.1007/s11227-019-03118-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-03118-8