Skip to main content
Log in

A secure transaction of cloud data using conditional source trust attributes encryption mechanism

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Cloud storage enables users to store their data and enjoy high-quality cloud applications based on transaction processing. Normally, the wholesaler has real servers which host products and services from different locations, provide the end-users to simply log on to the network and perform transaction processing. However, the dynamic data update after transaction processing in cloud does not provide an optimal security framework. Besides, the cloud data storage is not focusing on maximizing the security on performing the transactions over cloud servers. In order to overcome such limitations in cloud, a novel framework named conditional source trust attribute encryption with particle swarm-based transaction optimization (CSTAE-PSTO) is proposed. The conditional attributes are encrypted using the conditional source trust attribute encryption technique along with the bilinear mapping transformation function in CSTAE-PSTO framework to improve the security level through unique secured identity number. The PSTO technique on cloud applications optimizes the result with minimal transaction completion time. Experiment is conducted based on factors such as throughput level on transaction, security rate on data layer and transaction completion time. Experimental analysis shows that the CSTAE-PSTO framework is able to improve the security rate on data layer and reduce the transaction completion time when compared to the state-of-the-art works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Al-maamari A, Omara FA (2015) Task scheduling using PSO algorithm in cloud computing environments. Int J Grid Distrib Comput 8(5):245–256

    Article  Google Scholar 

  • Cheng L, Wang C (2013) Network performance isolation for latency-sensitive cloud applications. Future Gener Comput Syst 29(4):1073–1084

    Article  Google Scholar 

  • Di S, Wang C (2013a) Dynamic optimization of multiattribute resource allocation in self-organizing clouds. IEEE Trans Parallel Distrib Syst 24(3):464–478

  • Di S, Wang C (2013b) Error-tolerant resource allocation and payment minimization for cloud system. IEEE Trans Parallel Distrib Syst 24(6):1097–1106

  • Di S, Wang C, Chen L (2013) Ex-post efficient resource allocation for self-organizing cloud. J Comput Electr Eng 39(7):2342–2356

    Article  Google Scholar 

  • He H, Li R, Dong X, Zhang Z (2014) Secure, efficient and fine-grained data control mechanism for P2P storage cloud. IEEE Trans Cloud Comput 2(4):471–484

    Article  Google Scholar 

  • Inbarani WS, Shenbagamoorthy G, Paul CKC (2013) Proxy re-encryption schemes for data storage security in cloud—a survey. Int J Eng Res Technol 2(1):1–5

    Article  Google Scholar 

  • Karimi M (2014) Hybrid discrete particle swarm optimization for task scheduling in grid computing. Int J Grid Distrib Comput 7(4):93–104

  • Khedkar SV, Gawande AD (2014) Data partitioning technique to improve cloud data storage security. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3347–3350

    Google Scholar 

  • Kumar GP, Reddy KS, Raviteja C, Arif SM (2014) PABKE: Provable attribute-based keyword explore over outsourced encrypted data. Int J Comput Eng Res Trends 1(5):271–276

  • Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354

    Article  Google Scholar 

  • Li K, Wang J, Zhang Y, Ma H (2014) Key policy attribute-based proxy re-encryption and RCCA secure scheme. J Internet Serv Inf Secur (JISIS) 4(2):70–82

    Google Scholar 

  • Lin J, Chen C, Chang JM (2013) QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Trans Cloud Comput 1(1):101–115

    Article  Google Scholar 

  • Naruse T, Mohri M, Shiraishi Y (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum Centric Comput Inf Sci 5(8):1–13

    Google Scholar 

  • Shu J, Shen Z, Xue W (2014) Shield: a stackable secure storage system for file sharing in public storage. J Parallel Distrib Comput 74:2872–2883

    Article  Google Scholar 

  • Sookhak M, Talebian H, Ahmed E, Gani A, Khan MK (2014) A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43:121–141

    Article  Google Scholar 

  • Zhou L, Aradharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960

    Article  Google Scholar 

  • Zhu Y, Hu H, Ahn G, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Brindha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Brindha, T., Shaji, R.S. A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Comput 22, 1013–1022 (2018). https://doi.org/10.1007/s00500-016-2405-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2405-6

Keywords

Navigation