Skip to main content
Log in

Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The problem of public auditing has been well studied in many research articles. The methods described earlier suffer to achieve higher result in public auditing. To overcome the challenges in public auditing, the author propose a hierarchical attribute based encryption based modular padding scheme. The method organizes the cloud data in hierarchical manner and each level of attributes has been stored in semantic manner. The semantic relations of the attributes are used to select the key parameter and the same is used to encrypt or decrypt the cloud data. The semantic ontology maintains the category of data attributes and for each data attribute the ontology refers a secret key. The key from the semantic ontology is selected and the same is used to perform verification. Again the encrypted data is performed with modular padding, which selects the random number and based on the value of random number, a padding of 1 or 0 is performed. The proposed approach improves the performance of public auditing and security in cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Graph 1
Graph 2
Graph 3

Similar content being viewed by others

References

  1. Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)

    Google Scholar 

  2. Yu, Y., Mu, Y., Ni, J., Deng, J., Huang, K.: Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Network and System Security Lecture Notes in Computer Science, vol. 8792, pp. 28–40 (2014)

  3. Boopathy, D., Sundaresan, M.: Securing public data storage in cloud environment, ICT and critical infrastructure. In: Proceedings of the 48th Annual Convention of Computer Society of India, Advances in Intelligent Systems and Computing, vol. 248, pp. 555–562 (2014)

  4. Chourasiya, N.L., Lature, D. Kumavat, A., Kalaskar, V., Thaware, S.: Privacy-preserving public auditing for secure cloud storage. Int. J. Eng. Res. General Sci. 3(2) 2015

  5. Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Security and Privacy in Communication Networks, pp. 89–106 (2010)

  6. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 29th Conference on Information Communications, INFOCOM’10, pp. 525–533. IEEE Press, Piscataway, NJ, USA (2010)

  7. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2012)

    Google Scholar 

  8. Tan, S., Jia, Y.: NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Univ. Sci. 15(9), 794–804 (2014)

    Google Scholar 

  9. Umamaheswari, G., Vineela, B.: A framework for secure data sharing over cloud based on group key management. Int. J. Eng. Trends Technol. 17(6), 276–279 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Kalaivani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kalaivani, A., Ananthi, B. & Sangeetha, S. Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. Cluster Comput 22 (Suppl 2), 3783–3790 (2019). https://doi.org/10.1007/s10586-018-2346-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2346-1

Keywords

Navigation