Abstract
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment.According to IDC survey, Security was ranked and observed first utmost issue of cloud computing. As a result, protection required to secure data is directly proportional to the value of the data. The major handicap of first level of security where cryptography can help cloud computing i.e. secure storage is that we cannot outsource the processing of the data without decryption. In this paper, a novel framework to secure data access in cloud environment is implemented. Here security is addressed for securing transaction in such a way that transaction should be encrypted and decrypted by data owners only. Server performs equality, addition and subtraction on encrypted data without decryption. Moreover, access should be provided to the users as per their access rights. Security is enhanced by utilizing the concept of multicloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mell, P., Grance, T.: Draft NIST Working Definition of Cloud Computing (2009)
Armbrust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing Technical report EECS-2009-28, UC Berkeley (February 2009). http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
Rivest, R., Adleman, L., Dertouzos, M.: On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation, 169–180 (1978)
Gentry, C.: A Fully Homomorphic Encryption Scheme, PhD Thesis, Stanford University (2009). http://crypto.stanford.edu/craig
Gentry, C.: Fully homomorphic encryption using ideallattice. In: Proc. of STOC, pp. 169–178. ACM (2009)
Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: Innovations in Theoretical Computer Science Conference, pp. 309–325 (2012)
Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850–867. Springer, Heidelberg (2012)
Smart, N., Vercauteren, F.: Fully Homomorphic SIMD Operations. Designs, Codes and Cryptography (2012)
Gentry, C.: Computing Arbitrary functions on encrypted Data. Communications of the ACM, 97–105 (2010)
Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical?. In: ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)
Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)
Li, H., Dai, Y., Yang, B.: Identity-Based Cryptography for Cloud Security (2011). http://eprint.iacr.org/169.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Jain, R., Madan, S., Garg, B. (2015). Framework to Secure Data Access in Cloud Environment. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-20472-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20471-0
Online ISBN: 978-3-319-20472-7
eBook Packages: Computer ScienceComputer Science (R0)