Skip to main content

Framework to Secure Data Access in Cloud Environment

  • Conference paper
  • First Online:
Advances in Swarm and Computational Intelligence (ICSI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9141))

Included in the following conference series:

  • 1483 Accesses

Abstract

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment.According to IDC survey, Security was ranked and observed first utmost issue of cloud computing. As a result, protection required to secure data is directly proportional to the value of the data. The major handicap of first level of security where cryptography can help cloud computing i.e. secure storage is that we cannot outsource the processing of the data without decryption. In this paper, a novel framework to secure data access in cloud environment is implemented. Here security is addressed for securing transaction in such a way that transaction should be encrypted and decrypted by data owners only. Server performs equality, addition and subtraction on encrypted data without decryption. Moreover, access should be provided to the users as per their access rights. Security is enhanced by utilizing the concept of multicloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mell, P., Grance, T.: Draft NIST Working Definition of Cloud Computing (2009)

    Google Scholar 

  2. Armbrust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing Technical report EECS-2009-28, UC Berkeley (February 2009). http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html

  3. Rivest, R., Adleman, L., Dertouzos, M.: On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation, 169–180 (1978)

    Google Scholar 

  4. Gentry, C.: A Fully Homomorphic Encryption Scheme, PhD Thesis, Stanford University (2009). http://crypto.stanford.edu/craig

  5. Gentry, C.: Fully homomorphic encryption using ideallattice. In: Proc. of STOC, pp. 169–178. ACM (2009)

    Google Scholar 

  6. Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)

    Google Scholar 

  7. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: Innovations in Theoretical Computer Science Conference, pp. 309–325 (2012)

    Google Scholar 

  8. Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850–867. Springer, Heidelberg (2012)

    Google Scholar 

  9. Smart, N., Vercauteren, F.: Fully Homomorphic SIMD Operations. Designs, Codes and Cryptography (2012)

    Google Scholar 

  10. Gentry, C.: Computing Arbitrary functions on encrypted Data. Communications of the ACM, 97–105 (2010)

    Google Scholar 

  11. Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)

    Google Scholar 

  12. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical?. In: ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)

    Google Scholar 

  13. Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)

    Google Scholar 

  14. Li, H., Dai, Y., Yang, B.: Identity-Based Cryptography for Cloud Security (2011). http://eprint.iacr.org/169.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachna Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Jain, R., Madan, S., Garg, B. (2015). Framework to Secure Data Access in Cloud Environment. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20472-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20471-0

  • Online ISBN: 978-3-319-20472-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics