Font Size: a A A

Cyber-Secure Data Communication Framework In Cloud Environment

Posted on:2022-04-01Degree:DoctorType:Dissertation
Country:ChinaCandidate:Sonali ChandelFull Text:PDF
GTID:1488306557962829Subject:Information & Communication Engineering
Abstract/Summary:PDF Full Text Request
Cloud computing has revolutionized data management in several domains,including engineering,health care,and finance.The cloud plays a significant role,especially in creating secure and effective data sharing.The cloud environment generally has three major components:the data owner,data user,and the cloud.The data owner uploads their data into the cloud,shared among the user based on their request.The prime requirement for effective data communication in the cloud is to ensure data security.The security of data is guaranteed through protecting its integrity,confidentiality,and privacy.Several cloud issues need to be considered,such as security,privacy,performance,accountability,ownership,performance,and other non-technical issues.Therefore,researchers are facing many challenges and need to find solutions for technical and non-technical issues.All these security issues need to be investigated deeply.Much research work has been done to secure the data in the cloud.Most renowned approaches include the application of cryptology,attribute-based encryption,and many more.Numerous researchers considered IT and its suppleness as a tool to attain the desired competitive benefits,measured a strategic defense,and as vital support to functioning and planning.Additionally,the cloud environment often involves multiple owners to control the data access.Cyber-attacks are another primary concern in deploying the cloud.Hence,for securing the data in the cloud environment,there is a need for a practical data control framework capable of preventing cyber-attacks.The main objectives of this research work are as follows:· To design and implement proposed efficient,secure flexible access control mechanisms to secure the data in the cloud environment· To create cloud-side access control to reduce the communication under cyber-attacks.· To ensure the encrypted cloud storage data to prevent the cyber-attacks in the heterogeneous systems in a cloud environment.· To have fine-grained access control and resource consumption with accountability in the cloud environmentThe contributions of the proposed work are as follows:1.A cyber-secure framework is proposed in this research work that includes a novel Ciphertext Policy-Identity Attribute-Based Encryption(CP-IDABE)scheme,which protects the data during sharing among multiple users.This framework can be employed in distributed cloud-based services where data security is vital in the communication between multiple users.In this framework,the data owner decides whether to give access to the data user or not.In this way,the data owners can protect their data from attackers.Cloud services incorporated industries that rely on the constant availability of secure data among distributed users like automotive,education,finance,healthcare,production,etc.,can apply the proposed frameworks for ensuring data security.2.The proposed framework contains two novel security models,namely,AES-CPIDABE and RSA-CP-IDABE,that involve the user's attribute and the identity to encrypt the data.CP-IDABE is combined with AES in the first model and RSA in the second model for providing 3-layer encryption.The objective is the ensure data privacy and confidentiality to prevent the system from attackers.The different types of Do S and MITM attacks and their impacts on cloud communication are also studied.The first model is tested with the Do S attack dataset,and the second model is tested with the MITM attack dataset.3.The simulation of the proposed AES-CP-IDABE model is carried out to analyze and assess the communication between the user and the data owner and the user's execution time.In the proposed scheme,the data have been double encrypted initially through the ABE,along with the attributes and the identity of the user.Secondly,the AES is used to encrypt the encrypted data and provide it to authorized users.The user access control is established using the digital signature with the help of user ID and security keys.The outcome shows that the proposed scheme is more effective than the existing scheme of ABE over execution,encryption,and decryption time.Additionally,the performance over Do S detection and impact of attribute numbers for the proposed scheme is also studied to prove its effectiveness.4.The performance of the proposed RSA-CP-IDABE algorithm is evaluated for its time used for encryption,decryption,and execution for varying sizes of data.Both the multiowners and multi-users of the data stored on the cloud are provided with the public and distinct secret keys generated by the Automated Certificate Authority(ACA).The attribute policy differentiates between the user and owner for accessing the cloud data.The proposed RSA-CP-IDABE algorithm also prevents the Man in the Middle(MITM)attack effectively.The obtained results are compared with the existing frameworks to show their effectiveness.The performance of MITM detection is also analyzed to prove its effectiveness.The proposed framework is evaluated based on encryption,decryption time,and cost.It is compared with the existing frameworks that are established to secure data.The comparison showed that the proposed framework is much more effective than the existing frameworks.
Keywords/Search Tags:Cloud, Multi-User, Multi-Owner, Cyber-Attack, Advanced Encryption Standard, Rivest-Shamir-Adelman, Ciphertext, Identity, Attribute-Based Encryption, DoS Detection, MITM
PDF Full Text Request
Related items