SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 7, No. 2, April 2017, pp. 950~960
ISSN: 2088-8708, DOI: 10.11591/ijece.v7i2.pp950-960  950
Journal homepage: http://iaesjournal.com/online/index.php/IJECE
An Improved Integrated Hash and Attributed based Encryption
Model on High Dimensional Data in
Cloud Environment
Satheesh K S V A Kavuri1
, Gangadhara Rao Kancherla2
, Basaveswararao Bobba3
1
Dhanekula Institute Of Engineering & Technology, Departement of CSE, India
2,3
Departement of CSE, Acharya Nagarjuna University, India
Article Info ABSTRACT
Article history:
Received Jul 18, 2016
Revised Feb 16, 2017
Accepted Mar 4, 2017
Cloud computing is a distributed architecture where user can store their
private, public or any application software components on it. Many cloud
based privacy protection solutions have been implemented, however most of
them only focus on limited data resources and storage format. Data
confidentiality and inefficient data access methods are the major issues
which block the cloud users to store their high dimensional data. With more
and more cloud based applications are being available and stored on various
cloud servers, a novel multi-user based privacy protection mechanism need
to design and develop to improve the privacy protection on high dimensional
data. In this paper, a novel integrity algorithm with attribute based encryption
model was implemented to ensure confidentiality for high dimensional data
security on cloud storage. The main objective of this model is to store,
transmit and retrieve the high dimensional cloud data with low computational
time and high security. Experimental results show that the proposed model
has high data scalability, less computational time and low memory usage
compared to traditional cloud based privacy protection models.
Keyword:
Cloud security
CP-ABE
Hardware based encryption
Integrity and hashing
Integrity verification
Copyright © 2017 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Satheesh K S V A Kavuri,
Departement of Computer Science and Engineering,
Dhanekula Institute Of Engineering & Technology,
Vijayawada-521 139, Krishna (Dt.), AP. India.
Email: kns9@live.com
1. INTRODUCTION
Cloud refers to storing and accessing the user’s private or public data in a remote server space
instead of storing it in the local database of their personal computer. Cloud computing is a distributed
architecture that provides on-demand, convenient network access to store high dimensional data with
configuranle computing resources such as servers, storage and applications. Cloud servers share their
computing resources as a service in a distributed manner to the connected clients by means of network
connection. These shared resources are offered on demand or customers pay for their usage level [1].
Information security in distributed cloud computing deals with data protection using different
encryption and decryption models. Data security involves securing data from being destroyed, lost or
modified or corrupted. So, availability and correctness of cloud data must be assured using various
encryption and decryption models. Also, data encryption with integrity verification mechanism are familiar
models to solve security issue [2]. Various security frameworks with protecting data both from cloud side
and client side are implemented in the literature for data security. But computational requirements and
processing speed play a vital role in deployment of these cloud security models in cloud computing
environment.
IJECE ISSN: 2088-8708 
An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri)
951
Encryption-based access control has several advantages over classical cloud access control. In a
classical setup, as depicted in Figure 1, data is stored unencrypted on the server and the user needs to
authenticate each time she wants to retrieve data from the server. The server is required to authorize the user's
request before it sends the plaintext data to the user. Letting the server authorize the user's requests allows for
exible and fine-grained access control. However, the server needs to be trusted and well-protected. Instead of
storing the data in plaintext format on the server, one could encrypt the data and store this on the server. This
has the advantage that the server is not burdened with the authorization and authentication of users.
Moreover, the data can be stored on many|even untrusted|servers, as it is encrypted anyway [3].
Figure 1. Classical cloud access control
1.1. ABE Basic Steps
Setup This algorithm is run before all other algorithms and determines the public parameters (PK)
and a master key (MK) for the KGA. The PK determines the set of all possible attributes and all user keys
will be derived from the MK [1].
Key Generation: The KGA can create new decryption keys for users using its MK. A user's private
key (SK) is derived from the MK by randomizing the MK in such a way that the user cannot convert the SK
back to the MK. To decide which construction is preferred, we need to estimate how many attributes will be
used by a key generation authority (KGA). If each KGA uses a small set of attributes, the small universe
seems more desirable, as it is in general less computationally intensive. The ciphertext consists of multiple
parts. One of these parts is a randomly chosen secret number operating on the plaintext. The other parts are
needed to reconstruct this secret number. Using a secret sharing scheme that splits the secret number into
various parts, the access structure is enforced by using these in parts of the ciphertext [4]. To prevent user
collusion, each SK is randomized by a unique, user-speci_c number, or, the key is bound to a fixed global
identifier (GID) of the user.
Access structures are used to define which users have access to which resources. In the case of
attribute-based authentication, attributes determine the authorization level of the user. An access structure can
be regarded as a collection of sets of attributes. Each single set describes which attributes are needed to be
granted access. As long as the user's attributes satisfy at least one set in the collection, the user is granted
access. There are two kinds of access structures: monotonic and non-monotonic. Monotonic access structures
ensure that whenever a user would be granted access based on a subset of his attributes, he will be granted
access based on all his attributes. This means that no negations of attributes are possible. Nonmonotonic
access structures do allow such negation of attributes. Here, the possession of an extra attribute may deny
you access. Fuzzy Identity based encryption scheme in which a descriptive attributes set are considered as
identity for encryption and decryption process. For the privacy or secret key ASk corresponds to the attribute
set S. We can decrypt the data using '
AS
k corresponds to the attribute set
'
s and satisfies the condition
'
| |S S d  ,where d is the minimum number of attributes.
2. LITERATURE SURVEY
Integrity and authentication of data in cloud environment are essential issues to ensure that data
confidentiality and privacy preserving to the customer’s data or queries. Problem of dealing with user’s
queries and encrypted data over cloud environment were discussed widely in research literature [2-5] try to
memory integrity checking to address integrity issues by applying Hash tree over memory content. An
integrity verification approach [7] in hybrid clouds is applied to support the data migration and scalability
service is implemented on limited data. Table 1 shows the various Attribute Based Encryption Schems
Cloud User Cloud Server
(Plain Text)Authorized Content Access
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 950 – 960
952
Table 1. Various Attribute Based Encryption Schems
Sl. No Method Parameter Drawbacks
1 Provable Data Possession [7]
RSA based homomorphism
linear model
It may leak user’s data to the third party
users
2 ABE [8]
Setup,
Public and secret keys
Doesn’t support secure communication in
cloud environment
3 CP-ABE [9]
Attributes,
Policies,
Key Generators
As the number of attributes size or
storage space increases, computational
time also increases.
4 KP-ABE [10]
Key policies,
Attributes,
Key generation
Fail to construct the access policy
patterns for multiple cloud storage
services.
Require a number of exponential generators for private key computation which is a significant
computation ovehead.Also it requires Random oracle model which is less secure than other standard models.
Both the cipher texts and private keys are labeled with an policy set and attribute set , the decryption will
succeed only if there exist at least k common attributes between the cipher text and a private key.
The traditional models ensure data security by using encryption is not optimal in the cloud virtual
machines of cloud providers. Although the trusted third party authorities are aware of the malicious insider,
they assume that they have limited solutions to overcome these issues. A secured, cost-effective multi-cloud
storage method is implemented in cloud environment which controls an economical distribution of
information among the available cloud instances to provide the customers with secure storage and data
availability. A high performance cloud computing service is implemented that integrates the parallel
processing framework and checkpoint infrastructure such as Message passing interface for virtual machines.
In the cloud server attacks, the length of the overlapping runtime of the cloud instances and
malicious virtual machines is important to find the network bandwidth. Since limiting the overlapping
execution times may degrade the network performance and increase the error rate. Jung et. al. [8] proposed a
model that encrypts cloud data with user’s attributes and send it to the remote cloud server for long term
access. The cloud providers not only generate access rights to users, but also compute a secret key using
attributes and policies. In this case, KDC is not required. The major issue with this approach is that users can
get different keys from different owners for the same attribute, which increases the total number of secret
keys to the users along with storage and communication overhead.
3. PROPOSED METHOD
In this proposed model, each cloud uploads high dimentional documents as input to our encoded
process as shown in Figure 2. In this framework, user’s each document is hashed using the proposed cloud
hardware based hash algorithm. Computed hash value along with the user’s document data are encrypted
using the proposed ABE encryption model. Our proposed encryption model initializes cloud server
parameters for key generation, encryption and decryption process. Encrypted hash and user’s data are
uploaded to the cloud storage with integrity value in encoded format. Similarly, each user decrypts the
encoded hash and data from the cloud storage using the decoding process as shown in Figure 3. In the
decoding process, each user’s encoded data from the cloud is decrypted using the proposed ABE decryption
model. Integrity verification of the decrypted plain text is checked against the decrypted hash value for data
modification verification. If the data is not modified then it is accessed to the user’s system through the
internet.
Figure 4. Shows the overview of the multi-data partition using available cloud servers. In this
process, cloud user’s multiple documents are partitioned and assigned to the nearest cloud servers using the
data block size.
IJECE ISSN: 2088-8708 
An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri)
953
Figure 2. Parallel Multi-Doc Hash based
Encryption Model
Figure 3. Parallel Multi-Doc Hash based Decryption
Model
Figure 4. Multi-Data Partition based on Available Data-Centers
3.1. Multi-File Data Partition Algorithm
Input: User Data Files
 [] be the number of available cloud instance servers.
 [] be the list of data storage zones.
Output: File wise partitions.
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 950 – 960
954
Procedure:
For each file in the Folder
Read data file f,
Let N bet the number of partitions, each with bytes bits.
Divide data-file into N partitions each with bytes.
N=f.size/1024;
Data[] dt;
For each i=0 to N
Do
For each partition p in N
Do
Let D be the block size in KB, the minimal size can be computed using
If(
n n
i 1 i 1
|f[i 1],p]| |f[i],p]|
D max{ , }
MinBlockSize MaxBlockSize
 


 
)
then
Assign file index f[p,i] to p.
 [i]=count(f[p,i], [i]) // distributing different
partition data in cloud servers.
Append data center [i]’s instance ID .
Else
Dt[]=f[p,i];
End if
Done
For(int k=0;k< .length;k++)
Do
If( [k]==empty)
Then
 [k]=count(Dt[], [i]) // distributing different
partition data in cloud servers.
Append data center [k] to the queing list.
Else
Continue;
done
Done
Done
3.2. Parallel multi-doc based Hash Algorithm (PMHA)
Input: Multiple File data partitions.
Output: 1024-bit hash value.
Procedure:
Proposed parallel hash algorithm use 10 rounds to generate compressed hash code. In each round 1024-bit
partitioned data as an input. Each round follows three phases namely.
1. Transformed Data Conversion State Representation.
2. Cloud User Policy based Substitution Box.
3. User Access Policy Based Shift Columns in right to left and left to right.
3.3. Overview of each phase
Phase 1:
In this phase, user partitioned data is converted into sub-partitions as follows:
Let 0 1 2 3, , , ,..i i i i i NFP FP FP FP FP are the ith file data partitions with 1024 bit size. Each partition is
represented in the form of list as shown below.
0 0 0 0
0 0 0 0 0 1 0 2 0 1024, , ....F P F d F d F d F d ……… 1 1 1 1
10 0 0 0 1 0 2 0 1024, , .... n n n n
nF P Fd Fd Fd Fd
IJECE ISSN: 2088-8708 
An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri)
955
0 0 0 0
1 1 1 0 1 1 1 2 1 1024, , ....FP Fd Fd Fd Fd ……… 2 2 2 2
21 1 0 1 1 1 2 1 1024, , .... n n n n
nFP Fd Fd Fd Fd
.
.
.
0 1 2 1024, , .... N N N N
N M N N N NF P F d F d F d F d ……… 1 1 1 1
10 0 0 0 1 0 2 0 1024, , .... n n n n
nF P Fd Fd Fd Fd
For each file partition i jF P
Do
Each file Partition is divided into N blocks of 64 bits’ block size. Here w is 8 blocks. So 0 0F P can
be further partitioned into sub-partition as:
0 0 0 0
0 0 0 1 2 15, , ... F P SP SP SP SP
0 0 1 2 63
0 0 0 0 0
0 0 1 2 63
1 1 1 1 1
0 0 1 2 63
2 2 2 2 2
0 0 1 2 63
, , ....
, , ....
, , ....
.
.
,
, , ....n n n n n
SP Sd Sd Sd Sd
SP Sd Sd Sd Sd
SP Sd Sd Sd Sd
SP Sd Sd Sd Sd




Similarly, 0 1 2 7, , ...  N N N N
N MF P SP SP SP SP .
Non-Linear Sub-Partition Substitution
For each sub-partition
Do
2
[ *( ) * ]mod3  i i iTSP a SP b SP c
i=0….16
Where
a=number of AND policies.
b=number of OR policies.
c=number of ANY policies.
Done
Phase 2
In this phase, transformed sub-partition data is taken as source data. User access policy data is
represented as state matrix. For each dynamic user access policy, random dynamic S-Box is generated to
each authorized cloud user.
Phase 3
In this phase, input data are shifted from left to right in column wise using authorized cloud user
parameters. Depends on the user access in the policy structure, three parameters are calculated. These three
parameters are used to transform columns left to right and then similarly shift row wise in the reverse order.
Key Generation Process
Input: Total User Access Policies
Procedure:
Step 1: Construct 1024 bits state matrix using Total User Access Policies.
Step 2: Select 1024 bits randomly from 1024 bits using pattern / permutation matrix.
Step 3: Select 1024 bits is assigned to each round function of hash algorithm.
Step 4: Repeat steps 1 to 3 until 10 rounds.
Encrytion and Decryption Proposed approach follows four phases:
1. Setup
2. Key Generation
3. Encryption Process
4. Decryption Process
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 950 – 960
956
Setup
Setup algorithm takes , ,   ,G,e with G= G G G    .p,q,r are the elements in Zp. First
compute , ,p q rg g g are the generators of , ,G G G   respectively. Following algorithm generates setup
parameters for the given Total policy pattern (T.P). Given Total policy pattern is divided into three patterns
with AND ( ), OR( ),*. Algorithm takes Attribute list Attlist, Policy list polilist, operator’s list oplist and
operators position list poslist as input and generates hashcodes of three policy patterns of policy list.
Input:
List:=Polilist, Attlist, Oplist,Poslist. Hardware parameters
Procedure:
'
1H =HextoDecimal(Hash(pat1)); i=0…pat1.length.
'
2H =HextoDecimal(Hash(pat2)); i=0…pat2.length.
'
3H =HextoDecimal(Hash(pat2)); i=0…pat2.length.
' ' ' '
1 2 3H H H hardwareparams;S    
Public Key= {
'
S , , ,p q rg g g , , ,G G G   ,
' ' '
1 2 3H ,H ,H ;}; [1]
Master key= { , ,   }; known to T.A
Key Generation
Key Generation algorithm will take set of attributes, Policy pattern hash values as input and returns
Secret key as output. Each user is associated with secret key and it will be generated using three pattern keys
as
'
1/( )
1,i ;S
pK g 
 i=0…..pat1.length;
'
1/( )
1,j ;S
qK g 
 j=0…..pat2.length;
'
1/( )
1,k ;S
rK g 
 k=0….pat3.lenght;
Secret key = {Tp, Hash (pat1), Hash (pat2), Hash (pat3), 1,i 1,j 1,k, ,K K K };
Encryption Process
Encryption algorithm encrypts the message using policy pattern structures. Algorithm uses three
patterns with homomorphic encryption and decryption process. Additive and Multiplicative homomorphism
takes two inputs and generate secure encrypted values as output. Homomorphic encryption and decryption
uses 0C ,
'
0C as input.
For each pair of file partition f[i] data
Do
For each character j in f[i]
1M =f[i][j];
2M = f[i+1][j];
IJECE ISSN: 2088-8708 
An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri)
957
Additive Homomorphic Encryption
1 2 1 2( ) ( ) ( );Enc M M Enc M Enc M  
Multiplicative Homomorphic Encryption
1 2 1 2( . ) ( ). ( );Enc M M Enc M Enc M
1 0:M C ;
'
2 0:M C ; // |P| is partition size
Enc( 1M ):=Enc( 0C )=( 0C + *  )mod n where n= *  ;
Enc( 2M ):=Enc(
'
0C )=(
'
0C + *  )mod n where n= *  ;
1 2( )Enc M M =Enc(
'
0 0C C )
=Enc( 0C )+Enc(
'
0C );
=( 0C + *  )mod n+(
'
0C + *  )mod |P|
Enc( 1 2.M M ) =Enc(
'
0 0.C C )
=Enc( 0C ).Enc(
'
0C );
=( 0C + *  )mod n. +(
'
0C + *  )mod |P|
Cipher Text CT={ T.P,
' ' '
1 2 3H ,H ,H ,M.e( 1 2( )Enc M M ,Enc( 1 2.M M )) ,{ 1, 2,j 3,k, ,iC C C },C};
Done
Cipher Text CT is publicly available to all the attribute policy holders. This CT will be decrypted only those
users who has exact policy matching patterns.
'
( )
( , )S
p pe g g    
.
| |
1, 1,
1
( , )


P
i i
i
e C K .
| |
2,j 1,j
1
( , )


P
j
e C K .
| |
3,k 1,k
1
( , )


P
k
e C K
M.
'
( )
( , )S
p pe g g    
.1.1.1
M.
'
( )
( , )S
p pe g g    
Now Based on the user entered policy A and D parameters may vary as
If user entered policy is in pattern1 then
1,iD pg

1,i pA g 

If user entered policy is in pattern2 then
2,jD pg

2,j pA g 

If user entered policy is in pattern3 then
3,kD pg

3,k pA g 

 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 950 – 960
958
4. RESULTS AND ANALYSIS
All experiments are performed with the real time Amazon aws cloud servers and client
configurations as Intel(R) CPU 2.13GHz, 4 GB RAM, and the minimum OS platform is Microsoft
Windows 7 Professional (SP2). This framework requires third party libraries cpabe, abe, amazon aws, and
jama.etc.
Figure 5. Proposed Parallel Hashing Process
Table 2. Comparison of Hash based Encryption and DecryPtion models
Algorithm
DataSize
(KB)
HashTime
(ms)
EncryptionTime
(ms)
DecryptionTIme
(ms)
CPABE+MD5 >1500 4746 7330 5766
KPABE+SHA12 >1500 5844 5866 5432
FHEncrytion+SHA256 >1500 6834 7955 7198
DUPHA+HybridABE >1500 2365 3686 3519
ParallelHash+Hybrid ABE >3000 2178 3286 3316
From the Table 2, it is clear that proposed parallel ABE based encryption and decryption model has
less computational time compared to traditional models in cloud environment. From the Figure 5, it is clear
that proposed parallel multi-doc hash model has less computational time compared to traditional models in
cloud environment. From the figure 6, it is clear that proposed parallel ABE based encryption and decryption
model has less computational time compared to traditional models in cloud environment. From the Table 3, it
is clear that proposed parallel hash based ABE encryption and decryption model has less cloud storage
computation compared to traditional models ABE on cloud environment. From the Figure 7, it is clear that
proposed parallel hash based ABE encryption and decryption model has less cloud storage computation
compared to traditional models ABE on cloud environment.
Table 3. Memory storage comparison with traditional ABE models encryption and decryption time
Algorithm DataSize (KB) Cloud Storage (KB)
CPABE+MD5 500 545
KPABE+SHA12 500 574
FHEncrytion+SHA256 500 541
DUPHA+HybridABE 500 417
ParallelHash+Hybrid ABE 500 359
Round (R1)
Round (R2)
Round (R3)
Round (R10)
…….
1024-bit Partition data
KeyGeneration
1024
Bits
IJECE ISSN: 2088-8708 
An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri)
959
Figure 5. Proposed parallel multi-doc hash
computation
Figure 6. Proposed parallel multi-doc
Figure 7. Proposed parallel multi-doc storage computation
5. CONCLUSION
Cloud data outsourcing through un-authorized clients and distributed systems are exponentially
increasing cloud hardware and software resources. Cloud environment provides on demand resource
allocation from a shared pool of hardware and software resources. With more and more cloud based
applications are being available and stored on various cloud servers, a novel multi-user based privacy
protection mechanism need to design and develop to improve the privacy protection on high dimensional
data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to
ensure confidentiality for high dimensional data security on cloud storage.The main objective of this model is
to store, transmit and retrieve the high dimensional cloud data with low computational time and high
security.Experimental results show that the proposed model has high data scalability, less computational time
and low memory usage compared to traditional cloud based privacy protection models.
REFERENCES
[1] L. Ibraimi, et al., “Efficient and provable secure ciphertext-policy attribute-based encryption schemes,” Proc. 5th
Int. Conf. Inf. Secur. Pract. Exper., vol. 5451, pp. 1-12.
[2] J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Trans. Knowl. Data Eng.,
vol/issue: 25(10), pp. 2271-2282, 2013.
[3] J. Lai, et al., “Attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forensics
Security, vol/issue: 8(8), pp. 1343-1354, 2013.
[4] Hur, “Attribute-based secure data sharing with hidden policies in smart grid,” IEEE Transactions on Parallel and
Distributed Systems, vol/issue: 24(11), 2013.
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 950 – 960
960
[5] S. Hohenberger and B. Waters, “Online/offline attribute-based encryption,” Public-Key Cryptography PKC, vol.
8383, 2014.
[6] J. K. Liu and J. Zhou, “An efficient identity-based online/offline encryption scheme,” ACNS, pp. 156C167, 2009.
[7] F. G. Y. Mu and Z. Chen, “Identity-based online/offline encryption,” Financial Cryptography, pp. 247C261, 2008
[8] T. Jung, et al., “Control cloud data access privilege and anonymity with fully anonymous attribute-based
encryption,” IEEE Trans. on Info. Forensics and Security, vol/issue: 10(1), pp. 190-199, 2015.
[9] J. Li, et al., “Securely outsourcing attribute-based encryption with checkability,” IEEE Trans. on Parallel and
Distributed Systems, vol/issue: 25(8), pp. 2201-2210, 2014.
[10] J. Han, et al., “Improving privacy and security in decentralized ciphertext-policy attribute-based encryption,” IEEE
Trans. on Info. Forensics and Security, vol/issue: 10(3), pp. 665-678, 2015.

More Related Content

What's hot

survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
IOSR Journals
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
Nahan Rahman
 
H1803035056
H1803035056H1803035056
H1803035056
IOSR Journals
 
Ppt 1
Ppt 1Ppt 1
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
V5 i7 0169
V5 i7 0169V5 i7 0169
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud Database
IJTET Journal
 

What's hot (20)

survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
H1803035056
H1803035056H1803035056
H1803035056
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud Database
 

Similar to An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment

Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Paper1
Paper1Paper1
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
IJCSIS Research Publications
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
R180203114117
R180203114117R180203114117
R180203114117
IOSR Journals
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
IJMTST Journal
 

Similar to An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment (20)

Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Paper1
Paper1Paper1
Paper1
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
R180203114117
R180203114117R180203114117
R180203114117
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 

More from IJECEIAES

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
IJECEIAES
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
IJECEIAES
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 

More from IJECEIAES (20)

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 

Recently uploaded

132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 

Recently uploaded (20)

132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 

An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 2, April 2017, pp. 950~960 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i2.pp950-960  950 Journal homepage: http://iaesjournal.com/online/index.php/IJECE An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment Satheesh K S V A Kavuri1 , Gangadhara Rao Kancherla2 , Basaveswararao Bobba3 1 Dhanekula Institute Of Engineering & Technology, Departement of CSE, India 2,3 Departement of CSE, Acharya Nagarjuna University, India Article Info ABSTRACT Article history: Received Jul 18, 2016 Revised Feb 16, 2017 Accepted Mar 4, 2017 Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models. Keyword: Cloud security CP-ABE Hardware based encryption Integrity and hashing Integrity verification Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Satheesh K S V A Kavuri, Departement of Computer Science and Engineering, Dhanekula Institute Of Engineering & Technology, Vijayawada-521 139, Krishna (Dt.), AP. India. Email: kns9@live.com 1. INTRODUCTION Cloud refers to storing and accessing the user’s private or public data in a remote server space instead of storing it in the local database of their personal computer. Cloud computing is a distributed architecture that provides on-demand, convenient network access to store high dimensional data with configuranle computing resources such as servers, storage and applications. Cloud servers share their computing resources as a service in a distributed manner to the connected clients by means of network connection. These shared resources are offered on demand or customers pay for their usage level [1]. Information security in distributed cloud computing deals with data protection using different encryption and decryption models. Data security involves securing data from being destroyed, lost or modified or corrupted. So, availability and correctness of cloud data must be assured using various encryption and decryption models. Also, data encryption with integrity verification mechanism are familiar models to solve security issue [2]. Various security frameworks with protecting data both from cloud side and client side are implemented in the literature for data security. But computational requirements and processing speed play a vital role in deployment of these cloud security models in cloud computing environment.
  • 2. IJECE ISSN: 2088-8708  An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri) 951 Encryption-based access control has several advantages over classical cloud access control. In a classical setup, as depicted in Figure 1, data is stored unencrypted on the server and the user needs to authenticate each time she wants to retrieve data from the server. The server is required to authorize the user's request before it sends the plaintext data to the user. Letting the server authorize the user's requests allows for exible and fine-grained access control. However, the server needs to be trusted and well-protected. Instead of storing the data in plaintext format on the server, one could encrypt the data and store this on the server. This has the advantage that the server is not burdened with the authorization and authentication of users. Moreover, the data can be stored on many|even untrusted|servers, as it is encrypted anyway [3]. Figure 1. Classical cloud access control 1.1. ABE Basic Steps Setup This algorithm is run before all other algorithms and determines the public parameters (PK) and a master key (MK) for the KGA. The PK determines the set of all possible attributes and all user keys will be derived from the MK [1]. Key Generation: The KGA can create new decryption keys for users using its MK. A user's private key (SK) is derived from the MK by randomizing the MK in such a way that the user cannot convert the SK back to the MK. To decide which construction is preferred, we need to estimate how many attributes will be used by a key generation authority (KGA). If each KGA uses a small set of attributes, the small universe seems more desirable, as it is in general less computationally intensive. The ciphertext consists of multiple parts. One of these parts is a randomly chosen secret number operating on the plaintext. The other parts are needed to reconstruct this secret number. Using a secret sharing scheme that splits the secret number into various parts, the access structure is enforced by using these in parts of the ciphertext [4]. To prevent user collusion, each SK is randomized by a unique, user-speci_c number, or, the key is bound to a fixed global identifier (GID) of the user. Access structures are used to define which users have access to which resources. In the case of attribute-based authentication, attributes determine the authorization level of the user. An access structure can be regarded as a collection of sets of attributes. Each single set describes which attributes are needed to be granted access. As long as the user's attributes satisfy at least one set in the collection, the user is granted access. There are two kinds of access structures: monotonic and non-monotonic. Monotonic access structures ensure that whenever a user would be granted access based on a subset of his attributes, he will be granted access based on all his attributes. This means that no negations of attributes are possible. Nonmonotonic access structures do allow such negation of attributes. Here, the possession of an extra attribute may deny you access. Fuzzy Identity based encryption scheme in which a descriptive attributes set are considered as identity for encryption and decryption process. For the privacy or secret key ASk corresponds to the attribute set S. We can decrypt the data using ' AS k corresponds to the attribute set ' s and satisfies the condition ' | |S S d  ,where d is the minimum number of attributes. 2. LITERATURE SURVEY Integrity and authentication of data in cloud environment are essential issues to ensure that data confidentiality and privacy preserving to the customer’s data or queries. Problem of dealing with user’s queries and encrypted data over cloud environment were discussed widely in research literature [2-5] try to memory integrity checking to address integrity issues by applying Hash tree over memory content. An integrity verification approach [7] in hybrid clouds is applied to support the data migration and scalability service is implemented on limited data. Table 1 shows the various Attribute Based Encryption Schems Cloud User Cloud Server (Plain Text)Authorized Content Access
  • 3.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 950 – 960 952 Table 1. Various Attribute Based Encryption Schems Sl. No Method Parameter Drawbacks 1 Provable Data Possession [7] RSA based homomorphism linear model It may leak user’s data to the third party users 2 ABE [8] Setup, Public and secret keys Doesn’t support secure communication in cloud environment 3 CP-ABE [9] Attributes, Policies, Key Generators As the number of attributes size or storage space increases, computational time also increases. 4 KP-ABE [10] Key policies, Attributes, Key generation Fail to construct the access policy patterns for multiple cloud storage services. Require a number of exponential generators for private key computation which is a significant computation ovehead.Also it requires Random oracle model which is less secure than other standard models. Both the cipher texts and private keys are labeled with an policy set and attribute set , the decryption will succeed only if there exist at least k common attributes between the cipher text and a private key. The traditional models ensure data security by using encryption is not optimal in the cloud virtual machines of cloud providers. Although the trusted third party authorities are aware of the malicious insider, they assume that they have limited solutions to overcome these issues. A secured, cost-effective multi-cloud storage method is implemented in cloud environment which controls an economical distribution of information among the available cloud instances to provide the customers with secure storage and data availability. A high performance cloud computing service is implemented that integrates the parallel processing framework and checkpoint infrastructure such as Message passing interface for virtual machines. In the cloud server attacks, the length of the overlapping runtime of the cloud instances and malicious virtual machines is important to find the network bandwidth. Since limiting the overlapping execution times may degrade the network performance and increase the error rate. Jung et. al. [8] proposed a model that encrypts cloud data with user’s attributes and send it to the remote cloud server for long term access. The cloud providers not only generate access rights to users, but also compute a secret key using attributes and policies. In this case, KDC is not required. The major issue with this approach is that users can get different keys from different owners for the same attribute, which increases the total number of secret keys to the users along with storage and communication overhead. 3. PROPOSED METHOD In this proposed model, each cloud uploads high dimentional documents as input to our encoded process as shown in Figure 2. In this framework, user’s each document is hashed using the proposed cloud hardware based hash algorithm. Computed hash value along with the user’s document data are encrypted using the proposed ABE encryption model. Our proposed encryption model initializes cloud server parameters for key generation, encryption and decryption process. Encrypted hash and user’s data are uploaded to the cloud storage with integrity value in encoded format. Similarly, each user decrypts the encoded hash and data from the cloud storage using the decoding process as shown in Figure 3. In the decoding process, each user’s encoded data from the cloud is decrypted using the proposed ABE decryption model. Integrity verification of the decrypted plain text is checked against the decrypted hash value for data modification verification. If the data is not modified then it is accessed to the user’s system through the internet. Figure 4. Shows the overview of the multi-data partition using available cloud servers. In this process, cloud user’s multiple documents are partitioned and assigned to the nearest cloud servers using the data block size.
  • 4. IJECE ISSN: 2088-8708  An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri) 953 Figure 2. Parallel Multi-Doc Hash based Encryption Model Figure 3. Parallel Multi-Doc Hash based Decryption Model Figure 4. Multi-Data Partition based on Available Data-Centers 3.1. Multi-File Data Partition Algorithm Input: User Data Files  [] be the number of available cloud instance servers.  [] be the list of data storage zones. Output: File wise partitions.
  • 5.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 950 – 960 954 Procedure: For each file in the Folder Read data file f, Let N bet the number of partitions, each with bytes bits. Divide data-file into N partitions each with bytes. N=f.size/1024; Data[] dt; For each i=0 to N Do For each partition p in N Do Let D be the block size in KB, the minimal size can be computed using If( n n i 1 i 1 |f[i 1],p]| |f[i],p]| D max{ , } MinBlockSize MaxBlockSize       ) then Assign file index f[p,i] to p.  [i]=count(f[p,i], [i]) // distributing different partition data in cloud servers. Append data center [i]’s instance ID . Else Dt[]=f[p,i]; End if Done For(int k=0;k< .length;k++) Do If( [k]==empty) Then  [k]=count(Dt[], [i]) // distributing different partition data in cloud servers. Append data center [k] to the queing list. Else Continue; done Done Done 3.2. Parallel multi-doc based Hash Algorithm (PMHA) Input: Multiple File data partitions. Output: 1024-bit hash value. Procedure: Proposed parallel hash algorithm use 10 rounds to generate compressed hash code. In each round 1024-bit partitioned data as an input. Each round follows three phases namely. 1. Transformed Data Conversion State Representation. 2. Cloud User Policy based Substitution Box. 3. User Access Policy Based Shift Columns in right to left and left to right. 3.3. Overview of each phase Phase 1: In this phase, user partitioned data is converted into sub-partitions as follows: Let 0 1 2 3, , , ,..i i i i i NFP FP FP FP FP are the ith file data partitions with 1024 bit size. Each partition is represented in the form of list as shown below. 0 0 0 0 0 0 0 0 0 1 0 2 0 1024, , ....F P F d F d F d F d ……… 1 1 1 1 10 0 0 0 1 0 2 0 1024, , .... n n n n nF P Fd Fd Fd Fd
  • 6. IJECE ISSN: 2088-8708  An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri) 955 0 0 0 0 1 1 1 0 1 1 1 2 1 1024, , ....FP Fd Fd Fd Fd ……… 2 2 2 2 21 1 0 1 1 1 2 1 1024, , .... n n n n nFP Fd Fd Fd Fd . . . 0 1 2 1024, , .... N N N N N M N N N NF P F d F d F d F d ……… 1 1 1 1 10 0 0 0 1 0 2 0 1024, , .... n n n n nF P Fd Fd Fd Fd For each file partition i jF P Do Each file Partition is divided into N blocks of 64 bits’ block size. Here w is 8 blocks. So 0 0F P can be further partitioned into sub-partition as: 0 0 0 0 0 0 0 1 2 15, , ... F P SP SP SP SP 0 0 1 2 63 0 0 0 0 0 0 0 1 2 63 1 1 1 1 1 0 0 1 2 63 2 2 2 2 2 0 0 1 2 63 , , .... , , .... , , .... . . , , , ....n n n n n SP Sd Sd Sd Sd SP Sd Sd Sd Sd SP Sd Sd Sd Sd SP Sd Sd Sd Sd     Similarly, 0 1 2 7, , ...  N N N N N MF P SP SP SP SP . Non-Linear Sub-Partition Substitution For each sub-partition Do 2 [ *( ) * ]mod3  i i iTSP a SP b SP c i=0….16 Where a=number of AND policies. b=number of OR policies. c=number of ANY policies. Done Phase 2 In this phase, transformed sub-partition data is taken as source data. User access policy data is represented as state matrix. For each dynamic user access policy, random dynamic S-Box is generated to each authorized cloud user. Phase 3 In this phase, input data are shifted from left to right in column wise using authorized cloud user parameters. Depends on the user access in the policy structure, three parameters are calculated. These three parameters are used to transform columns left to right and then similarly shift row wise in the reverse order. Key Generation Process Input: Total User Access Policies Procedure: Step 1: Construct 1024 bits state matrix using Total User Access Policies. Step 2: Select 1024 bits randomly from 1024 bits using pattern / permutation matrix. Step 3: Select 1024 bits is assigned to each round function of hash algorithm. Step 4: Repeat steps 1 to 3 until 10 rounds. Encrytion and Decryption Proposed approach follows four phases: 1. Setup 2. Key Generation 3. Encryption Process 4. Decryption Process
  • 7.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 950 – 960 956 Setup Setup algorithm takes , ,   ,G,e with G= G G G    .p,q,r are the elements in Zp. First compute , ,p q rg g g are the generators of , ,G G G   respectively. Following algorithm generates setup parameters for the given Total policy pattern (T.P). Given Total policy pattern is divided into three patterns with AND ( ), OR( ),*. Algorithm takes Attribute list Attlist, Policy list polilist, operator’s list oplist and operators position list poslist as input and generates hashcodes of three policy patterns of policy list. Input: List:=Polilist, Attlist, Oplist,Poslist. Hardware parameters Procedure: ' 1H =HextoDecimal(Hash(pat1)); i=0…pat1.length. ' 2H =HextoDecimal(Hash(pat2)); i=0…pat2.length. ' 3H =HextoDecimal(Hash(pat2)); i=0…pat2.length. ' ' ' ' 1 2 3H H H hardwareparams;S     Public Key= { ' S , , ,p q rg g g , , ,G G G   , ' ' ' 1 2 3H ,H ,H ;}; [1] Master key= { , ,   }; known to T.A Key Generation Key Generation algorithm will take set of attributes, Policy pattern hash values as input and returns Secret key as output. Each user is associated with secret key and it will be generated using three pattern keys as ' 1/( ) 1,i ;S pK g   i=0…..pat1.length; ' 1/( ) 1,j ;S qK g   j=0…..pat2.length; ' 1/( ) 1,k ;S rK g   k=0….pat3.lenght; Secret key = {Tp, Hash (pat1), Hash (pat2), Hash (pat3), 1,i 1,j 1,k, ,K K K }; Encryption Process Encryption algorithm encrypts the message using policy pattern structures. Algorithm uses three patterns with homomorphic encryption and decryption process. Additive and Multiplicative homomorphism takes two inputs and generate secure encrypted values as output. Homomorphic encryption and decryption uses 0C , ' 0C as input. For each pair of file partition f[i] data Do For each character j in f[i] 1M =f[i][j]; 2M = f[i+1][j];
  • 8. IJECE ISSN: 2088-8708  An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri) 957 Additive Homomorphic Encryption 1 2 1 2( ) ( ) ( );Enc M M Enc M Enc M   Multiplicative Homomorphic Encryption 1 2 1 2( . ) ( ). ( );Enc M M Enc M Enc M 1 0:M C ; ' 2 0:M C ; // |P| is partition size Enc( 1M ):=Enc( 0C )=( 0C + *  )mod n where n= *  ; Enc( 2M ):=Enc( ' 0C )=( ' 0C + *  )mod n where n= *  ; 1 2( )Enc M M =Enc( ' 0 0C C ) =Enc( 0C )+Enc( ' 0C ); =( 0C + *  )mod n+( ' 0C + *  )mod |P| Enc( 1 2.M M ) =Enc( ' 0 0.C C ) =Enc( 0C ).Enc( ' 0C ); =( 0C + *  )mod n. +( ' 0C + *  )mod |P| Cipher Text CT={ T.P, ' ' ' 1 2 3H ,H ,H ,M.e( 1 2( )Enc M M ,Enc( 1 2.M M )) ,{ 1, 2,j 3,k, ,iC C C },C}; Done Cipher Text CT is publicly available to all the attribute policy holders. This CT will be decrypted only those users who has exact policy matching patterns. ' ( ) ( , )S p pe g g     . | | 1, 1, 1 ( , )   P i i i e C K . | | 2,j 1,j 1 ( , )   P j e C K . | | 3,k 1,k 1 ( , )   P k e C K M. ' ( ) ( , )S p pe g g     .1.1.1 M. ' ( ) ( , )S p pe g g     Now Based on the user entered policy A and D parameters may vary as If user entered policy is in pattern1 then 1,iD pg  1,i pA g   If user entered policy is in pattern2 then 2,jD pg  2,j pA g   If user entered policy is in pattern3 then 3,kD pg  3,k pA g  
  • 9.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 950 – 960 958 4. RESULTS AND ANALYSIS All experiments are performed with the real time Amazon aws cloud servers and client configurations as Intel(R) CPU 2.13GHz, 4 GB RAM, and the minimum OS platform is Microsoft Windows 7 Professional (SP2). This framework requires third party libraries cpabe, abe, amazon aws, and jama.etc. Figure 5. Proposed Parallel Hashing Process Table 2. Comparison of Hash based Encryption and DecryPtion models Algorithm DataSize (KB) HashTime (ms) EncryptionTime (ms) DecryptionTIme (ms) CPABE+MD5 >1500 4746 7330 5766 KPABE+SHA12 >1500 5844 5866 5432 FHEncrytion+SHA256 >1500 6834 7955 7198 DUPHA+HybridABE >1500 2365 3686 3519 ParallelHash+Hybrid ABE >3000 2178 3286 3316 From the Table 2, it is clear that proposed parallel ABE based encryption and decryption model has less computational time compared to traditional models in cloud environment. From the Figure 5, it is clear that proposed parallel multi-doc hash model has less computational time compared to traditional models in cloud environment. From the figure 6, it is clear that proposed parallel ABE based encryption and decryption model has less computational time compared to traditional models in cloud environment. From the Table 3, it is clear that proposed parallel hash based ABE encryption and decryption model has less cloud storage computation compared to traditional models ABE on cloud environment. From the Figure 7, it is clear that proposed parallel hash based ABE encryption and decryption model has less cloud storage computation compared to traditional models ABE on cloud environment. Table 3. Memory storage comparison with traditional ABE models encryption and decryption time Algorithm DataSize (KB) Cloud Storage (KB) CPABE+MD5 500 545 KPABE+SHA12 500 574 FHEncrytion+SHA256 500 541 DUPHA+HybridABE 500 417 ParallelHash+Hybrid ABE 500 359 Round (R1) Round (R2) Round (R3) Round (R10) ……. 1024-bit Partition data KeyGeneration 1024 Bits
  • 10. IJECE ISSN: 2088-8708  An Improved Integrated Hash and Attributed Based Encryption Model .... (Satheesh K S V A Kavuri) 959 Figure 5. Proposed parallel multi-doc hash computation Figure 6. Proposed parallel multi-doc Figure 7. Proposed parallel multi-doc storage computation 5. CONCLUSION Cloud data outsourcing through un-authorized clients and distributed systems are exponentially increasing cloud hardware and software resources. Cloud environment provides on demand resource allocation from a shared pool of hardware and software resources. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage.The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security.Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models. REFERENCES [1] L. Ibraimi, et al., “Efficient and provable secure ciphertext-policy attribute-based encryption schemes,” Proc. 5th Int. Conf. Inf. Secur. Pract. Exper., vol. 5451, pp. 1-12. [2] J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Trans. Knowl. Data Eng., vol/issue: 25(10), pp. 2271-2282, 2013. [3] J. Lai, et al., “Attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forensics Security, vol/issue: 8(8), pp. 1343-1354, 2013. [4] Hur, “Attribute-based secure data sharing with hidden policies in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol/issue: 24(11), 2013.
  • 11.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 950 – 960 960 [5] S. Hohenberger and B. Waters, “Online/offline attribute-based encryption,” Public-Key Cryptography PKC, vol. 8383, 2014. [6] J. K. Liu and J. Zhou, “An efficient identity-based online/offline encryption scheme,” ACNS, pp. 156C167, 2009. [7] F. G. Y. Mu and Z. Chen, “Identity-based online/offline encryption,” Financial Cryptography, pp. 247C261, 2008 [8] T. Jung, et al., “Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption,” IEEE Trans. on Info. Forensics and Security, vol/issue: 10(1), pp. 190-199, 2015. [9] J. Li, et al., “Securely outsourcing attribute-based encryption with checkability,” IEEE Trans. on Parallel and Distributed Systems, vol/issue: 25(8), pp. 2201-2210, 2014. [10] J. Han, et al., “Improving privacy and security in decentralized ciphertext-policy attribute-based encryption,” IEEE Trans. on Info. Forensics and Security, vol/issue: 10(3), pp. 665-678, 2015.