Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Metadata Attribute Based Cipher-Key Generation System in Cloud

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

  • 2497 Accesses

Abstract

With rapid development of cloud computing, more and more IT industries outsources their sensitive data at cloud data storage location. To keep the stored data confidential against untrusted cloud service providers, a natural way is to store only the encrypted data and providing an efficient access control mechanism using a competent cipher key-Cmxn, which is becoming a promising cryptographic solution. In this proposed model the cipher key is generated based on attributes of metadata. The key problems of this approach includes, the generation of cipher key and establishing an access control mechanism for the encrypted data using cipher key where keys cannot be revoked without the involvement of data owner and the metadata data server (MDS), hence makes data owner feels comfortable about the data stored. From this study, we propose a novel Metadata Attribute Based Key Generation scheme for cloud data security system by exploiting the characteristic of the data stored. We have implemented a security model that incorporates our ideas and evaluated the performance and scalability of the secured model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cammert, G.M., Kramer, J., Seeger, B.: Dynamic Metadata Management for Scalable Stream Processing Systems. In: IEEE International Conference on Data Engineering Workshop, pp. 644–653 (2007)

    Google Scholar 

  2. Wu, J.-J., Liu, P., Chung, Y.-C.: Metadata Partitioning for Large-scale Distributed Storage Systems. In: IEEE International Conference on Cloud Computing (2010)

    Google Scholar 

  3. Verma, A., Venkataraman, S., Caesar, M., Campbell, R.: Efficient Metadata Management for Cloud Computing Applications. In: International Conference on Communication Software and Networks (2010)

    Google Scholar 

  4. Hua, Y., Yifeng, Jiang, H., Feng, D., Tian, L.: Supporting Scalable and Metadata Management in Ultra Large Scale File Systems. IEEE Transactions on Parellel and Distributed Systems 22(4) (2011)

    Google Scholar 

  5. Anitha, R., Mukherjee, S.: A Dynamic Semantic Metadata Model in Cloud Computing. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds.) ObCom 2011, Part II. CCIS, vol. 270, pp. 13–21. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Kuyoro, S.O.: Ibikunle.F and Awodele. O.: Cloud Computing Security Issues and Challenges. International Journal of Computer Networks 3(5), 247–255 (2011)

    Google Scholar 

  7. Mathew, A.: Survey Paper on Security & Privacy Issues in Cloud Storage Systems. In: Electrical Engineering Seminar and Special Problems 571B (2012)

    Google Scholar 

  8. Heurix, J., Karlinger, M., Neubauer, T.: Perimeter – Pseudonymization and Personal Metadata Encryption for Privacy-Preserving Searchable Documents. In: International Conference on Health Systems, vol. 1(1), pp. 46–57 (2012)

    Google Scholar 

  9. Ravi kumar, J., Revati, M.: Efficient Data Storage and Security in Cloud. Proc. International Journal of Emerging trends in Engineering and Development 6(2) (2012)

    Google Scholar 

  10. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of Cloud computing. Journal of SuperComputers, 561–592 (2013)

    Google Scholar 

  11. Aguilera, M.K., Lillibridge, M., Maccormick: Block-Level Security for Network-attached disks. In: The 2nd Usenix Conference on File and Storage Technologies, pp. 159–174 (2003)

    Google Scholar 

  12. Anitha, R., Paramjothi, P., Yogesh, P., Mukherjee, S.: Data Storage Security in Cloud using Metadata. In: International Conference on Machine learning and Computer Science, pp. 35–39 (2013)

    Google Scholar 

  13. Anitha, R., Paramjothi, P., Mukherjee, S.: Security as a Service using Data Steganography in Cloud computing. In: International Conference on Cloud Security Management, pp.81–89 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anitha, R., Mukherjee, S. (2014). Metadata Attribute Based Cipher-Key Generation System in Cloud. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics