Abstract
Background: Cloud computing is a service that has undergone accelerated growth in the
field of information technology in recent years. Privacy and security are challenging issues for cloud
users and providers.
Objective: This work aims at ensuring secured validation of user and protecting data during transmission
for users in a public IoT-cloud environment. Existing security measures have failed by their single
level of security, adaptability for a large amount of data and reliability, to overcome these issues
and to achieve a better solution for vulnerable data.
Methods: The suggested method utilizes secure transmission in the cloud using key policy attributebased
encryption (KP-ABE). Initially, user authentication is verified. Then the user data is encrypted
with the help of KP-ABE algorithm. Finally, data validation and privacy preservation are done by
Burrows-Abadi-Needham (BAN) logic. This verified, shows that the proposed encryption is correct,
secure and efficient to prevent unauthorized access and prevents data leakage with fewer chances of
data/identity theft of a user as this analysis performed by KP-ABE is based on access control approach.
Results: Here, the method attains a maximum of 88.35% of validation accuracy with a minimum
8.78ms encryption time, which is better when compared to the existing methods. The proposed mechanism
is done by MATLAB. The performance of the implemented method is calculated based on the
time of encryption and decryption, execution time and validation accuracy.
Conclusion: Thus, the proposed approach attains high IoT-cloud data security and increases the speed
for validation and transmission with high accuracy and is used for cyber data science processing.
Keywords:
Cloud computing, key policy attribute-based encryption, burrows-abadi-needham, encryption, decryption and accuracy, IoT.
Graphical Abstract
[4]
Suresh M, Neema M. Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things Procedia technology 2016; 25: 248-55.
[5]
Saif S, Gupta R, Biswas S. Implementation of cloud-assisted secure data transmission in WBAN for healthcare monitoring. Adv Comput Commun Paradigms 2018; pp. 665-74.
[6]
Alam T. Efficient and secure data transmission approach in cloud-MANET-IoT integrated framework. J Telecommun 2020; 12(1): 1-6.
[8]
Indrabi SJ, Saini N, Mohan M. Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum’. Int J Pure Appl Math 2018; 118(20): 2851-60.
[9]
Jabi R, Patel P, Dubey D. An efficient secure data transmission based on visual cryptography. International Conference on Research Advances in Integrated Navigation Systems (RAINS) 2016; 1-6.
[11]
Govindasamy V, Sandosh S, Kumar CS. KD2SA: Key Distribution Scheme Shuffling algorithm for heightened secure data transmission 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC) 37-42.
[12]
Eya N, Elkhazmi SE, Jituboh E, et al. New user authentication and key management scheme for secure data transmission in wireless mobile multicast Internet Technologies and Applications. ITA 2017; pp. 264-9.
[13]
Perez JM, Perez GM, Gomez-Skarmeta AF. SecRBAC: Secure data in the Clouds’. IEEE Trans Serv Comput 2017; 10(5): 726-40.
[14]
Brindha T, Shaji RS. A secure transaction of cloud data using conditional source trust attributes encryption mechanism’. Soft Comput 2016; 22(3): 1013-22.
[15]
Naccache D, Xu S, Qing S, et al. Information and Communications Security’. Lect Notes Comput Sci 2018.
[17]
Pragaladan R, Sathappan S. A Secure Cloud Data Storage Combining DNA Structure and Multi-aspect Time-Integrated Cut-off Potential. Adv Big Data Cloud Comput 2018; pp. 361-74.
[18]
Dhamija A, Dhaka V. A novel cryptographic and steganographic approach for secure cloud data migration. 2015. International Conference on Green Computing and Internet of Things (ICGCIoT)
[20]
Dongre KA, Thakur RS, Abraham A. Secure cloud storage of data. 2014. International Conference on Computer Communication and Informatics
[21]
Mamta KMD, Yadav CS. Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review International Conference on Innovations in Control, Communication and Information Systems (ICICCI).
[22]
Lin HY, Hsieh MY, Li KC. Researches on secure data transmission mechanisms in cloud Internet of Things architectures IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation
[24]
Porwal A, Maheshwari R, Pal BL, Kakhani G. An approach for secure data transmission in private cloud International Journal of Soft Computing and Engineering. IJSCE 2012; pp. 2231-307.
[25]
Neela KL, Kavitha V, Pal BL, Kakhani G. Enhancement of data confidentiality and secure data transaction in cloud storage environment’. Cluster Comput 2017; 21(1): 115-24.