Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

Secure Data Validation and Transmission in Cloud and IoT Through Ban Logic and KP-ABE

Author(s): Narander Kumar* and Jitendra Kumar Samriya

Volume 12, Issue 1, 2022

Published on: 26 January, 2021

Page: [79 - 87] Pages: 9

DOI: 10.2174/2210327911666210126121316

Price: $65

Abstract

Background: Cloud computing is a service that has undergone accelerated growth in the field of information technology in recent years. Privacy and security are challenging issues for cloud users and providers.

Objective: This work aims at ensuring secured validation of user and protecting data during transmission for users in a public IoT-cloud environment. Existing security measures have failed by their single level of security, adaptability for a large amount of data and reliability, to overcome these issues and to achieve a better solution for vulnerable data.

Methods: The suggested method utilizes secure transmission in the cloud using key policy attributebased encryption (KP-ABE). Initially, user authentication is verified. Then the user data is encrypted with the help of KP-ABE algorithm. Finally, data validation and privacy preservation are done by Burrows-Abadi-Needham (BAN) logic. This verified, shows that the proposed encryption is correct, secure and efficient to prevent unauthorized access and prevents data leakage with fewer chances of data/identity theft of a user as this analysis performed by KP-ABE is based on access control approach.

Results: Here, the method attains a maximum of 88.35% of validation accuracy with a minimum 8.78ms encryption time, which is better when compared to the existing methods. The proposed mechanism is done by MATLAB. The performance of the implemented method is calculated based on the time of encryption and decryption, execution time and validation accuracy.

Conclusion: Thus, the proposed approach attains high IoT-cloud data security and increases the speed for validation and transmission with high accuracy and is used for cyber data science processing.

Keywords: Cloud computing, key policy attribute-based encryption, burrows-abadi-needham, encryption, decryption and accuracy, IoT.

Graphical Abstract
[1]
Vijayakumar P, Azees M, Kannan A, Deborah LJ. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 2015; 17(4): 1015-28.
[http://dx.doi.org/10.1109/TITS.2015.2492981]
[2]
Sharma A, Bhuriya D, Singh U. Secure data transmission on MANET by hybrid cryptography technique
[http://dx.doi.org/10.1109/IC4.2015.7375688]
[3]
Ahmed MN, Abdullah AH, Chizari H, Kaiwartya O. Flooding factor based trust management framework for secure data transmission in MANETs’. Journal of King Saud University-Computer and Information Sciences 2017; 29(3): 269-80.
[http://dx.doi.org/10.1016/j.jksuci.2016.03.004]
[4]
Suresh M, Neema M. Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things Procedia technology 2016; 25: 248-55.
[5]
Saif S, Gupta R, Biswas S. Implementation of cloud-assisted secure data transmission in WBAN for healthcare monitoring. Adv Comput Commun Paradigms 2018; pp. 665-74.
[6]
Alam T. Efficient and secure data transmission approach in cloud-MANET-IoT integrated framework. J Telecommun 2020; 12(1): 1-6.
[7]
Paul S, Anwar T, Kumar A. An innovative DNA cryptography technique for secure data transmission’. Int J Bioinform Res Appl 2016; 12(3): 238-62.
[http://dx.doi.org/10.1504/IJBRA.2016.078235]
[8]
Indrabi SJ, Saini N, Mohan M. Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum’. Int J Pure Appl Math 2018; 118(20): 2851-60.
[9]
Jabi R, Patel P, Dubey D. An efficient secure data transmission based on visual cryptography. International Conference on Research Advances in Integrated Navigation Systems (RAINS) 2016; 1-6.
[10]
Nyo HL, Oo AW. Secure data transmission of video steganography using Arnold Scrambling and DWT’. Int J Comput Net Inform Security 2019; 11(6): 45.
[http://dx.doi.org/10.5815/ijcnis.2019.06.06]
[11]
Govindasamy V, Sandosh S, Kumar CS. KD2SA: Key Distribution Scheme Shuffling algorithm for heightened secure data transmission 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC) 37-42.
[12]
Eya N, Elkhazmi SE, Jituboh E, et al. New user authentication and key management scheme for secure data transmission in wireless mobile multicast Internet Technologies and Applications. ITA 2017; pp. 264-9.
[13]
Perez JM, Perez GM, Gomez-Skarmeta AF. SecRBAC: Secure data in the Clouds’. IEEE Trans Serv Comput 2017; 10(5): 726-40.
[14]
Brindha T, Shaji RS. A secure transaction of cloud data using conditional source trust attributes encryption mechanism’. Soft Comput 2016; 22(3): 1013-22.
[15]
Naccache D, Xu S, Qing S, et al. Information and Communications Security’. Lect Notes Comput Sci 2018.
[16]
Muhtasim MA, Ramisa Fariha S, Rashid R, Islam N, Majumdar MA. Secure Data Transaction and Data Analysis of IoT Devices Using Blockchain 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET).
[http://dx.doi.org/10.1109/ICCSDET.2018.8821190]
[17]
Pragaladan R, Sathappan S. A Secure Cloud Data Storage Combining DNA Structure and Multi-aspect Time-Integrated Cut-off Potential. Adv Big Data Cloud Comput 2018; pp. 361-74.
[18]
Dhamija A, Dhaka V. A novel cryptographic and steganographic approach for secure cloud data migration. 2015. International Conference on Green Computing and Internet of Things (ICGCIoT)
[19]
Thilagavathy R, Murugan A. Secure the Cloud Data Transmission Using an Improved RSA Algorithm’. Indian J Sci Technol 2017; 10(12): 1-6.
[http://dx.doi.org/10.17485/ijst/2017/v10i12/103770]]
[20]
Dongre KA, Thakur RS, Abraham A. Secure cloud storage of data. 2014. International Conference on Computer Communication and Informatics
[21]
Mamta KMD, Yadav CS. Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review International Conference on Innovations in Control, Communication and Information Systems (ICICCI).
[22]
Lin HY, Hsieh MY, Li KC. Researches on secure data transmission mechanisms in cloud Internet of Things architectures IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation
[23]
Alzubi JA, Manikandan R, Alzubi QA, et al. Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud’. Measurement 2020; 150.
[http://dx.doi.org/10.1016/j.measurement.2019.107077]
[24]
Porwal A, Maheshwari R, Pal BL, Kakhani G. An approach for secure data transmission in private cloud International Journal of Soft Computing and Engineering. IJSCE 2012; pp. 2231-307.
[25]
Neela KL, Kavitha V, Pal BL, Kakhani G. Enhancement of data confidentiality and secure data transaction in cloud storage environment’. Cluster Comput 2017; 21(1): 115-24.
[26]
Alam Tanweer . Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework Journal of Telecommunication, Electronic and Computer Engineering 2020; 12(1)
[http://dx.doi.org/10.2139/ssrn.3639058]
[27]
Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. J Big Data 2020; 7(1): 1-29.
[http://dx.doi.org/10.1186/s40537-020-00318-5]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy