The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud

Security of data stored in the cloud databases is a challenging and complex issue to be addressed due to the presence of malicious attacks, data breaches and unsecured access points. In the past, many researchers proposed security mechanisms including access control, intrusion detection and prevention models, Encryption based storage methods and key management schemes. However, the role based access control policies that were developed to provide security for the data stored in cloud databases based on the sensitivity of the information are compromised by the attackers through the misuse of privileges gained by them from multiple roles. Therefore, it is necessary to propose more efficient mechanisms for securing the sensitive information through attribute based encryption by analyzing the association between the various attributes. For handling the security issue related to the large volume of cloud data effectively, the association rule mining algorithm has been extended with temporal constraints in this work in order to find the association among the attributes so that it is possible to form groups among the attributes as public attributes with insensitive data, group attributes with medium sensitive data and owner with highly sensitive attributes and data for enhancing the strength of attribute based encryption scheme. Based on the associations among the attributes and temporal constraints, it is possible to encrypt the sensitive data with stronger keys and algorithms. Hence, a new key generation and encryption algorithm is proposed in this paper by combining the Greatest common divisor and the Least common multiple between the primary key value and the first numeric non key attribute that is medium sensitive attributes and data present in the cloud database for providing secured storage through effective attribute based encryption. Moreover, a new intelligent algorithm called Elliptic Curve Cryptography with Base100 Table algorithm is also proposed in this paper for performing encryption and decryption operations over the most sensitive data for the data owners. From the experiments conducted in this work, it is observed that the proposed model enhances the data security by more than 5% when it is compared with other existing secured storage models available for cloud.


[1] Dhasarathan C., Thirumal V., and Ponnurangam D., “A Secure Data Privacy Preservation for on- Demand Cloud Service,” Journal of King Saud University-Engineering Sciences, vol. 29, no. 4, pp. 144-150, 2017.

[2] Dong B., Liu R., and Wang H., “Result Integrity Verification of Outsourced Frequent Itemset Mining,” in Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy, Newark, pp. 258-265, 2013.

[3] Ge X., Yan L., Zhu J., and Shi W., “Privacy- Preserving Distributed Association Rule Mining based on the Secret Sharing Technique,” in Proceedings of the 2nd International Conference on Software Engineering and Data Mining, Chengdu, pp. 345-350, 2010.

[4] Huang C., Lu R., and Choo K., “Secure and Flexible Cloud-Assisted Association Rule Mining over Horizontally Partitioned Databases,” Journal of Computer and System Sciences, vol. 89, pp. 51-63, 2017.

[5] Kantarcioglu M. and Clifton C., “Privacy- Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026-1037, 2004. Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud 65

[6] Kaosar M., Paulet R., and Yi X., “Secure Two- Party Association Rule Mining,” in Proceedings of the 9th Australasian Information Security Conference, Perth, pp. 15-22, 2011.

[7] Kavin B., Ganapathy S., Kanimozhi U., and Kannan A., “An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA,” Wireless Personal Communications, vol. 115, pp. 1107-1135, 2020.

[8] Krishnamurthy M., Kannan A., Baskaran R., and Kavitha M., “Cluster based Bit Vector Mining Algorithm for Finding Frequent Item sets in Temporal Databases,” Procedia Computer Science, vol. 3, pp. 513-523, 2011.

[9] Li L., Lu R., Choo K., Datta A., and Shao J., “Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1847- 1861, 2016.

[10] Lian H., Wang Q., and Wang G., “Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage,” The International Arab Journal of Information Technology, vol. 17, no. 1, pp. 107-117, 2019.

[11] Liu H., Ning H., Yue Y., Wan Y., and Yang L., “Selective Disclosure and Yoking-Proof based Privacy-Preserving Authentication Scheme for Cloud Assisted Wearable Devices,” Future Generation Computer Systems, vol. 78, no. 3, pp. 976-986, 2018.

[12] Liu X., Deng R., Yang Y., Tran H., and Zhong S., “Hybrid Privacy-Preserving Clinical Decision Support System in Fog-Cloud Computing,” Future Generation Computer Systems, vol. 78, no. 2, pp. 825-837, 2018.

[13] Misra S., Singh A., Chatterjee S., and Mandal A., “QoS-Aware Sensor Allocation for Target Tracking in Sensor-Cloud,” Ad Hoc Networks, vol. 33, pp. 140-153, 2015.

[14] Modak M. and Shaikh R., “Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy,” Procedia Computer Science, vol. 79, pp. 993-1000, 2016.

[15] Muthurajkumar S., Ganapathy S., Vijayalakshmi M., and Kannan A., “Secured Temporal Log Management Techniques for Cloud,” Procedia Computer Science, vol. 46, pp. 589-595, 2015.

[16] Muthurajkumar S., Vijayalakshmi M., Ganapathy S., and Kannan A., “Agent Based Intelligent Approach for the Malware Detection for Infected Cloud Data Storage Files,” in Proceedings of 7th International Conference on Advanced Computing, Chennai, pp. 1-5, 2015.

[17] Pratiba D., Shobha G., and Vijayalakshmi P., “Efficient Data Retrieval from Cloud Storage using Data Mining Technique,” International Journal on Cybernetics and Informatics, vol. 4, no. 2, pp. 271-279, 2015.

[18] Ramachandran C., Obaidat M., Misra S., and Pena-Mora F., “A Secure and Energy-Efficient Scheme for Group-based Routing in Heterogeneous Ad Hoc Sensor Networks and its Simulation Analysis,” Simulation, vol. 84, no. 2- 3, pp.131-146, 2008.

[19] Sahoo C. and Goswami V., “Cost and Energy Optimisation of Cloud Data Centres through Dual VM Modes-Activation and Passivation,” International Journal of Communication Networks and Distributed Systems, vol. 18, no. 3- 4, pp. 371-389, 2017.

[20] Sarkar S., Chatterjee S., and Misra S., “Evacuation and Emergency Management Using a Federated Cloud,” IEEE Cloud Computing, vol. 1, no. 4, pp. 68-76, 2014.

[21] Sethukkarasi R., Ganapathy S., Yogesh P., and Kannan A., “An Intelligent Neuro Fuzzy Temporal Knowledge Representation Model for Mining Temporal Patterns,” Journal of Intelligent and Fuzzy Systems, vol. 26, no. 3, pp. 1167-1178, 2014.

[22] Shen W., Yang G., Yu J., Zhang H., Kong F., and Hao R., “Remote Data Possession Checking with Privacy-Preserving Authenticators for Cloud Storage,” Future Generation Computer Systems, vol. 76, pp. 136-145, 2017.

[23] Srikant R. and Agrawal R., “Mining Generalized Association Rules,” in Proceedings of the 21st International Conference on Very Large Database, Zurich, pp. 407-419, 1995.

[24] Stallings W., Cryptography and Network Security, Principles and Practices. USA: Prentice Hall, 2006.

[25] Wang W., Chen L., and Zhang Q., “Outsourcing High-Dimensional Healthcare Data to Cloud with Personalized Privacy Preservation,” Computer Networks, vol. 88, pp. 136-148, 2015.

[26] Wong W., Hung E., Kao B., Cheung D., and Mamoulis N., “Security in Outsourcing of Association Rule Mining,” in Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, pp. 111-112, 2007.

[27] Viger P., Lin J., Gueniche G., Deng A., and Lam H., “The Spmf Open-Source Data Mining Library Version 2,” in Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Riva del Garda, pp. 36-40, 2016.

[28] Yin H., Qin Z., Ou L., and Li K., “A Query Privacy-Enhanced and Secure Search Scheme over Encrypted Data in Cloud Computing,” Journal of Computer and System Sciences, vol. 90, pp. 14-27, 2017.

[29] Zaki M., “Scalable Algorithms for Association 66 The International Arab Journal of Information Technology, Vol. 18, No. 1, January 2021 Mining,” IEEE Transactions on Knowledge and Data Engineering, vol. 12, no. 3, pp. 372-390, 2010.

[30] Zhang C., Zhu L., Xu C., and Lu R., “PPDP: An Efficient and Privacy-Preserving Disease Prediction Scheme in Cloud-Based E-Healthcare System,” Future Generation Computer Systems, vol. 79, no.1, pp. 16-25, 2018.

[31] Zhang Y., Chen X., Li J., Wong D., Li H., and You I., “Ensuring Attribute Privacy Protection and Fast Decryption for Outsourced Data Security in Mobile Cloud Computing,” Information Sciences, vol. 379, pp. 42-61, 2017.

[32] Zhong S., “Privacy-Preserving Algorithms for Distributed Mining of Frequent Item Sets,” Information Sciences, vol. 177, no. 2, pp. 490- 503, 2007. Pradeep Suthanthiramani is pursuing Ph.D in DIST, CEG Campus, Anna University, Chennai, India. He has completed his M.Sc in Madurai Kamaraj University, Madurai, India. His areas of interests are cryptography and network security. Muthurajkumar Sannasy is working as an Assistant Professor in DCT at MIT Campus, Anna University, Chennai, India. He has completed his M.E and Ph.D degrees in Anna University, Chennai. His areas of interests are including cloud security. Ganapathy Sannasi is working as Senior Assistant Professor (Grade- II) in SCOPE and Research Center for Cyber Physical Systems at VIT- Chennai, Chennai, India. He has completed his M.E and Ph.D degrees in Anna University, Chennai. His areas of interests are including network security. Kannan Arputharaj is working as a Senior Professor in SCOPE at VIT- Vellore, Vellore, India. He has completed his M.E and Ph.D degrees in Anna University, Chennai. He is a Retired Professor of Anna University, Chennai. His areas of interests are including data mining, cryptography and network security.