[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Advanced Key Management System (AKMS) for Security in Public Clouds

  • Conference paper
  • First Online:
Evolution in Computational Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1176))

  • 930 Accesses

Abstract

Cloud computing has become an emerging model of information technology industry as it can be accessed anywhere in the world on a pay-per-use basis. However, one major problem it is facing in today’s challenging world is the security issues. The various existing key generation and management systems are suffering with the security issues. Along with the security feature, the data sharing is also more important issue to be studied. Considering these two parameters, it is necessary to work on the secure data sharing in public clouds. For that purpose, we have proposed an advanced key management system (AKMS) which can perform identity-based encryption. Also, the proposed AKMS type encryption provides high security, scalability, and flexibility in the public clouds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sanket, S., Nitte, Sanjay, H.A., Deepika, K.M.; Rangavittala: An encryption, compression and key (ECK) management based data security framework for infrastructure as a service in cloud. In: 2015 IEEE International Advance Computing Conference (IACC) 12–13 June 2015, Banglore, India, pp. 210–216. ISBN: 978-1-4799-8047-5

    Google Scholar 

  2. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 01–011 (2011)

    Google Scholar 

  3. Yang, K., Jia, X., Ren, K.: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: ACM, pp. 0523–528 (2013)

    Google Scholar 

  4. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, K.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE, pp. 01–014 (2013)

    Google Scholar 

  5. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. IEEE, pp. 01–09 (2010)

    Google Scholar 

  6. Chow, S.S.M., Chu, C,-K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. Springer, pp. 0442–0464 (2011)

    Google Scholar 

  7. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE, pp. 01–013 (2015)

    Google Scholar 

  8. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE, pp. 01–011 (2012)

    Google Scholar 

  9. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W, Chen, Y., Vasilakos, A.V: Security and privacy for storage and computation in cloud computing. Inf. Sci. 0371–0386 (2014)

    Google Scholar 

  10. Selvakumar, C., Rathanam, G.J., Sumalatha, M.R.: PDDS—Improving cloud data storage security using data partitioning technique. IEEE, pp. 07–011 (2012)

    Google Scholar 

  11. Rajathi, A., Saravanan, N.: A survey on secure storage in cloud computing. Indian J. Sci. Technol. 4396–4401 (2013)

    Google Scholar 

  12. Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM, pp. 0213–0222 (2010)

    Google Scholar 

  13. Wang, C., Ren, K.: Toward publicly auditable secure cloud data storage services. IEEE, 019–024 (2010)

    Google Scholar 

  14. Yang, K., Jia, X.: Attributed-based access control for multi-authority systems in cloud storage. IEEE. pp. 536–545 (2012)

    Google Scholar 

  15. Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 0409–0428 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. L. Amarnath .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Amarnath, J.L., Shah, P.G., Chandramouli, H. (2021). Advanced Key Management System (AKMS) for Security in Public Clouds. In: Bhateja, V., Peng, SL., Satapathy, S.C., Zhang, YD. (eds) Evolution in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 1176. Springer, Singapore. https://doi.org/10.1007/978-981-15-5788-0_55

Download citation

Publish with us

Policies and ethics