Development of A Novel Block Design Based Key Agreement Protocol for Cloud Environment to Improve Efficient Performance and Security

Authors

  • Dr. Gangolu Yedukondalu  Professor, CSE (AI&ML) Department, Vignana Bharati Institute of Technology, Hyderabad, India
  • Guna Santhoshi  Asst Professor, IT Dept, G. Narayanamma Institute of Technology and Science for Women, Hyderabad, India
  • Karnati Durga  Assistant professor, Department of CSE (DS), CMR Engineering College Hyderabad, India
  • Kotha Chandrakala  Assistant Professor, Information Technology, CMR Technical Campus, Hyderabad, India
  • Dr. Mahesh Kotha  Assistant professor, CSE (AI&ML) Department, CMR Technical Campus, Hyderabad, India

DOI:

https://doi.org/10.32628/IJSRST22954

Keywords:

Key agreement protocol, symmetric balanced incomplete block design (SBIBD), data sharing, cloud computing.

Abstract

Cloud computing is one of the recent emerging technologies. Heavy data sharing among multiple users is an open issue. Data sharing in cloud computing enables multiple participants to freely share the group data, which improves the efficiency of work in cooperative environments and has widespread potential applications. However, how to ensure the security of data sharing within a group and how to efficiently share the outsourced data in a group manner are formidable challenges. In this paper we focused on security issues with the help of key agreement protocols to perform efficient data sharing in cloud environment. We proposed a novel block design based key agreement method in support of symmetric balanced incomplete block design (SBIBD). The main objective of this method is to supports multiple participants, which can flexibly extend the number of participants in a cloud environment according to the structure of the block design. Based on the proposed group data sharing model, we present general formulas for generating the common conference key K for multiple participants. In addition, the fault tolerance property of our protocol enables the group data sharing in cloud computing to withstand different key attacks, which is similar to Yi’s protocol.

References

  1. L. Zhou, V. Varadharajan, and M. Hitchens, “Cryptographic rolebased access control for secure cloud data storage systems,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 11, pp. 2381–2395, Nov. 2015.
  2. F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow, “Secure cloud storage meets with secure network coding,” in Proc. IEEE Conf. Comput. Commun., 2014, pp. 673–681.
  3. D. He, S. Zeadally, and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks,” IEEE Syst. J., vol. PP, no. 99, pp. 1–10, 2015, doi: 10.1109/JSYST.2015.2428620.
  4. Q. Huang, Y. Yang, and J. Fu, “Secure data group sharing and dissemination with attribute and time conditions in Public Clouds,” IEEE Transactions on Services Computing, 2018.
  5. J. M. Such and N. Criado, “Resolving multi-party privacy conflicts in social media,” IEEE Trans. on Knowledge and Data Engine, vol. 28, no. 7, pp. 1851-1863, 2016.
  6. K. Seol, Y. Kim, E. Lee, Y. Seo, and D. Baik, “Privacy-preserving at- tribute-based access control model for XML-based electronic health record system,” IEEE Access, vol. 6, pp. 9114-9128, 2018.
  7. X. Yi, “Identity-based fault-tolerant conference key agreement,” IEEE Trans. Depend. Secure Computation., vol. 1, no. 3, pp. 170–178, Jul.– Sep. 2004.
  8. Ravindra Changala, “Development of Predictive Model for Medical Domains to Predict Chronic Diseases (Diabetes) Using Machine Learning Algorithms and Classification Techniques”, ARPN Journal of Engineering and Applied Sciences, VOL. 14, NO. 6, MARCH 2019, ISSN 1819-6608.
  9. J. Shen, S. Moh, and I. Chung, “Identity-based key agreement protocol employing a symmetric balanced incomplete block design,” J. Commun. Netw., vol. 14, no. 6, pp. 682–691, 2012.
  10. B. Dan and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 213–229, 2003.
  11. K. Xue, W. Chen, W. Li, J. Hong, and P. Hong, “Combining data owner-side and cloud-side access control for encrypted cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2062–2074, 2018.
  12. I. Chung and Y. Bae, “The design of an efficient load balancing algorithm employing block design,” J. Appl. Mathematics Comput., vol. 14, no. 1, pp. 343–351, 2004.
  13. O. Lee, S. Yoo, B. Park, and I. Chung, “The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design,” Inf. Sci., vol. 176, no. 15, pp. 2148–2160, 2006.
  14. Ravindra Changala, “A Survey on Development of Pattern Evolving Model for Discovery of Patterns In Text Mining Using Data Mining Techniques” in Journal of Theoretical and Applied Information Technology in 31st August 2017. Vol.95. No.16, ISSN: 1817-3195, pp.3974-3987.
  15. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222–233, Jan. 2014.
  16. J. Yu, K. Ren, C. Wang, and V. Varadharajan, “Enabling cloud storage auditing with key-exposure resistance,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 6, pp. 1167–1179, Jun. 2015.
  17. L. Xu, C. Jiang, N. He, Z. Han, and A. Benslimane, “Trust-based col- laborative privacy management in online social networks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 1, pp. 48- 60, 2019.
  18. H. Cui, X. Yi, and S. Nepal, “Achieving scalable access control over encrypted data for edge computing networks,” IEEE Access, vol. 6, pp. 30049–30059, 2018.
  19. Ravindra Changala, "Retrieval of Valid Information from Clustered and Distributed Databases" in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 21-25, September 2016.ISSN: 2455-3506.
  20. Z. Tan, “An enhanced three-party authentication key exchange protocol for mobile commerce environments,” J. Commun., vol. 5, no. 5, pp. 436–443, 2010.
  21. Y. M. Tseng, “An efficient two-party identity-based key exchange protocol,” Informatica, vol. 18, no. 1, pp. 125–136, 2007.
  22. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proc. Workshop Theory Appl. Cryptographic Techn., 1985, vol. 21, no. 2, pp. 47–53.
  23. Ravindra Changala, "Data Mining Techniques for Cloud Technology" in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE),Volume 4, Issue 8, Pages 2319-5940, ISSN: 2278-1021, August 2015.
  24. O. Hasan, L. Brunie, E. Bertino, and N. Shang, “A decentralized privacy preserving reputation protocol for the malicious adversarial model,” IEEE Trans. Inf. Forensics Secure., vol. 8, no. 6, pp. 949– 962, Jun. 2013.
  25. L.-K. Hua, Introduction to Number Theory. Berlin, Germany: Springer, 2012.
  26. R. Barua, R. Dutta, and P. Sarkar, “Extending joux’s protocol to multi party key agreement (extended abstract),” in Proc. 4th Int. Conf. Cryptology India, 2003, pp. 205–217.
  27. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” J. Comput. Secur., vol. 19, no. 5, pp. 79–88, 2011.
  28. H. Guo, Z. Li, Y. Mu, and X. Zhang, “Cryptanalysis of simple three-party key exchange protocol,” Comput. Secur., vol. 27, no. 1/2, pp. 16–21, 2008.
  29. B. Lamacchia, K. Lauter, and A. Mityagin, “Stronger security of authenticated key exchange,” in Proc. Int. Conf. Provable Secur., 2007, pp. 1–16.
  30. Ravindra Changala, Evaluation And Analysis Of Discovered Patterns Using Pattern Classification Methods In Text Mining, ARPN Journal of Engineering and Applied Sciences, Vol3,Issue 11.
  31. Dr.Mahesh K, "A Survey on Predicting Uncertainty of Cloud Service Provider Towards Data Integrity and Economic" 2019 IJSRST | Volume 6 | Issue 1 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X.

Downloads

Published

2022-10-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Gangolu Yedukondalu, Guna Santhoshi, Karnati Durga, Kotha Chandrakala, Dr. Mahesh Kotha "Development of A Novel Block Design Based Key Agreement Protocol for Cloud Environment to Improve Efficient Performance and Security" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 9, Issue 5, pp.52-63, September-October-2022. Available at doi : https://doi.org/10.32628/IJSRST22954