Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniq...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Cluster computing Ročník 23; číslo 3; s. 1683 - 1696
Hlavní autori: Vengala, Dilip Venkata Kumar, Kavitha, D., Kumar, A. P. Siva
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York Springer US 01.09.2020
Springer Nature B.V
Predmet:
ISSN:1386-7857, 1573-7543
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniques were posited for securely amassing the data in the cloud; however, during massive transmission, none of them maintain end-to-end security. And, prevailing methods are also unable to solve the key intricacy and avoid key secrecy exposé. Thus, for trouncing these disadvantages and also assuring the data transmission (DT) as of the source–destination, a secure DT scheme with the help of a distributed cloud server (CS) and data deduplication is proposed. The uploaded user data can well be amassed in disparate CS to ameliorate the user data’s security. It can be done by, first, extracting the features of the user data along with the CS. After that, the Hybrid Meerkat clan algorithm (HMCA) chose the CS, which is optimally centered on the features. Next, the SHA512 algorithm performs the data deduplication of the input user data. Subsequent to data deduplication, the input file is compressed and encrypted using a two-stage lempel–ziv algorithm and optimized CP-ABE-ECC algorithm. Lastly, the encrypted file is stored in the chosen CS. The experimentation is implemented to analyze the proposed method’s performance. The outcomes exhibited that the proposed work performed better contrasted to other prevailing algorithms.
AbstractList The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniques were posited for securely amassing the data in the cloud; however, during massive transmission, none of them maintain end-to-end security. And, prevailing methods are also unable to solve the key intricacy and avoid key secrecy exposé. Thus, for trouncing these disadvantages and also assuring the data transmission (DT) as of the source–destination, a secure DT scheme with the help of a distributed cloud server (CS) and data deduplication is proposed. The uploaded user data can well be amassed in disparate CS to ameliorate the user data’s security. It can be done by, first, extracting the features of the user data along with the CS. After that, the Hybrid Meerkat clan algorithm (HMCA) chose the CS, which is optimally centered on the features. Next, the SHA512 algorithm performs the data deduplication of the input user data. Subsequent to data deduplication, the input file is compressed and encrypted using a two-stage lempel–ziv algorithm and optimized CP-ABE-ECC algorithm. Lastly, the encrypted file is stored in the chosen CS. The experimentation is implemented to analyze the proposed method’s performance. The outcomes exhibited that the proposed work performed better contrasted to other prevailing algorithms.
Author Kumar, A. P. Siva
Kavitha, D.
Vengala, Dilip Venkata Kumar
Author_xml – sequence: 1
  givenname: Dilip Venkata Kumar
  surname: Vengala
  fullname: Vengala, Dilip Venkata Kumar
  email: dilipvenkatakumar.phd@gmail.com
  organization: JNTUA
– sequence: 2
  givenname: D.
  surname: Kavitha
  fullname: Kavitha, D.
  organization: G. Pulla Reddy Engineering College
– sequence: 3
  givenname: A. P. Siva
  surname: Kumar
  fullname: Kumar, A. P. Siva
  organization: JNTUA CEA
BookMark eNp9kEtLAzEUhYMo2Kp_wFXAdTSPyTyWdagPUBTUdUjzsCltpiYZpfrnTR1BcFEIJDf3fCe5Zwz2fecNAKcEnxOMq4tIMK9LhClGmBFSILIHRoRXDFW8YPv5zHK7qnl1CMYxLjDGTUWbEfh6MqoPBmqZJExB-rhyMbrOw7wk1C6m4GZ9MhqqZddrGE14NwF-uDSHaW7g3CzXsLPw5r6dQOn14GS8Cpt12vr00flX2OVi5T6zTfuIJpdTNG3bY3Bg5TKak9_9CLxcTZ_bG3T3cH3bTu6QYqRJqMG2YBVnpeR2pq2mJVeVJUybhmLMuaaq5KYm1pCyJEWp6cwWNdteaFkqzY7A2eC7Dt1bb2ISi64PPj8paENqWtAG86yqB5UKXYzBWKFcktsRcixuKQgW26jFELXIUYufqAXJKP2HroNbybDZDbEBilnsX034-9UO6hvRx5ME
CitedBy_id crossref_primary_10_1007_s10586_021_03242_2
crossref_primary_10_1007_s11042_022_13960_3
crossref_primary_10_1007_s10586_021_03472_4
crossref_primary_10_1007_s11276_023_03554_8
crossref_primary_10_1007_s11334_022_00515_w
crossref_primary_10_3390_s25030731
crossref_primary_10_1007_s42044_022_00129_2
crossref_primary_10_1007_s00500_021_06479_6
crossref_primary_10_1007_s11277_022_09735_6
crossref_primary_10_1108_IJPCC_06_2022_0223
crossref_primary_10_1002_cpe_6926
Cites_doi 10.1109/TBDATA.2016.2587659
10.1007/s11277-016-3273-1
10.1016/j.sysarc.2019.101653
10.1016/j.jpdc.2019.09.008
10.1109/TSC.2015.2491281
10.1007/s10586-017-1368-4
10.1007/s12652-016-0385-0
10.1109/TPDS.2013.284
10.1109/TIFS.2015.2455952
10.1016/j.future.2019.04.046
10.1016/j.ins.2016.09.005
10.1007/s10586-017-0809-4
10.1007/s11761-018-0249-x
10.1007/s00778-017-0470-9
10.1109/TBDATA.2017.2701352
10.1016/j.procs.2015.09.228
10.1007/s12652-019-01563-0
10.1016/j.comcom.2019.11.048
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOI 10.1007/s10586-020-03114-1
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: P5Z
  name: Advanced Technologies & Aerospace Database
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7543
EndPage 1696
ExternalDocumentID 10_1007_s10586_020_03114_1
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
203
29B
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KDC
KOV
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
OVD
P9O
PF0
PT4
PT5
QOS
R89
R9I
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z81
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ABRTQ
ADHKG
ADKFA
AFDZB
AFFHD
AFOHR
AGQPQ
AHPBZ
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
ID FETCH-LOGICAL-c319t-90f437536a5fbdfd265c7f13de920055d2c65e81fe166146d2bf48381feda6cd3
IEDL.DBID RSV
ISICitedReferencesCount 14
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000529834600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1386-7857
IngestDate Wed Nov 26 13:52:08 EST 2025
Tue Nov 18 21:46:30 EST 2025
Sat Nov 29 05:40:15 EST 2025
Fri Feb 21 02:36:48 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Data encryption
Data compression
Secure data transmission
Hybrid Meerkat Clan algorithm (HMCA)
Two-stage Lempel–Ziv algorithm
Data deduplication
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-90f437536a5fbdfd265c7f13de920055d2c65e81fe166146d2bf48381feda6cd3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2918242905
PQPubID 2043865
PageCount 14
ParticipantIDs proquest_journals_2918242905
crossref_citationtrail_10_1007_s10586_020_03114_1
crossref_primary_10_1007_s10586_020_03114_1
springer_journals_10_1007_s10586_020_03114_1
PublicationCentury 2000
PublicationDate 20200900
2020-09-00
20200901
PublicationDateYYYYMMDD 2020-09-01
PublicationDate_xml – month: 9
  year: 2020
  text: 20200900
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle The Journal of Networks, Software Tools and Applications
PublicationTitle Cluster computing
PublicationTitleAbbrev Cluster Comput
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Tian, Ma, Xie, Liu (CR20) 2020; 51
Yan, Zhang, Ding, Zheng (CR3) 2017; 5
Zhou, Varadharajan, Hitchens (CR8) 2015; 10
Velapure, BardeS (CR1) 2014; 26
Thangavel, Varalakshmi (CR11) 2018; 21
Pradeep, Vijayakumar, Subramaniyaswamy (CR15) 2019; 8
Suzic, Reiter, Reimair, Venturi, Kubo (CR5) 2015; 68
Yan, Ding, Yu, Zhu, Deng (CR2) 2016; 2
Chang, Ramachandran (CR4) 2015; 9
Rani, Geethakumari (CR21) 2019; 150
Fan, Liu, Zhang, Li, Yang (CR13) 2020; 135
Pitchai, Jayashri, Raja (CR17) 2016; 90
Fan, Lin, Liang, Tan, Nanda (CR22) 2019; 101
Luo, Zhang, Wu, Khan, Li (CR6) 2015; 61
Eltayieb, Elhabob, Hassan, Li (CR10) 2020; 102
Li, Chen, Li, Li, Lee, Lou (CR7) 2013; 25
Kiraz (CR14) 2016; 7
Maram, Gnanasekar, Manogaran (CR19) 2019; 13
Jayapandian, MdZubair Rahman (CR18) 2017; 20
Attasena, Darmont, Harbi (CR12) 2017; 26
Li, Gai, Qiu, Qiu, Zhao (CR16) 2017; 387
Pravin, Prem Jacob, Nagarajan (CR9) 2019
K Fan (3114_CR13) 2020; 135
KV Pradeep (3114_CR15) 2019; 8
S Luo (3114_CR6) 2015; 61
J Li (3114_CR7) 2013; 25
A Pravin (3114_CR9) 2019
MS Kiraz (3114_CR14) 2016; 7
Z Yan (3114_CR2) 2016; 2
G Tian (3114_CR20) 2020; 51
L Zhou (3114_CR8) 2015; 10
Z Yan (3114_CR3) 2017; 5
M Thangavel (3114_CR11) 2018; 21
Y Fan (3114_CR22) 2019; 101
Sunita S Velapure (3114_CR1) 2014; 26
V Chang (3114_CR4) 2015; 9
B Suzic (3114_CR5) 2015; 68
R Pitchai (3114_CR17) 2016; 90
DR Rani (3114_CR21) 2019; 150
N Eltayieb (3114_CR10) 2020; 102
N Jayapandian (3114_CR18) 2017; 20
Y Li (3114_CR16) 2017; 387
B Maram (3114_CR19) 2019; 13
V Attasena (3114_CR12) 2017; 26
References_xml – volume: 2
  start-page: 138
  issue: 2
  year: 2016
  end-page: 150
  ident: CR2
  article-title: Deduplication on encrypted big data in cloud
  publication-title: IEEE Trans. Big Data
  doi: 10.1109/TBDATA.2016.2587659
– volume: 90
  start-page: 947
  issue: 2
  year: 2016
  end-page: 960
  ident: CR17
  article-title: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing
  publication-title: Wireless Pers. Commun.
  doi: 10.1007/s11277-016-3273-1
– volume: 102
  start-page: 101653
  year: 2020
  ident: CR10
  article-title: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud
  publication-title: J. Syst. Architect.
  doi: 10.1016/j.sysarc.2019.101653
– volume: 135
  start-page: 169
  year: 2020
  end-page: 176
  ident: CR13
  article-title: A secure and efficient outsourced computation on data sharing scheme for privacy computing
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2019.09.008
– volume: 61
  start-page: 1
  issue: 11
  year: 2015
  end-page: 13
  ident: CR6
  article-title: Boafft: distributed deduplication for big data storage in the cloud
  publication-title: IEEE Trans. Cloud Comput
– volume: 9
  start-page: 138
  issue: 1
  year: 2015
  end-page: 151
  ident: CR4
  article-title: Towards achieving data security with the cloud computing adoption framework
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2015.2491281
– volume: 8
  start-page: 14799
  issue: 5
  year: 2019
  end-page: 14805
  ident: CR15
  article-title: An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
  publication-title: J. Comput. Netw. Commun.
– volume: 21
  start-page: 1411
  issue: 2
  year: 2018
  end-page: 1437
  ident: CR11
  article-title: Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
  publication-title: Cluster Comput.
  doi: 10.1007/s10586-017-1368-4
– volume: 7
  start-page: 731
  issue: 5
  year: 2016
  end-page: 760
  ident: CR14
  article-title: A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
  publication-title: J. Ambient Intell. Humanized Comput.
  doi: 10.1007/s12652-016-0385-0
– volume: 25
  start-page: 1615
  issue: 6
  year: 2013
  end-page: 1625
  ident: CR7
  article-title: Secure deduplication with efficient and reliable convergent key management
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2013.284
– volume: 10
  start-page: 2381
  issue: 11
  year: 2015
  end-page: 2395
  ident: CR8
  article-title: Trust enhanced cryptographic role-based access control for secure cloud data storage
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2455952
– volume: 101
  start-page: 127
  year: 2019
  end-page: 135
  ident: CR22
  article-title: A secure privacy preserving deduplication scheme for cloud computing
  publication-title: Fut. Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.04.046
– volume: 26
  start-page: 1206
  issue: 5
  year: 2014
  end-page: 1216
  ident: CR1
  article-title: A hybrid cloud approach for secure authorized deduplication
  publication-title: International Journal of Science and Research (IJSR)
– volume: 387
  start-page: 103
  year: 2017
  end-page: 115
  ident: CR16
  article-title: Intelligent cryptography approach for secure distributed big data storage in cloud computing
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2016.09.005
– volume: 20
  start-page: 1561
  issue: 2
  year: 2017
  end-page: 1573
  ident: CR18
  article-title: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
  publication-title: Cluster Comput.
  doi: 10.1007/s10586-017-0809-4
– volume: 13
  start-page: 3
  year: 2019
  end-page: 15
  ident: CR19
  article-title: Intelligent security algorithm for UNICODE data privacy and security in IOT
  publication-title: SOCA
  doi: 10.1007/s11761-018-0249-x
– volume: 26
  start-page: 657
  issue: 5
  year: 2017
  end-page: 681
  ident: CR12
  article-title: Secret sharing for cloud data security: a survey,
  publication-title: VLDB J. Int. J. Very Large Data Bases
  doi: 10.1007/s00778-017-0470-9
– volume: 5
  start-page: 393
  issue: 3
  year: 2017
  end-page: 407
  ident: CR3
  article-title: Heterogeneous data storage management with deduplication in cloud computing
  publication-title: IEEE Trans. Big Data
  doi: 10.1109/TBDATA.2017.2701352
– volume: 51
  start-page: 102432
  year: 2020
  ident: CR20
  article-title: Randomized deduplication with ownership management and data sharing in cloud storage
  publication-title: J. Inf. Secur. Appl.
– volume: 68
  start-page: 116
  year: 2015
  end-page: 126
  ident: CR5
  article-title: Secure data sharing and processing in heterogeneous clouds
  publication-title: Proc. Comput. Sci.
  doi: 10.1016/j.procs.2015.09.228
– year: 2019
  ident: CR9
  article-title: Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique
  publication-title: J. Ambient Intell. Humanized Comput.
  doi: 10.1007/s12652-019-01563-0
– volume: 150
  start-page: 799
  year: 2019
  end-page: 810
  ident: CR21
  article-title: Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2019.11.048
– volume: 26
  start-page: 1206
  issue: 5
  year: 2014
  ident: 3114_CR1
  publication-title: International Journal of Science and Research (IJSR)
– volume: 13
  start-page: 3
  year: 2019
  ident: 3114_CR19
  publication-title: SOCA
  doi: 10.1007/s11761-018-0249-x
– volume: 9
  start-page: 138
  issue: 1
  year: 2015
  ident: 3114_CR4
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2015.2491281
– volume: 150
  start-page: 799
  year: 2019
  ident: 3114_CR21
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2019.11.048
– volume: 26
  start-page: 657
  issue: 5
  year: 2017
  ident: 3114_CR12
  publication-title: VLDB J. Int. J. Very Large Data Bases
  doi: 10.1007/s00778-017-0470-9
– volume: 90
  start-page: 947
  issue: 2
  year: 2016
  ident: 3114_CR17
  publication-title: Wireless Pers. Commun.
  doi: 10.1007/s11277-016-3273-1
– volume: 387
  start-page: 103
  year: 2017
  ident: 3114_CR16
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2016.09.005
– volume: 10
  start-page: 2381
  issue: 11
  year: 2015
  ident: 3114_CR8
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2455952
– volume: 25
  start-page: 1615
  issue: 6
  year: 2013
  ident: 3114_CR7
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2013.284
– volume: 135
  start-page: 169
  year: 2020
  ident: 3114_CR13
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2019.09.008
– volume: 5
  start-page: 393
  issue: 3
  year: 2017
  ident: 3114_CR3
  publication-title: IEEE Trans. Big Data
  doi: 10.1109/TBDATA.2017.2701352
– volume: 7
  start-page: 731
  issue: 5
  year: 2016
  ident: 3114_CR14
  publication-title: J. Ambient Intell. Humanized Comput.
  doi: 10.1007/s12652-016-0385-0
– volume: 8
  start-page: 14799
  issue: 5
  year: 2019
  ident: 3114_CR15
  publication-title: J. Comput. Netw. Commun.
– volume: 61
  start-page: 1
  issue: 11
  year: 2015
  ident: 3114_CR6
  publication-title: IEEE Trans. Cloud Comput
– year: 2019
  ident: 3114_CR9
  publication-title: J. Ambient Intell. Humanized Comput.
  doi: 10.1007/s12652-019-01563-0
– volume: 51
  start-page: 102432
  year: 2020
  ident: 3114_CR20
  publication-title: J. Inf. Secur. Appl.
– volume: 20
  start-page: 1561
  issue: 2
  year: 2017
  ident: 3114_CR18
  publication-title: Cluster Comput.
  doi: 10.1007/s10586-017-0809-4
– volume: 2
  start-page: 138
  issue: 2
  year: 2016
  ident: 3114_CR2
  publication-title: IEEE Trans. Big Data
  doi: 10.1109/TBDATA.2016.2587659
– volume: 68
  start-page: 116
  year: 2015
  ident: 3114_CR5
  publication-title: Proc. Comput. Sci.
  doi: 10.1016/j.procs.2015.09.228
– volume: 21
  start-page: 1411
  issue: 2
  year: 2018
  ident: 3114_CR11
  publication-title: Cluster Comput.
  doi: 10.1007/s10586-017-1368-4
– volume: 101
  start-page: 127
  year: 2019
  ident: 3114_CR22
  publication-title: Fut. Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.04.046
– volume: 102
  start-page: 101653
  year: 2020
  ident: 3114_CR10
  publication-title: J. Syst. Architect.
  doi: 10.1016/j.sysarc.2019.101653
SSID ssj0009729
Score 2.3090563
Snippet The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1683
SubjectTerms Access control
Algorithms
Big Data
Cloud computing
Computer Communication Networks
Computer Science
Confidentiality
Cryptography
Cybersecurity
Data encryption
Data transmission
Distributed processing
Encryption
Keywords
Methods
Operating Systems
Personal information
Privacy
Processor Architectures
Proprietorships
SummonAdditionalLinks – databaseName: Advanced Technologies & Aerospace Database
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JT9wwFLYo9NBLgS5i2ORDb8XqxI6XnKohGjQX0ByohLhEiZd2pCEZZkIl4M_Xz-MQFQkuSLlke7L0Fj9_fn4fQt8yZiVVFSVGSEFSZ1JSMVkSqnRmmUyNHLpANiEvLtTVVTaNgNsqllV2MTEEatNowMh_0Mxnwj54DvnPxS0B1ijYXY0UGu_QFnRJAOqGKb_um-7KwFKWMCWIVFzGQzPx6BxXUH47JN6sk5Qk_09Mfbb5bIM0zDtn228d8Q76GDNOPFqbyC7asPUntN2xOeDo3J_RY4DeLYaaUdzCFOZNALA07K8SG-iwC-RY1mA9b-4MBjzXCwAkF_s0Ev-x8wVuHJ6c5yNc1mYtyQtf3oe4hKHG_jdu_M3N7MGLyadkdDom4zz_gn6djS_zCYnUDER7n21JNnQp8ysdUXJXGWeo4Fq6hBmbAUzFDdWCW5U4m0ACIAytXKoYPDCl0IZ9RZt1U9s9hIUyonRC-3WXS0vBM1EKy7TPE_1K0lE2QEmnl0LHvuVAnzEv-o7LoMvC67IIuiySAfr-9M9i3bXj1a8POwUW0YNXRa-9ATrpTKB__bK0_delHaAPNFgdlKkdos12eWeP0Hv9t52tlsfBfv8BnVL0Gg
  priority: 102
  providerName: ProQuest
Title Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC
URI https://link.springer.com/article/10.1007/s10586-020-03114-1
https://www.proquest.com/docview/2918242905
Volume 23
WOSCitedRecordID wos000529834600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1573-7543
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0009729
  issn: 1386-7857
  databaseCode: P5Z
  dateStart: 19980101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1573-7543
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0009729
  issn: 1386-7857
  databaseCode: K7-
  dateStart: 19980101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1573-7543
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0009729
  issn: 1386-7857
  databaseCode: BENPR
  dateStart: 19980101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLink Contemporary
  customDbUrl:
  eissn: 1573-7543
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009729
  issn: 1386-7857
  databaseCode: RSV
  dateStart: 19980101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bSyMxFD64ug_74m1dtl5KHnzTQCeZXOaxDhVBLMXLIvsyTHNxhW4rbRXUP-9JOmNdWQWFYWBmMoeQc5Jzycn5AHYz7hTTfUatVJKm3qa0z1VJmTaZ4yq1quUj2ITqdvXlZdarDoVN6mz3eksyrtQvDrsJHRJmWxQFMUkp-jxLqO50AGw4Pfs1L7WrIjZZwrG10kJVR2X-T-NfdTS3MV9ti0Ztc7jyuX6uwnJlXZL2TBzWYMEN12GlRm4g1UT-Do8xzO5IyA8l06CukN0hbkbwKokN1XQDEJazxAxGt5aE2C0SCFFbgiYj-eMGN2TkydFJ3ibl0M4oIfHxfVyDSMinvyIjfPh7_YBk8h5tH3RoJ8834OKwc54f0QqGgRqcn1OatXzK0auRpfB96y2TwiifcOuyEJISlhkpnE68S4Kyl5b1fap5eGFLaSz_AYvD0dD9BCK1laWXBn0sn5ZSZLKUjhu0CdFr9Iw3IKm5UZiqRnmAyhgU8-rKYXQLHN0ijm6RNGDv-Z-bWYWOd1tv10wuqtk6KViGXhYq5pZowH7N1Pnnt6ltfqz5FnxjUS5Cito2LE7Ht24Hvpq76fVk3ISlg063d9qEL8eK4r0nfjejZD8BmJztRw
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQXylMECuwBTrAi3rV31weEgkmVKm3UQ5F6M84-oFKIQ5KCCv-J38jMxsYCid56QPLFrznY3zx2dmY-gGe59FqYqeBOacXT4FI-lbriwtjcS5063Q-RbEJPJubkJD_agp9tLwyVVbY2MRpqV1vKkb8SOUbCaDz72ZvFF06sUbS72lJobGAx9uffcMm2er3_Dv_vcyH2hsfFiDesAtwi3NY874dUYpCuqixMXXBCZVaHRDqfU4Ylc8KqzJsk-IR8l3JiGlIj6YKrlHUS5V6Bq6k0mvRqrHk35FdHVrREGsW1yXTTpNO06mWGyn37HNUoSXnypyPsotu_NmSjn9vb-d--0C242UTUbLBRgduw5ed3YKdlq2CN8boLP-LWgmdUE8vW5KIR4pQrZHhUzNEEYSL_8o7ZWX3mGOWrUQBlqhmGyeyTny1YHdjosBiwau42klD48jzaXUY9BB9ZjSefT7-jmOKID94O-bAo7sH7S_kE92F7Xs_9A2DKOFUFZXFdGdJKZbmqlJcW42BcKQche5C0OChtM5ed6EFmZTdRmrBTInbKiJ0y6cGL3-8sNlNJLnx6twVM2VioVdmhpQcvW8h1t_8t7eHF0p7C9dHx4UF5sD8ZP4IbIiKeSvJ2YXu9PPOP4Zr9uj5dLZ9E3WHw4bKh-AvyrFEg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpR1db9Mw0EJjQnuhbDCtUMAPextWGzuxk8cuazXEVlXahvoWpf7YKpWkalMk4M9z5yZ0IECaJuUlyeVk3Z1zH74PQo4TYRWPp5wZqSQLnQnZVKic8VgnVqjQqJ7zwybUaBRPJsn4XhW_z3ZvjiQ3NQ3YpamougvjuvcK36IYk2d7DIQyCBn4P09DTKRHf_3q87btrvJzygIB0CqOVF0283ccv6umrb35xxGp1zzD1uPX_II8r61O2t-IyT55YosD0momOtB6g78kP3z43VLMG6UVqjEQA4ynUbhyarDLLg7Isobqebk2FGO6gACjuRRMSXpn5wtaOnp-mfZpXpgNJkC-_Ob_TRTz7G9pCTdfZt8BTTpm_dMBG6TpK3IzHFyn56wez8A07NuKJT0XCvB2ZB65qXGGy0grFwhjEwxVRYZrGdk4cDZAI0AaPnVhLPCByaU24pDsFGVhjwiVsZG5kxp8LxfmMkpkLq3QYCuCN-m4aJOg4Uym697lOEJjnm27LiN1M6Bu5qmbBW1y8uubxaZzx3-hOw3Ds3oXrzKegPcFCrsXtcmHhsHb1__G9vph4O_Js_HZMLv4OPr0huxxLyKYxdYhO9Vybd-SXf21mq2W77xw_wQYtvWl
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+data+transmission+on+a+distributed+cloud+server+with+the+help+of+HMCA+and+data+encryption+using+optimized+CP-ABE-ECC&rft.jtitle=Cluster+computing&rft.au=Vengala%2C+Dilip+Venkata+Kumar&rft.au=Kavitha%2C+D.&rft.au=Kumar%2C+A.+P.+Siva&rft.date=2020-09-01&rft.pub=Springer+US&rft.issn=1386-7857&rft.eissn=1573-7543&rft.volume=23&rft.issue=3&rft.spage=1683&rft.epage=1696&rft_id=info:doi/10.1007%2Fs10586-020-03114-1&rft.externalDocID=10_1007_s10586_020_03114_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1386-7857&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1386-7857&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1386-7857&client=summon