Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC
The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniq...
Uložené v:
| Vydané v: | Cluster computing Ročník 23; číslo 3; s. 1683 - 1696 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
New York
Springer US
01.09.2020
Springer Nature B.V |
| Predmet: | |
| ISSN: | 1386-7857, 1573-7543 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniques were posited for securely amassing the data in the cloud; however, during massive transmission, none of them maintain end-to-end security. And, prevailing methods are also unable to solve the key intricacy and avoid key secrecy exposé. Thus, for trouncing these disadvantages and also assuring the data transmission (DT) as of the source–destination, a secure DT scheme with the help of a distributed cloud server (CS) and data deduplication is proposed. The uploaded user data can well be amassed in disparate CS to ameliorate the user data’s security. It can be done by, first, extracting the features of the user data along with the CS. After that, the Hybrid Meerkat clan algorithm (HMCA) chose the CS, which is optimally centered on the features. Next, the SHA512 algorithm performs the data deduplication of the input user data. Subsequent to data deduplication, the input file is compressed and encrypted using a two-stage lempel–ziv algorithm and optimized CP-ABE-ECC algorithm. Lastly, the encrypted file is stored in the chosen CS. The experimentation is implemented to analyze the proposed method’s performance. The outcomes exhibited that the proposed work performed better contrasted to other prevailing algorithms. |
|---|---|
| AbstractList | The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user cannot utilize CC to its full potentials. Storing their sensitive data in an insecure place is not even an option for these users. Many techniques were posited for securely amassing the data in the cloud; however, during massive transmission, none of them maintain end-to-end security. And, prevailing methods are also unable to solve the key intricacy and avoid key secrecy exposé. Thus, for trouncing these disadvantages and also assuring the data transmission (DT) as of the source–destination, a secure DT scheme with the help of a distributed cloud server (CS) and data deduplication is proposed. The uploaded user data can well be amassed in disparate CS to ameliorate the user data’s security. It can be done by, first, extracting the features of the user data along with the CS. After that, the Hybrid Meerkat clan algorithm (HMCA) chose the CS, which is optimally centered on the features. Next, the SHA512 algorithm performs the data deduplication of the input user data. Subsequent to data deduplication, the input file is compressed and encrypted using a two-stage lempel–ziv algorithm and optimized CP-ABE-ECC algorithm. Lastly, the encrypted file is stored in the chosen CS. The experimentation is implemented to analyze the proposed method’s performance. The outcomes exhibited that the proposed work performed better contrasted to other prevailing algorithms. |
| Author | Kumar, A. P. Siva Kavitha, D. Vengala, Dilip Venkata Kumar |
| Author_xml | – sequence: 1 givenname: Dilip Venkata Kumar surname: Vengala fullname: Vengala, Dilip Venkata Kumar email: dilipvenkatakumar.phd@gmail.com organization: JNTUA – sequence: 2 givenname: D. surname: Kavitha fullname: Kavitha, D. organization: G. Pulla Reddy Engineering College – sequence: 3 givenname: A. P. Siva surname: Kumar fullname: Kumar, A. P. Siva organization: JNTUA CEA |
| BookMark | eNp9kEtLAzEUhYMo2Kp_wFXAdTSPyTyWdagPUBTUdUjzsCltpiYZpfrnTR1BcFEIJDf3fCe5Zwz2fecNAKcEnxOMq4tIMK9LhClGmBFSILIHRoRXDFW8YPv5zHK7qnl1CMYxLjDGTUWbEfh6MqoPBmqZJExB-rhyMbrOw7wk1C6m4GZ9MhqqZddrGE14NwF-uDSHaW7g3CzXsLPw5r6dQOn14GS8Cpt12vr00flX2OVi5T6zTfuIJpdTNG3bY3Bg5TKak9_9CLxcTZ_bG3T3cH3bTu6QYqRJqMG2YBVnpeR2pq2mJVeVJUybhmLMuaaq5KYm1pCyJEWp6cwWNdteaFkqzY7A2eC7Dt1bb2ISi64PPj8paENqWtAG86yqB5UKXYzBWKFcktsRcixuKQgW26jFELXIUYufqAXJKP2HroNbybDZDbEBilnsX034-9UO6hvRx5ME |
| CitedBy_id | crossref_primary_10_1007_s10586_021_03242_2 crossref_primary_10_1007_s11042_022_13960_3 crossref_primary_10_1007_s10586_021_03472_4 crossref_primary_10_1007_s11276_023_03554_8 crossref_primary_10_1007_s11334_022_00515_w crossref_primary_10_3390_s25030731 crossref_primary_10_1007_s42044_022_00129_2 crossref_primary_10_1007_s00500_021_06479_6 crossref_primary_10_1007_s11277_022_09735_6 crossref_primary_10_1108_IJPCC_06_2022_0223 crossref_primary_10_1002_cpe_6926 |
| Cites_doi | 10.1109/TBDATA.2016.2587659 10.1007/s11277-016-3273-1 10.1016/j.sysarc.2019.101653 10.1016/j.jpdc.2019.09.008 10.1109/TSC.2015.2491281 10.1007/s10586-017-1368-4 10.1007/s12652-016-0385-0 10.1109/TPDS.2013.284 10.1109/TIFS.2015.2455952 10.1016/j.future.2019.04.046 10.1016/j.ins.2016.09.005 10.1007/s10586-017-0809-4 10.1007/s11761-018-0249-x 10.1007/s00778-017-0470-9 10.1109/TBDATA.2017.2701352 10.1016/j.procs.2015.09.228 10.1007/s12652-019-01563-0 10.1016/j.comcom.2019.11.048 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
| DOI | 10.1007/s10586-020-03114-1 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Advanced Technologies & Aerospace Collection |
| Database_xml | – sequence: 1 dbid: P5Z name: Advanced Technologies & Aerospace Database url: https://search.proquest.com/hightechjournals sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7543 |
| EndPage | 1696 |
| ExternalDocumentID | 10_1007_s10586_020_03114_1 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 203 29B 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV LAK LLZTM M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM OVD P9O PF0 PT4 PT5 QOS R89 R9I RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABBRH ABDBE ABRTQ ADHKG ADKFA AFDZB AFFHD AFOHR AGQPQ AHPBZ ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 8FE 8FG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQQKQ PQUKI |
| ID | FETCH-LOGICAL-c319t-90f437536a5fbdfd265c7f13de920055d2c65e81fe166146d2bf48381feda6cd3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 14 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000529834600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1386-7857 |
| IngestDate | Wed Nov 26 13:52:08 EST 2025 Tue Nov 18 21:46:30 EST 2025 Sat Nov 29 05:40:15 EST 2025 Fri Feb 21 02:36:48 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | Data encryption Data compression Secure data transmission Hybrid Meerkat Clan algorithm (HMCA) Two-stage Lempel–Ziv algorithm Data deduplication |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-90f437536a5fbdfd265c7f13de920055d2c65e81fe166146d2bf48381feda6cd3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2918242905 |
| PQPubID | 2043865 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2918242905 crossref_citationtrail_10_1007_s10586_020_03114_1 crossref_primary_10_1007_s10586_020_03114_1 springer_journals_10_1007_s10586_020_03114_1 |
| PublicationCentury | 2000 |
| PublicationDate | 20200900 2020-09-00 20200901 |
| PublicationDateYYYYMMDD | 2020-09-01 |
| PublicationDate_xml | – month: 9 year: 2020 text: 20200900 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | The Journal of Networks, Software Tools and Applications |
| PublicationTitle | Cluster computing |
| PublicationTitleAbbrev | Cluster Comput |
| PublicationYear | 2020 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Tian, Ma, Xie, Liu (CR20) 2020; 51 Yan, Zhang, Ding, Zheng (CR3) 2017; 5 Zhou, Varadharajan, Hitchens (CR8) 2015; 10 Velapure, BardeS (CR1) 2014; 26 Thangavel, Varalakshmi (CR11) 2018; 21 Pradeep, Vijayakumar, Subramaniyaswamy (CR15) 2019; 8 Suzic, Reiter, Reimair, Venturi, Kubo (CR5) 2015; 68 Yan, Ding, Yu, Zhu, Deng (CR2) 2016; 2 Chang, Ramachandran (CR4) 2015; 9 Rani, Geethakumari (CR21) 2019; 150 Fan, Liu, Zhang, Li, Yang (CR13) 2020; 135 Pitchai, Jayashri, Raja (CR17) 2016; 90 Fan, Lin, Liang, Tan, Nanda (CR22) 2019; 101 Luo, Zhang, Wu, Khan, Li (CR6) 2015; 61 Eltayieb, Elhabob, Hassan, Li (CR10) 2020; 102 Li, Chen, Li, Li, Lee, Lou (CR7) 2013; 25 Kiraz (CR14) 2016; 7 Maram, Gnanasekar, Manogaran (CR19) 2019; 13 Jayapandian, MdZubair Rahman (CR18) 2017; 20 Attasena, Darmont, Harbi (CR12) 2017; 26 Li, Gai, Qiu, Qiu, Zhao (CR16) 2017; 387 Pravin, Prem Jacob, Nagarajan (CR9) 2019 K Fan (3114_CR13) 2020; 135 KV Pradeep (3114_CR15) 2019; 8 S Luo (3114_CR6) 2015; 61 J Li (3114_CR7) 2013; 25 A Pravin (3114_CR9) 2019 MS Kiraz (3114_CR14) 2016; 7 Z Yan (3114_CR2) 2016; 2 G Tian (3114_CR20) 2020; 51 L Zhou (3114_CR8) 2015; 10 Z Yan (3114_CR3) 2017; 5 M Thangavel (3114_CR11) 2018; 21 Y Fan (3114_CR22) 2019; 101 Sunita S Velapure (3114_CR1) 2014; 26 V Chang (3114_CR4) 2015; 9 B Suzic (3114_CR5) 2015; 68 R Pitchai (3114_CR17) 2016; 90 DR Rani (3114_CR21) 2019; 150 N Eltayieb (3114_CR10) 2020; 102 N Jayapandian (3114_CR18) 2017; 20 Y Li (3114_CR16) 2017; 387 B Maram (3114_CR19) 2019; 13 V Attasena (3114_CR12) 2017; 26 |
| References_xml | – volume: 2 start-page: 138 issue: 2 year: 2016 end-page: 150 ident: CR2 article-title: Deduplication on encrypted big data in cloud publication-title: IEEE Trans. Big Data doi: 10.1109/TBDATA.2016.2587659 – volume: 90 start-page: 947 issue: 2 year: 2016 end-page: 960 ident: CR17 article-title: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing publication-title: Wireless Pers. Commun. doi: 10.1007/s11277-016-3273-1 – volume: 102 start-page: 101653 year: 2020 ident: CR10 article-title: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud publication-title: J. Syst. Architect. doi: 10.1016/j.sysarc.2019.101653 – volume: 135 start-page: 169 year: 2020 end-page: 176 ident: CR13 article-title: A secure and efficient outsourced computation on data sharing scheme for privacy computing publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2019.09.008 – volume: 61 start-page: 1 issue: 11 year: 2015 end-page: 13 ident: CR6 article-title: Boafft: distributed deduplication for big data storage in the cloud publication-title: IEEE Trans. Cloud Comput – volume: 9 start-page: 138 issue: 1 year: 2015 end-page: 151 ident: CR4 article-title: Towards achieving data security with the cloud computing adoption framework publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2015.2491281 – volume: 8 start-page: 14799 issue: 5 year: 2019 end-page: 14805 ident: CR15 article-title: An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment publication-title: J. Comput. Netw. Commun. – volume: 21 start-page: 1411 issue: 2 year: 2018 end-page: 1437 ident: CR11 article-title: Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud publication-title: Cluster Comput. doi: 10.1007/s10586-017-1368-4 – volume: 7 start-page: 731 issue: 5 year: 2016 end-page: 760 ident: CR14 article-title: A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing publication-title: J. Ambient Intell. Humanized Comput. doi: 10.1007/s12652-016-0385-0 – volume: 25 start-page: 1615 issue: 6 year: 2013 end-page: 1625 ident: CR7 article-title: Secure deduplication with efficient and reliable convergent key management publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2013.284 – volume: 10 start-page: 2381 issue: 11 year: 2015 end-page: 2395 ident: CR8 article-title: Trust enhanced cryptographic role-based access control for secure cloud data storage publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2455952 – volume: 101 start-page: 127 year: 2019 end-page: 135 ident: CR22 article-title: A secure privacy preserving deduplication scheme for cloud computing publication-title: Fut. Gener. Comput. Syst. doi: 10.1016/j.future.2019.04.046 – volume: 26 start-page: 1206 issue: 5 year: 2014 end-page: 1216 ident: CR1 article-title: A hybrid cloud approach for secure authorized deduplication publication-title: International Journal of Science and Research (IJSR) – volume: 387 start-page: 103 year: 2017 end-page: 115 ident: CR16 article-title: Intelligent cryptography approach for secure distributed big data storage in cloud computing publication-title: Inf. Sci. doi: 10.1016/j.ins.2016.09.005 – volume: 20 start-page: 1561 issue: 2 year: 2017 end-page: 1573 ident: CR18 article-title: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption publication-title: Cluster Comput. doi: 10.1007/s10586-017-0809-4 – volume: 13 start-page: 3 year: 2019 end-page: 15 ident: CR19 article-title: Intelligent security algorithm for UNICODE data privacy and security in IOT publication-title: SOCA doi: 10.1007/s11761-018-0249-x – volume: 26 start-page: 657 issue: 5 year: 2017 end-page: 681 ident: CR12 article-title: Secret sharing for cloud data security: a survey, publication-title: VLDB J. Int. J. Very Large Data Bases doi: 10.1007/s00778-017-0470-9 – volume: 5 start-page: 393 issue: 3 year: 2017 end-page: 407 ident: CR3 article-title: Heterogeneous data storage management with deduplication in cloud computing publication-title: IEEE Trans. Big Data doi: 10.1109/TBDATA.2017.2701352 – volume: 51 start-page: 102432 year: 2020 ident: CR20 article-title: Randomized deduplication with ownership management and data sharing in cloud storage publication-title: J. Inf. Secur. Appl. – volume: 68 start-page: 116 year: 2015 end-page: 126 ident: CR5 article-title: Secure data sharing and processing in heterogeneous clouds publication-title: Proc. Comput. Sci. doi: 10.1016/j.procs.2015.09.228 – year: 2019 ident: CR9 article-title: Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique publication-title: J. Ambient Intell. Humanized Comput. doi: 10.1007/s12652-019-01563-0 – volume: 150 start-page: 799 year: 2019 end-page: 810 ident: CR21 article-title: Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN publication-title: Comput. Commun. doi: 10.1016/j.comcom.2019.11.048 – volume: 26 start-page: 1206 issue: 5 year: 2014 ident: 3114_CR1 publication-title: International Journal of Science and Research (IJSR) – volume: 13 start-page: 3 year: 2019 ident: 3114_CR19 publication-title: SOCA doi: 10.1007/s11761-018-0249-x – volume: 9 start-page: 138 issue: 1 year: 2015 ident: 3114_CR4 publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2015.2491281 – volume: 150 start-page: 799 year: 2019 ident: 3114_CR21 publication-title: Comput. Commun. doi: 10.1016/j.comcom.2019.11.048 – volume: 26 start-page: 657 issue: 5 year: 2017 ident: 3114_CR12 publication-title: VLDB J. Int. J. Very Large Data Bases doi: 10.1007/s00778-017-0470-9 – volume: 90 start-page: 947 issue: 2 year: 2016 ident: 3114_CR17 publication-title: Wireless Pers. Commun. doi: 10.1007/s11277-016-3273-1 – volume: 387 start-page: 103 year: 2017 ident: 3114_CR16 publication-title: Inf. Sci. doi: 10.1016/j.ins.2016.09.005 – volume: 10 start-page: 2381 issue: 11 year: 2015 ident: 3114_CR8 publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2455952 – volume: 25 start-page: 1615 issue: 6 year: 2013 ident: 3114_CR7 publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2013.284 – volume: 135 start-page: 169 year: 2020 ident: 3114_CR13 publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2019.09.008 – volume: 5 start-page: 393 issue: 3 year: 2017 ident: 3114_CR3 publication-title: IEEE Trans. Big Data doi: 10.1109/TBDATA.2017.2701352 – volume: 7 start-page: 731 issue: 5 year: 2016 ident: 3114_CR14 publication-title: J. Ambient Intell. Humanized Comput. doi: 10.1007/s12652-016-0385-0 – volume: 8 start-page: 14799 issue: 5 year: 2019 ident: 3114_CR15 publication-title: J. Comput. Netw. Commun. – volume: 61 start-page: 1 issue: 11 year: 2015 ident: 3114_CR6 publication-title: IEEE Trans. Cloud Comput – year: 2019 ident: 3114_CR9 publication-title: J. Ambient Intell. Humanized Comput. doi: 10.1007/s12652-019-01563-0 – volume: 51 start-page: 102432 year: 2020 ident: 3114_CR20 publication-title: J. Inf. Secur. Appl. – volume: 20 start-page: 1561 issue: 2 year: 2017 ident: 3114_CR18 publication-title: Cluster Comput. doi: 10.1007/s10586-017-0809-4 – volume: 2 start-page: 138 issue: 2 year: 2016 ident: 3114_CR2 publication-title: IEEE Trans. Big Data doi: 10.1109/TBDATA.2016.2587659 – volume: 68 start-page: 116 year: 2015 ident: 3114_CR5 publication-title: Proc. Comput. Sci. doi: 10.1016/j.procs.2015.09.228 – volume: 21 start-page: 1411 issue: 2 year: 2018 ident: 3114_CR11 publication-title: Cluster Comput. doi: 10.1007/s10586-017-1368-4 – volume: 101 start-page: 127 year: 2019 ident: 3114_CR22 publication-title: Fut. Gener. Comput. Syst. doi: 10.1016/j.future.2019.04.046 – volume: 102 start-page: 101653 year: 2020 ident: 3114_CR10 publication-title: J. Syst. Architect. doi: 10.1016/j.sysarc.2019.101653 |
| SSID | ssj0009729 |
| Score | 2.3090563 |
| Snippet | The cloud computing (CC) model is diverse as well as has broad phenomena because of which it is being preferred widely. Due to security challenges, the user... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1683 |
| SubjectTerms | Access control Algorithms Big Data Cloud computing Computer Communication Networks Computer Science Confidentiality Cryptography Cybersecurity Data encryption Data transmission Distributed processing Encryption Keywords Methods Operating Systems Personal information Privacy Processor Architectures Proprietorships |
| SummonAdditionalLinks | – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JT9wwFLYo9NBLgS5i2ORDb8XqxI6XnKohGjQX0ByohLhEiZd2pCEZZkIl4M_Xz-MQFQkuSLlke7L0Fj9_fn4fQt8yZiVVFSVGSEFSZ1JSMVkSqnRmmUyNHLpANiEvLtTVVTaNgNsqllV2MTEEatNowMh_0Mxnwj54DvnPxS0B1ijYXY0UGu_QFnRJAOqGKb_um-7KwFKWMCWIVFzGQzPx6BxXUH47JN6sk5Qk_09Mfbb5bIM0zDtn228d8Q76GDNOPFqbyC7asPUntN2xOeDo3J_RY4DeLYaaUdzCFOZNALA07K8SG-iwC-RY1mA9b-4MBjzXCwAkF_s0Ev-x8wVuHJ6c5yNc1mYtyQtf3oe4hKHG_jdu_M3N7MGLyadkdDom4zz_gn6djS_zCYnUDER7n21JNnQp8ysdUXJXGWeo4Fq6hBmbAUzFDdWCW5U4m0ACIAytXKoYPDCl0IZ9RZt1U9s9hIUyonRC-3WXS0vBM1EKy7TPE_1K0lE2QEmnl0LHvuVAnzEv-o7LoMvC67IIuiySAfr-9M9i3bXj1a8POwUW0YNXRa-9ATrpTKB__bK0_delHaAPNFgdlKkdos12eWeP0Hv9t52tlsfBfv8BnVL0Gg priority: 102 providerName: ProQuest |
| Title | Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC |
| URI | https://link.springer.com/article/10.1007/s10586-020-03114-1 https://www.proquest.com/docview/2918242905 |
| Volume | 23 |
| WOSCitedRecordID | wos000529834600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1573-7543 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0009729 issn: 1386-7857 databaseCode: P5Z dateStart: 19980101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1573-7543 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0009729 issn: 1386-7857 databaseCode: K7- dateStart: 19980101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1573-7543 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0009729 issn: 1386-7857 databaseCode: BENPR dateStart: 19980101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLink Contemporary customDbUrl: eissn: 1573-7543 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009729 issn: 1386-7857 databaseCode: RSV dateStart: 19980101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bSyMxFD64ug_74m1dtl5KHnzTQCeZXOaxDhVBLMXLIvsyTHNxhW4rbRXUP-9JOmNdWQWFYWBmMoeQc5Jzycn5AHYz7hTTfUatVJKm3qa0z1VJmTaZ4yq1quUj2ITqdvXlZdarDoVN6mz3eksyrtQvDrsJHRJmWxQFMUkp-jxLqO50AGw4Pfs1L7WrIjZZwrG10kJVR2X-T-NfdTS3MV9ti0Ztc7jyuX6uwnJlXZL2TBzWYMEN12GlRm4g1UT-Do8xzO5IyA8l06CukN0hbkbwKokN1XQDEJazxAxGt5aE2C0SCFFbgiYj-eMGN2TkydFJ3ibl0M4oIfHxfVyDSMinvyIjfPh7_YBk8h5tH3RoJ8834OKwc54f0QqGgRqcn1OatXzK0auRpfB96y2TwiifcOuyEJISlhkpnE68S4Kyl5b1fap5eGFLaSz_AYvD0dD9BCK1laWXBn0sn5ZSZLKUjhu0CdFr9Iw3IKm5UZiqRnmAyhgU8-rKYXQLHN0ijm6RNGDv-Z-bWYWOd1tv10wuqtk6KViGXhYq5pZowH7N1Pnnt6ltfqz5FnxjUS5Cito2LE7Ht24Hvpq76fVk3ISlg063d9qEL8eK4r0nfjejZD8BmJztRw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQXylMECuwBTrAi3rV31weEgkmVKm3UQ5F6M84-oFKIQ5KCCv-J38jMxsYCid56QPLFrznY3zx2dmY-gGe59FqYqeBOacXT4FI-lbriwtjcS5063Q-RbEJPJubkJD_agp9tLwyVVbY2MRpqV1vKkb8SOUbCaDz72ZvFF06sUbS72lJobGAx9uffcMm2er3_Dv_vcyH2hsfFiDesAtwi3NY874dUYpCuqixMXXBCZVaHRDqfU4Ylc8KqzJsk-IR8l3JiGlIj6YKrlHUS5V6Bq6k0mvRqrHk35FdHVrREGsW1yXTTpNO06mWGyn37HNUoSXnypyPsotu_NmSjn9vb-d--0C242UTUbLBRgduw5ed3YKdlq2CN8boLP-LWgmdUE8vW5KIR4pQrZHhUzNEEYSL_8o7ZWX3mGOWrUQBlqhmGyeyTny1YHdjosBiwau42klD48jzaXUY9BB9ZjSefT7-jmOKID94O-bAo7sH7S_kE92F7Xs_9A2DKOFUFZXFdGdJKZbmqlJcW42BcKQche5C0OChtM5ed6EFmZTdRmrBTInbKiJ0y6cGL3-8sNlNJLnx6twVM2VioVdmhpQcvW8h1t_8t7eHF0p7C9dHx4UF5sD8ZP4IbIiKeSvJ2YXu9PPOP4Zr9uj5dLZ9E3WHw4bKh-AvyrFEg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpR1db9Mw0EJjQnuhbDCtUMAPextWGzuxk8cuazXEVlXahvoWpf7YKpWkalMk4M9z5yZ0IECaJuUlyeVk3Z1zH74PQo4TYRWPp5wZqSQLnQnZVKic8VgnVqjQqJ7zwybUaBRPJsn4XhW_z3ZvjiQ3NQ3YpamougvjuvcK36IYk2d7DIQyCBn4P09DTKRHf_3q87btrvJzygIB0CqOVF0283ccv6umrb35xxGp1zzD1uPX_II8r61O2t-IyT55YosD0momOtB6g78kP3z43VLMG6UVqjEQA4ynUbhyarDLLg7Isobqebk2FGO6gACjuRRMSXpn5wtaOnp-mfZpXpgNJkC-_Ob_TRTz7G9pCTdfZt8BTTpm_dMBG6TpK3IzHFyn56wez8A07NuKJT0XCvB2ZB65qXGGy0grFwhjEwxVRYZrGdk4cDZAI0AaPnVhLPCByaU24pDsFGVhjwiVsZG5kxp8LxfmMkpkLq3QYCuCN-m4aJOg4Uym697lOEJjnm27LiN1M6Bu5qmbBW1y8uubxaZzx3-hOw3Ds3oXrzKegPcFCrsXtcmHhsHb1__G9vph4O_Js_HZMLv4OPr0huxxLyKYxdYhO9Vybd-SXf21mq2W77xw_wQYtvWl |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+data+transmission+on+a+distributed+cloud+server+with+the+help+of+HMCA+and+data+encryption+using+optimized+CP-ABE-ECC&rft.jtitle=Cluster+computing&rft.au=Vengala%2C+Dilip+Venkata+Kumar&rft.au=Kavitha%2C+D.&rft.au=Kumar%2C+A.+P.+Siva&rft.date=2020-09-01&rft.pub=Springer+US&rft.issn=1386-7857&rft.eissn=1573-7543&rft.volume=23&rft.issue=3&rft.spage=1683&rft.epage=1696&rft_id=info:doi/10.1007%2Fs10586-020-03114-1&rft.externalDocID=10_1007_s10586_020_03114_1 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1386-7857&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1386-7857&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1386-7857&client=summon |