Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data

  • Mouleeswaran S.K. Associate Professor, Department of Computer Science and Engineering, Dayananda Sagar University, Bangalore, India.
  • Kanya Devi J Assistant Professor, Department of Computer Science and Engineering, RVSFOE, RVS Technical Campus, Coimbatore, Tamil Nadu, India.
  • Illayaraja Assistant Professor, Department of Computer Science and Engineering, RVSFOE, RVS Technical Campus, Coimbatore, Tamil Nadu, India.
Keywords: Cloud Environment, User Profile, Data Security, Class Based Approach, Multi Stage Encryption


The security issues in the cloud have been well studied. The data security has much importance in point of data owner. There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper. The method classifies the data into number of classes and different encryption scheme is used for different classes in different levels. Similarly, the user has been authenticated for their access and they have been classified into different categories. According to the user profile, the method restricts the access of user and based on the same, the method defines security measures. A system defined encryption methodology is used for encrypting the data. Moreover, the user has been returned with other encryption methods which can be decrypted by the user using their own key provided by the system. The proposed algorithm improves the performance of security and improves the data security.


Zhiguo Wan, HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Trans. Infor. Foren. Sec. 2(2012).

Ming Li, Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, IEEE Trans. Par. Dist. Sys., (2012).

A.Aderemi, Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption, J. Emer. Trends Comp. Infor. Sci. 2 (2011) 10.

L. Xiong and L. Liu, Peer Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic communities ,IEEE Trans. Knowledge and Data Eng., (2004) 843-857.

K. Hang, S. Kulkarni, and Y. Hu, Cloud Security with Virtualized Defense and Reputation-Based Trust Management, IEEE Int’l Conf. Depen. Auto. Sec. Com. IEEECS Press, (2009).

S. Song, K. Hwang,R. Zhou, Y.-K. Kwok,Trusted P2P Transactions with Fuzzy Reputation Aggregation, IEEE Inter. Comp., 9 (2005) 24-34.

X.LouandK.Hwang, Collusive Piracy Prevention in P2P Content Delivery Networks, IEEE Trans. Computers, (2009) 970–983.

Alhamad M, SLA based trust model for cloud computing, (2010) 321-324.

Hui Ma, QoS-Driven Service Composition with Reconfigurable Services, IEEE Ser. Comp., 6 (2013) 20-34.

Qiang He, Jun Yan, A Decentralized Service Discovery Approach on Peer-to-Peer Networks, Services Computing, IEEE Transactions, 6(2013) 64-75.

A. Kannagi, K-Partitioned smallest distance Mining Tree for path Optimization in Wireless Sensor Network, J. Wir. Per. Comm. (2018).

A. Kannagi, Smart curiosity sink node prediction mining algorithm for path optimization in wireless sensor network, Inter. J. Eng. Tech., 7 (2018) 180-184.

Y. Jarma, Dynamic Service Contract Enforcement in Service-Oriented Networks, IEEE Trans. Ser. Comp. 6 (2013) 130-142.

N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Ràfols, Attribute-based encryption schemes with constant-size ciphertexts, Theor. Comput. Sci., 422(2012)15–38.

S. Hohenberger and B. Waters, Attribute-based encryption with fast decryption, in Proc. Public Key Cryptography, (2013) 162–179.

S. Chatterjee and A. Menezes, On cryptographic protocols employing asymmetric pairings-The role of revisited, Discrete Appl .Math., 159 (2011) 1311–1322.

T. Okamoto and K. Takashima, Fully secure unbounded inner-product and attribute-based encryption, In Proc. ASIACRYPT, (2012) 349–366.

A. B. Lewko and B. Waters, Decentralizing attribute-based encryption, In Proc. EUROCRYPT, (2011) 568–588.

S. Goldwasser, Y. T. Kalai, R. A. Popa, V. Vaikuntanathan, and N. Zeldovich, Succinct functional encryption and applications: Reusable garbled circuits and beyond, IACR Cryptology ePrint Archive, (2012) 733.

A. Kannagi, M. Muthuraja, Data security Description of enhanced data mining analysis using Symmetric Inference Model, Inter. J. Adv. Infor. Comm. Tech. 1 (2014) 461-465.