Implementation of Secure and Verifiable Access Control Procedures Using the NTRU Cryptosystem to Store Big Data in the Cloud Environment

Ravindra Babu. B, Swati Saxena, Gunawan Widjaja, Vedha Vinodha. D, Batyrkhan Omarov, Gurumurthy. B. Ramaiah, Prashant Vats
{"title":"Implementation of Secure and Verifiable Access Control Procedures Using the NTRU Cryptosystem to Store Big Data in the Cloud Environment","authors":"Ravindra Babu. B, Swati Saxena, Gunawan Widjaja, Vedha Vinodha. D, Batyrkhan Omarov, Gurumurthy. B. Ramaiah, Prashant Vats","doi":"10.2174/0118722121246209231009055816","DOIUrl":null,"url":null,"abstract":"Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility. Results: In this paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour. Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.","PeriodicalId":40022,"journal":{"name":"Recent Patents on Engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Patents on Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/0118722121246209231009055816","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility. Results: In this paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour. Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用NTRU密码系统实现安全可验证的访问控制程序,在云环境中存储大数据
背景:由于密文的复杂性和规模,为云部署密文被认为是访问大型数据存储最有用的方法。方法:然而,根据数据所有者指定的改进的访问策略(AP)访问用户的访问合法性和改进云上的解密文本是在云中实现大数据存储的现实和有效的关键挑战。传统的方法要么完全消除了AP开发的问题,要么为仲裁者的权力提供更新,但在实时情况下,增强AP对于最大化安全性和处理敏捷性至关重要。结果:本文提出了一种以NTRU密码系统为特征的安全、可验证的云存储数据访问控制方案。首先,建立了一种改进的NTRU解密协议,以解决质数NTRU解密失败的问题,并对该方案的安全强度和计算性能进行了分析。当数据所有者指定新的AP时,云服务器允许程序改进密文,并允许所有者验证升级以防止云的欺诈行为。结论:它能够(i)检查用户访问数据所有者和合格用户的合法性,以及(ii)允许用户验证其他用户提供的数据,以恢复正确的用户。强大的分析可以预防和阻止各种攻击,即可能针对欺诈用户的合谋攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Recent Patents on Engineering
Recent Patents on Engineering Engineering-Engineering (all)
CiteScore
1.40
自引率
0.00%
发文量
100
期刊介绍: Recent Patents on Engineering publishes review articles by experts on recent patents in the major fields of engineering. A selection of important and recent patents on engineering is also included in the journal. The journal is essential reading for all researchers involved in engineering sciences.
期刊最新文献
Current Status of Research on Fill Mining Systems Overview of Patents on Diamond Polishing Apparatus Evaluation of Land Subsidence Susceptibility in Kunming Basin Based on Remote Sensing Interpretation and Convolutional Neural Network Development and Prospects of Lander Vibration-Damping Structures Recent Patents on Closed Coal Storage Systems and Research of Similar Experimental
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1