{"title":"Implementation of Secure and Verifiable Access Control Procedures Using the NTRU Cryptosystem to Store Big Data in the Cloud Environment","authors":"Ravindra Babu. B, Swati Saxena, Gunawan Widjaja, Vedha Vinodha. D, Batyrkhan Omarov, Gurumurthy. B. Ramaiah, Prashant Vats","doi":"10.2174/0118722121246209231009055816","DOIUrl":null,"url":null,"abstract":"Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility. Results: In this paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour. Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.","PeriodicalId":40022,"journal":{"name":"Recent Patents on Engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Patents on Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/0118722121246209231009055816","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
Abstract
Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility. Results: In this paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour. Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.
期刊介绍:
Recent Patents on Engineering publishes review articles by experts on recent patents in the major fields of engineering. A selection of important and recent patents on engineering is also included in the journal. The journal is essential reading for all researchers involved in engineering sciences.