Enhanced Security for Large-Scale 6G Cloud Computing: A Novel Approach to Identity based Encryption Key Generation

Gopal Rathinam, B. M., Arulkumar V, Kumaresan M, A. S, Bhuvana J
{"title":"Enhanced Security for Large-Scale 6G Cloud Computing: A Novel Approach to Identity based Encryption Key Generation","authors":"Gopal Rathinam, B. M., Arulkumar V, Kumaresan M, A. S, Bhuvana J","doi":"10.53759/7669/jmc202303009","DOIUrl":null,"url":null,"abstract":"Cloud computing and 6G networks are in high demand at present due to their appealing features as well as the security of data stored in the cloud. There are various challenging methods that are computationally complicated that can be used in cloud security. Identity-based encryption (IBE) is the most widely used techniques for protecting data transmitted over the cloud. To prevent a malicious attack, it is an access policy that restricts access to legible data to only authorized users. The four stages of IBE are setup, key extraction or generation, decryption and encryption. Key generation is a necessary and time-consuming phase in the creation of a security key. The creation of uncrackable and non-derivable secure keys is a difficult computational and decisional task. In order to prevent user identities from being leaked, even if an opponent or attacker manages to encrypted material or to decode the key this study presents an advanced identity-based encryption technique with an equality test. The results of the experiments demonstrate that the proposed algorithm encrypts and decrypts data faster than the efficient selective-ID secure IBE strategy, a competitive approach. The proposed method's ability to conceal the identity of the user by utilizing the Lagrange coefficient, which is constituted of a polynomial interpolation function, is one of its most significant aspects.","PeriodicalId":91709,"journal":{"name":"International journal of machine learning and computing","volume":"25 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of machine learning and computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53759/7669/jmc202303009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Cloud computing and 6G networks are in high demand at present due to their appealing features as well as the security of data stored in the cloud. There are various challenging methods that are computationally complicated that can be used in cloud security. Identity-based encryption (IBE) is the most widely used techniques for protecting data transmitted over the cloud. To prevent a malicious attack, it is an access policy that restricts access to legible data to only authorized users. The four stages of IBE are setup, key extraction or generation, decryption and encryption. Key generation is a necessary and time-consuming phase in the creation of a security key. The creation of uncrackable and non-derivable secure keys is a difficult computational and decisional task. In order to prevent user identities from being leaked, even if an opponent or attacker manages to encrypted material or to decode the key this study presents an advanced identity-based encryption technique with an equality test. The results of the experiments demonstrate that the proposed algorithm encrypts and decrypts data faster than the efficient selective-ID secure IBE strategy, a competitive approach. The proposed method's ability to conceal the identity of the user by utilizing the Lagrange coefficient, which is constituted of a polynomial interpolation function, is one of its most significant aspects.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
大规模6G云计算增强安全性:一种基于身份的加密密钥生成新方法
云计算和6G网络由于其吸引人的特性以及存储在云中的数据的安全性,目前需求量很大。有各种具有挑战性的方法,这些方法在计算上很复杂,可以用于云安全。基于身份的加密(IBE)是用于保护通过云传输的数据的最广泛使用的技术。为了防止恶意攻击,它是一种访问策略,限制只有授权用户才能访问可读数据。IBE的四个阶段是设置、密钥提取或生成、解密和加密。密钥生成是创建安全密钥的必要且耗时的阶段。创建不可破解和不可衍生的安全密钥是一项困难的计算和决策任务。为了防止用户身份被泄露,即使对手或攻击者设法加密材料或解码密钥,本研究提出了一种先进的基于身份的加密技术,并进行了相等性测试。实验结果表明,该算法的数据加密和解密速度比高效的选择性id安全IBE策略更快。该方法利用多项式插值函数构成的拉格朗日系数隐藏用户身份的能力是其最重要的方面之一。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Discussion of Key Aspects and Trends in Self Driving Vehicle Technology An Efficient Voice Authentication System using Enhanced Inceptionv3 Algorithm Hybrid Machine Learning Technique to Detect Active Botnet Attacks for Network Security and Privacy Engineering, Structural Materials and Biomaterials: A Review of Sustainable Engineering Using Advanced Biomaterials Comparative Analysis of Transaction Speed and Throughput in Blockchain and Hashgraph: A Performance Study for Distributed Ledger Technologies
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1