Skip to content
2000
Volume 19, Issue 2
  • ISSN: 1872-2121
  • E-ISSN: 2212-4047

Abstract

Background

Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores.

Methods

However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility.

Results

In this patent paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour.

Conclusion

It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.

Loading

Article metrics loading...

/content/journals/eng/10.2174/0118722121246209231009055816
2025-02-01
2024-11-22
Loading full text...

Full text loading...

References

  1. YangH. YiZ. LiR. Improved outsourced provable data possession for secure cloud storage.Security and Communication Networks202120211210.1155/2021/1805615
    [Google Scholar]
  2. CaiH. XuB. JiangL. VasilakosA.V. IoT-based big data storage systems in cloud computing: Perspectives and challenges.IEEE Internet Things J.201741758710.1109/JIOT.2016.2619369
    [Google Scholar]
  3. MaH. WangZ. GuanZ. Efficient ciphertext-policy attribute-based online/offline encryption with user revocation.Secur. Commun. Netw.2019201911110.1155/2019/8093578
    [Google Scholar]
  4. ChenH. ChangC.C. A Novel ( t, n ) secret sharing scheme based upon euler’s theorem.Secur. Commun. Netw.201920191710.1155/2019/2387358
    [Google Scholar]
  5. MahtoD. YadavD.K. RSA and ECC: A comparative analysis.Int. J. Appl. Eng. Res.2017121990539061
    [Google Scholar]
  6. HoffsteinJ. PipherJ. SilvermanJ.H. NTRU: A ring-based public key cryptosystem.International Algorithmic Number Theory Symposium1996
    [Google Scholar]
  7. KimW.B. SeoD. KimD. LeeI-Y. Group delegated id-based proxy reencryption for the enterprise IoT-Cloud storage environment.Wireless Communications and Mobile Computing202120211210.1155/2021/7641389
    [Google Scholar]
  8. HungN.T. GiangD.H. KeongN.W. ZhuH. Cloud-enabled data sharing model.Intelligence and Security Informatics (ISI)11-14 June 2012, Washington, DC, USA, pp. 1-6,
    [Google Scholar]
  9. IslamM.R. HabibaM. Agent based framework for providing security to data storage in cloud.Computer and Information Technology (ICCIT) 22-24 December 2012, Chittagong, Bangladesh, pp. 446-451,10.1109/ICCITechn.2012.6509712
    [Google Scholar]
  10. KumarB.G.L. HoonJ.L. KumariA. Secure storage and access of data in cloud computing. In ICT Convergence (ICTC), 2012.International Conference on15-17 October 2012, Jeju, Korea (South), pp. 336-339.
    [Google Scholar]
  11. GuptaS. SatapathyS.R. MehtaP. TripathyA. A secure and searchable data storage in cloud computing.Advance Computing Conference 22-23 February 2013Ghaziabad, India, 106109.10.1109/IAdCC.2013.6514203
    [Google Scholar]
  12. ZhangX. DuH. JianquanC. YiLin. LeijieZeng. Ensure data security in cloud storage. In network computing and information security.International Conference on2011284287
    [Google Scholar]
  13. KumbhareY.S PrasannaV. Cryptonite: A secure and performant data repository on public clouds.Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on2012 24-29 June 2012, Honolulu, HI, USA, 510517.
    [Google Scholar]
  14. PopaR.A. LorchJ.R. David Molnar, Helen J. Wang, and LiZhuang. Enabling security in cloud storage SLAs with cloud proof.Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIXATC’11 BerkeleyCA, USA, USENIX Association, year. 2011, 3131.
    [Google Scholar]
  15. QiS. LuY. WeiW. ChenX. Efficient data access control with fine-grained data protection in cloud-assisted IIoT.IEEE Internet Things J.2021842886289910.1109/JIOT.2020.3020979
    [Google Scholar]
  16. WanZ. Jun’eL. R.-H.D.H A hierarchical attribute-based solution for flexible and scalable access control in cloud computing.Information Forensics and Security IEEE TransactionsTsinghua UniversitySingapore Management University20121384
    [Google Scholar]
  17. YangK. JiaX. Attributed-based access control for multi-authority systems in cloud storage.Distributed Computing Systems (ICDCS) 18-21 June 2012Macau, China, 536545.10.1109/ICDCS.2012.42
    [Google Scholar]
  18. ZhuT. LiuW. SongJ. An efficient role based access control system for cloud computing.Computer and Information Technology (CIT)year. 2011, pp. 97-102.
    [Google Scholar]
  19. SangroyaA. KumarS. DhokJ. VarmaV. Towards analyzing data security risks in cloud computing environments.Information systems, technology and management of communications in computer and information science SushilK.P. HarrickM.V. SartajS. MahadeoPJ. Bunditand T. SpringerBerlin Heidelberg20105425526510.1007/978‑3‑642‑12035‑0_25
    [Google Scholar]
  20. BergerS. CaceresR. GoldmanK. PendarakisD. PerezR. RaoJ.R. RomE. SailerR. SchildhauerW. SrinivasanD. TalS. ValdezE. Security for the cloud infrastructure: Trusted virtual data center implementation.IBM J. Res. Develop.20095346:16:1210.1147/JRD.2009.5429060
    [Google Scholar]
  21. API access control in cloud using the role based access control model. Trendz in Information Sciences Computing.TISC2010135137
    [Google Scholar]
  22. HemaA.J.N. GunesM.H. Ensuring access control in cloud provisioned health care systemsIEEE Consumer Communications and Networking ConferenceJan. 2023, pp. 8-11
    [Google Scholar]
  23. LiJ. WangH. ZhangY. ShenJ. Ciphertext-policy attribute-based encryption with hidden access policy and testing.Trans. Internet Inf. Syst.20161033393352
    [Google Scholar]
  24. JoshiM. JoshiK. FininT. Attribute Based Encryption for Secure Access to Cloud Based EHR SystemsProceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) San FranciscoCA, USAyear. 2018932935.10.1109/CLOUD.2018.00139
    [Google Scholar]
  25. WalidR. JoshiK.P. Geol ChoiS. KimD-y. Cloud-based encrypted ehr system with semantically rich access control and searchable encryptionProceedings of the 2020 IEEE International Conference On Big Data (Big Data) AtlantaGA, USAyear. 202040754082.10.1109/BigData50022.2020.9378002
    [Google Scholar]
  26. ChenY. DongS. LiT. WangY. ZhouH. Dynamic multi-key FHE in asymmetric key setting from LWE.IEEE Trans. Inf. Forensics Security2021165239524910.1109/TIFS.2021.3127023
    [Google Scholar]
  27. LiS. ZhangQ. WuX. HanW. TianZ. Attribution classification method of APT malware in IoT using machine learning techniques.Security and Communication Networks202120211210.1155/2021/9396141
    [Google Scholar]
  28. BlakleyG. Safeguarding cryptographic keysProc. of the National Computer Conference1979year. 1979, vol. 48, pp. 313-317.
    [Google Scholar]
  29. EslamiZ. Zarepour AhmadabadiJ. A verifiable multi-secret sharing scheme based on cellular automata.Inf. Sci.2010180152889289410.1016/j.ins.2010.04.015
    [Google Scholar]
  30. ChenY. SunJ. YangY. LiT. NiuX. ZhouH. PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNsInter. J. Intelligent Sys.202137
    [Google Scholar]
/content/journals/eng/10.2174/0118722121246209231009055816
Loading
/content/journals/eng/10.2174/0118722121246209231009055816
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test