Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Implementation of Secure and Verifiable Access Control Procedures Using the NTRU Cryptosystem to Store Big Data in the Cloud Environment

In Press, (this is not the final "Version of Record"). Available online 20 October, 2023
Author(s): Ravindra Babu. B*, Swati Saxena, Gunawan Widjaja, Vedha Vinodha. D, Batyrkhan Omarov, Gurumurthy. B. Ramaiah and Prashant Vats
Published on: 20 October, 2023

Article ID: e201023222439

DOI: 10.2174/0118722121246209231009055816

Price: $95

conference banner
Abstract

Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores.

Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility.

Results: In this paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour.

Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy