Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Implementation of Secure and Verifiable Access Control Procedures Using the NTRU Cryptosystem to Store Big Data in the Cloud Environment

In Press, (this is not the final "Version of Record"). Available online 20 October, 2023
Author(s): Ravindra Babu B.*, Swati Saxena, Gunawan Widjaja, Vedha Vinodha D., Batyrkhan Omarov, Gurumurthy B. Ramaiah and Prashant Vats
Published on: 20 October, 2023

Article ID: e201023222439

DOI: 10.2174/0118722121246209231009055816

Price: $95

Abstract

Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores.

Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility.

Results: In this paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour.

Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.

[1]
H. Yang, Z. Yi, and R. Li, "Improved outsourced provable data possession for secure cloud storage", Security and Communication Networks, vol. 2021, p. 12, 2021.
[http://dx.doi.org/10.1155/2021/1805615]
[2]
H. Cai, B. Xu, L. Jiang, and A.V. Vasilakos, "IoT-based big data storage systems in cloud computing: Perspectives and challenges", IEEE Internet Things J., vol. 4, no. 1, pp. 75-87, 2017.
[http://dx.doi.org/10.1109/JIOT.2016.2619369]
[3]
H. Ma, Z. Wang, and Z. Guan, "Efficient ciphertext-policy attribute-based online/offline encryption with user revocation", Secur. Commun. Netw., vol. 2019, pp. 1-11, 2019.
[http://dx.doi.org/10.1155/2019/8093578]
[4]
H. Chen, and C.C. Chang, "A Novel ( t, n ) secret sharing scheme based upon euler’s theorem", Secur. Commun. Netw., vol. 2019, pp. 1-7, 2019.
[http://dx.doi.org/10.1155/2019/2387358]
[5]
D. Mahto, and D.K. Yadav, "RSA and ECC: A comparative analysis", Int. J. Appl. Eng. Res., vol. 12, no. 19, pp. 9053-9061, 2017.
[6]
J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A ring-based public key cryptosystem", International Algorithmic Number Theory Symposium, 1996.
[7]
W.B. Kim, D. Seo, D. Kim, and I-Y. Lee, "Group delegated id-based proxy reencryption for the enterprise IoT-Cloud storage environment", Wireless Communications and Mobile Computing, vol. 2021, p. 12, 2021.
[http://dx.doi.org/10.1155/2021/7641389]
[8]
N.T. Hung, D.H. Giang, N.W. Keong, and H. Zhu, "Cloud-enabled data sharing model", In Intelligence and Security Informatics (ISI) 11-14 June 2012, Washington, DC, USA, pp. 1-6,
[9]
M.R. Islam, and M. Habiba, "Agent based framework for providing security to data storage in cloud", In Computer and Information Technology (ICCIT) 22-24 December 2012, Chittagong, Bangladesh, pp. 446-451,
[http://dx.doi.org/10.1109/ICCITechn.2012.6509712]
[10]
B.G.L. Kumar, J.L. Hoon, and A. Kumari, "Secure storage and access of data in cloud computing. In ICT Convergence (ICTC), 2012", In International Conference on 15-17 October 2012, Jeju, Korea (South), pp. 336-339.
[11]
S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy, "A secure and searchable data storage in cloud computing", In Advance Computing Conference 22-23 February 2013, Ghaziabad, India, pp. 106-109.
[http://dx.doi.org/10.1109/IAdCC.2013.6514203]
[12]
X. Zhang, H. Du, C. Jianquan, Lin. Yi, and Zeng. Leijie, "Ensure data security in cloud storage. In network computing and information security", International Conference on, pp. 284-287, 2011.
[13]
Y.S Kumbhare, and V. Prasanna, "Cryptonite: A secure and performant data repository on public clouds", In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 2012 24-29 June 2012, Honolulu, HI, USA, pp. 510-517.
[14]
R.A. Popa, and J.R. Lorch, "David Molnar, Helen J. Wang, and LiZhuang. Enabling security in cloud storage SLAs with cloud proof", In Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIXATC’11 Berkeley, CA, USA, USENIX Association, year. 2011, pp. 31-31.
[15]
S. Qi, Y. Lu, W. Wei, and X. Chen, "Efficient data access control with fine-grained data protection in cloud-assisted IIoT", IEEE Internet Things J., vol. 8, no. 4, pp. 2886-2899, 2021.
[http://dx.doi.org/10.1109/JIOT.2020.3020979]
[16]
Z. Wan, L. Jun’e, and D.H R.-H., "A hierarchical attribute-based solution for flexible and scalable access control in cloud computing", In: Information Forensics and Security IEEE Transactions, Tsinghua University: Singapore Management University, 2012, p. 1384.
[17]
K. Yang, and X. Jia, "Attributed-based access control for multi-authority systems in cloud storage", In Distributed Computing Systems (ICDCS) 18-21 June 2012, Macau, China, pp. 536-545.
[http://dx.doi.org/10.1109/ICDCS.2012.42]
[18]
T. Zhu, W. Liu, and J. Song, "An efficient role based access control system for cloud computing", In Computer and Information Technology (CIT) year. 2011, pp. 97-102.
[19]
A. Sangroya, S. Kumar, J. Dhok, and V. Varma, "Towards analyzing data security risks in cloud computing environments", In: K.P. Sushil, M.V. Harrick, S. Sartaj, J. MahadeoP, and T. Bundit, Eds., Information systems, technology and management of communications in computer and information science, vol. 54. Springer: Berlin Heidelberg, 2010, pp. 255-265.
[http://dx.doi.org/10.1007/978-3-642-12035-0_25]
[20]
S. Berger, R. Caceres, K. Goldman, D. Pendarakis, R. Perez, J.R. Rao, E. Rom, R. Sailer, W. Schildhauer, D. Srinivasan, S. Tal, and E. Valdez, "Security for the cloud infrastructure: Trusted virtual data center implementation", IBM J. Res. Develop., vol. 53, no. 4, pp. 6:1-6:12, 2009.
[http://dx.doi.org/10.1147/JRD.2009.5429060]
[21]
API access control in cloud using the role based access control model. Trendz in Information Sciences Computing., TISC, 2010, pp. 135-137.
[22]
A.J.N. Hema, and M.H. Gunes, "Ensuring access control in cloud provisioned health care systems", In IEEE Consumer Communications and Networking Conference Jan. 2023, pp. 8-11
[23]
J. Li, H. Wang, Y. Zhang, and J. Shen, "Ciphertext-policy attribute-based encryption with hidden access policy and testing", Trans. Internet Inf. Syst., vol. 10, pp. 3339-3352, 2016.
[24]
M. Joshi, K. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", In Proceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) San Francisco, CA, USA, year. 2018, pp. 932-935.
[http://dx.doi.org/10.1109/CLOUD.2018.00139]
[25]
R. Walid, K.P. Joshi, S. Geol Choi, and D-y. Kim, "Cloud-based encrypted ehr system with semantically rich access control and searchable encryption", In Proceedings of the 2020 IEEE International Conference On Big Data (Big Data) Atlanta, GA, USA, year. 2020, pp. 4075-4082.
[http://dx.doi.org/10.1109/BigData50022.2020.9378002]
[26]
Y. Chen, S. Dong, T. Li, Y. Wang, and H. Zhou, "Dynamic multi-key FHE in asymmetric key setting from LWE", IEEE Trans. Inf. Forensics Security, vol. 16, pp. 5239-5249, 2021.
[http://dx.doi.org/10.1109/TIFS.2021.3127023]
[27]
S. Li, Q. Zhang, X. Wu, W. Han, and Z. Tian, "Attribution classification method of APT malware in IoT using machine learning techniques", Security and Communication Networks, vol. 2021, p. 12, 2021.
[http://dx.doi.org/10.1155/2021/9396141]
[28]
G. Blakley, "Safeguarding cryptographic keys", In Proc. of the National Computer Conference1979 year. 1979, vol. 48, pp. 313-317.
[29]
Z. Eslami, and J. Zarepour Ahmadabadi, "A verifiable multi-secret sharing scheme based on cellular automata", Inf. Sci., vol. 180, no. 15, pp. 2889-2894, 2010.
[http://dx.doi.org/10.1016/j.ins.2010.04.015]
[30]
Y. Chen, J. Sun, Y. Yang, T. Li, X. Niu, and H. Zhou, "PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs", Inter. J. Intelligent Sys., vol. 37, 2021.

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy