Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2143
Title: A Concrete Construction Encryption Mechanism Based Spatio Temporal Analysis for Securing BigData Storage in Cloud
Authors: Vijayanand, S.
Viji, C.
Vijayalakshmi, S.
Vennila, G.
Shankar, B. Prabhu
Rajkumar, N.
Keywords: Adaptive NTRU Cryptosystem
Attribute Based Access Control
Big Data
Cloud Computing
Spatio Temporal Analysis
SVACS and ABAC
Issue Date: 31-Aug-2023
Publisher: International Journal of Electronics and Communication Engineering
Abstract: Cloud computing has regenerated how processing infrastructure is abstracted and used as a significant architecture for large-scale computation. In addition to the issues posed by Big Data storage, the rapid growth of cloud computing increases the complexity of data confidentiality, data security, and user access regulations, resulting in a loss of cloud service trustworthiness. The country and society rely heavily on its security. We introduce a new, improved NTRU cryptosystem that raises an alert whenever it detects quantum computing attacks to extract spatial and temporal features. A Spatio-temporal constrained Secure and Verifiable Attribute-Based Access Control Scheme (SSVAABAC) is proposed in this research. This method’s primary purpose is to successfully update and check access policies to improve authorization flexibility, resource usage, and business timeliness. On the one hand, INTRU cryptosystem and Attribute Based Access Control (ABAC) Schemes are combined to improve the efficiency of security strength in cloud servers and provide efficient access policies enforced access decisions without adding any permission. It is easier to modify attributes than to change or define new roles in cloud servers by data owners, resulting in less computational overhead than traditional methods. On the other hand, the developed SSVA-ACS will support temporal and spatial constrained attributes to enable the user’s accessibility of cypher text from CSs associated with the location and valid time interval. The effectiveness of decryption is successful if the Access policies and Spatio-temporal details of users satisfy data owners’ detail. Thus, the proposed scheme fits the user secret key for the users specified in the location and time interval. As a result, a concrete structure implements the suggested technique by implementing an encryption device that associates a user’s time-related privilege with the current access time. The final results show that the SVACS and ABAC are more effective than the SSVAACS.
URI: https://doi.org/10.14445/23488549/IJECE-V10I8P107
http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2143
ISSN: 2348-8549
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
IJECE-V10I8P107.pdf
  Restricted Access
574.35 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.