Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2143
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVijayanand, S.-
dc.contributor.authorViji, C.-
dc.contributor.authorVijayalakshmi, S.-
dc.contributor.authorVennila, G.-
dc.contributor.authorShankar, B. Prabhu-
dc.contributor.authorRajkumar, N.-
dc.date.accessioned2023-12-01T09:07:39Z-
dc.date.available2023-12-01T09:07:39Z-
dc.date.issued2023-08-31-
dc.identifier.issn2348-8549-
dc.identifier.urihttps://doi.org/10.14445/23488549/IJECE-V10I8P107-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2143-
dc.description.abstractCloud computing has regenerated how processing infrastructure is abstracted and used as a significant architecture for large-scale computation. In addition to the issues posed by Big Data storage, the rapid growth of cloud computing increases the complexity of data confidentiality, data security, and user access regulations, resulting in a loss of cloud service trustworthiness. The country and society rely heavily on its security. We introduce a new, improved NTRU cryptosystem that raises an alert whenever it detects quantum computing attacks to extract spatial and temporal features. A Spatio-temporal constrained Secure and Verifiable Attribute-Based Access Control Scheme (SSVAABAC) is proposed in this research. This method’s primary purpose is to successfully update and check access policies to improve authorization flexibility, resource usage, and business timeliness. On the one hand, INTRU cryptosystem and Attribute Based Access Control (ABAC) Schemes are combined to improve the efficiency of security strength in cloud servers and provide efficient access policies enforced access decisions without adding any permission. It is easier to modify attributes than to change or define new roles in cloud servers by data owners, resulting in less computational overhead than traditional methods. On the other hand, the developed SSVA-ACS will support temporal and spatial constrained attributes to enable the user’s accessibility of cypher text from CSs associated with the location and valid time interval. The effectiveness of decryption is successful if the Access policies and Spatio-temporal details of users satisfy data owners’ detail. Thus, the proposed scheme fits the user secret key for the users specified in the location and time interval. As a result, a concrete structure implements the suggested technique by implementing an encryption device that associates a user’s time-related privilege with the current access time. The final results show that the SVACS and ABAC are more effective than the SSVAACS.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Electronics and Communication Engineeringen_US
dc.subjectAdaptive NTRU Cryptosystemen_US
dc.subjectAttribute Based Access Controlen_US
dc.subjectBig Dataen_US
dc.subjectCloud Computingen_US
dc.subjectSpatio Temporal Analysisen_US
dc.subjectSVACS and ABACen_US
dc.titleA Concrete Construction Encryption Mechanism Based Spatio Temporal Analysis for Securing BigData Storage in Clouden_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
IJECE-V10I8P107.pdf
  Restricted Access
574.35 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.