Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2143
Title: | A Concrete Construction Encryption Mechanism Based Spatio Temporal Analysis for Securing BigData Storage in Cloud |
Authors: | Vijayanand, S. Viji, C. Vijayalakshmi, S. Vennila, G. Shankar, B. Prabhu Rajkumar, N. |
Keywords: | Adaptive NTRU Cryptosystem Attribute Based Access Control Big Data Cloud Computing Spatio Temporal Analysis SVACS and ABAC |
Issue Date: | 31-Aug-2023 |
Publisher: | International Journal of Electronics and Communication Engineering |
Abstract: | Cloud computing has regenerated how processing infrastructure is abstracted and used as a significant architecture for large-scale computation. In addition to the issues posed by Big Data storage, the rapid growth of cloud computing increases the complexity of data confidentiality, data security, and user access regulations, resulting in a loss of cloud service trustworthiness. The country and society rely heavily on its security. We introduce a new, improved NTRU cryptosystem that raises an alert whenever it detects quantum computing attacks to extract spatial and temporal features. A Spatio-temporal constrained Secure and Verifiable Attribute-Based Access Control Scheme (SSVAABAC) is proposed in this research. This method’s primary purpose is to successfully update and check access policies to improve authorization flexibility, resource usage, and business timeliness. On the one hand, INTRU cryptosystem and Attribute Based Access Control (ABAC) Schemes are combined to improve the efficiency of security strength in cloud servers and provide efficient access policies enforced access decisions without adding any permission. It is easier to modify attributes than to change or define new roles in cloud servers by data owners, resulting in less computational overhead than traditional methods. On the other hand, the developed SSVA-ACS will support temporal and spatial constrained attributes to enable the user’s accessibility of cypher text from CSs associated with the location and valid time interval. The effectiveness of decryption is successful if the Access policies and Spatio-temporal details of users satisfy data owners’ detail. Thus, the proposed scheme fits the user secret key for the users specified in the location and time interval. As a result, a concrete structure implements the suggested technique by implementing an encryption device that associates a user’s time-related privilege with the current access time. The final results show that the SVACS and ABAC are more effective than the SSVAACS. |
URI: | https://doi.org/10.14445/23488549/IJECE-V10I8P107 http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2143 |
ISSN: | 2348-8549 |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IJECE-V10I8P107.pdf Restricted Access | 574.35 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.