A P-NTRU and secret key sharing techniques of access control scheme for big data storage in cloud

  • Authors

    • S V. Divya
    • Bala Monika
    • Venkadesh .
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.15505
  • Access Policy, Certificate Authority, Legitimacy, NTRU.
  • Outsourcing the ciphertexts in the cloud storage server becomes an effective way for storing the big data. However, verifying the access policy of the user and updating it regularly in the cloud server makes it really challenging. Various approaches have been proposed but they do not offer a complete solution. Hence, an efficient and secure proposed NTRU (P-NTRU) is proposed. Moreover, the P-NTRU system efficiently updates the stored cipher-text in the server when the owner’s access policy is changed. The proposed P-NTRU system enables the owner to verify the legitimacy of the user. With the introduction of the certificate authority, the burden of the data owner is highly reduced. Analysis proves that the proposed P-NTRU system is efficient and secure.

     

     

  • References

    1. [1] M.A.Beyer and D.Laney, “The importance of bug data: a definitionâ€, Stanford, CT: Gartner, 2012.

      [2] A.Sahai and B.Waters, “Fuzzy identity based encryptionâ€, Advances in Cryptology-EUROCRYPT 2005, pp. 457-473, 2005.

      [3] V.Goyal, O.Pandey, A.Sahai and B.Waters, “Attribute-based encryption for fine-grained access control of encrypted data†, in Proceedings of the 13th ACM conference on Computer and Communications Security, ACM 2006,pp.89-98.

      [4] C.Hu,X.Cheng ,Z.Tian,J.Yu,K.Akkaya and L.Sun, “An attribute-based signcryption scheme to secure attribute-defined multicast communicationsâ€, in Secure Communications 2015,Springer ,pp.418-435,2015.

      [5] B.Waters, “Ciphertext –policy attribute based encryption: An expressive, efficient and provably secure realizationâ€, Public key cryptography-PKC 2011, pp.53-70, 2011.

      [6] M.H.Dehkordi and S.Mashhadi, “New efficient and practical verifiable multi-secret sharing schemesâ€, Information Sciences, Vol.178, no.9, pp.2262-2274, 2008.

      [7] J.Zhao,J.Zhang and R.Zhao, “A practical verifiable multi-secret sharing schemeâ€, Computer Standards & Interfaces,vol.29,no.1,pp.138-141,2007.

      [8] O.Regev, “New lattice-based cryptographic constructionsâ€, Journal of the ACM (JACM), vol.51, no.6, pp.899-942, 2004.

      [9] J.Hoffstein, J.Pipher , and J.Silverman, “ NTRU :A ring-based public key cryptosystemâ€, in Algorithmic number theory:third international symposium, ANTS-III, Portland,Oregon, USA,June 21-25,1998:Proceedings,vol.1423, Springer Verlag,1998,pp.267-288

      [10] N.Cryptosystems, “The NTRU public key cryptosystem- a tutorial “, 1998.

      [11] A.Lewko and B.Waters, “Decentralizing attribute-based encryptionâ€, Advances in Cryptology- EUROCRYPT 2011, pp. 568-588, 2011.

      [12] A. Shamir, “How to share a secretâ€, Communications of the ACM, vol.22, no.11, pp.612-613, 1979.

      [13] M.H.Dehkordi and S.Mashhadi, “New efficient and practical verifiable multi-secret sharing schemesâ€, Information Sciences, vol.178, no.9, pp.2262-2274, 2008.

      [14] Z.Eslami and J.Z.Ahmadabadi “A verifiable multi-secret sharing scheme based on cellular automataâ€, Information Sciences, vol.180, no.15, pp.2889-2894, 2010.

      [15] Chunqiang Hu, Wei Li, Xiuzhen Cheng,Jiguo Yu,Shengling Wang, Rongfang Bie, “ A Secure and Verifiable Access Control Scheme for Big Data Storage in Cloudsâ€, IEEE Transactions on Big Data,DOI:10.1109/TBDATA.2016.2621106.

      [16] S.V.Divya, R.S.Shaji, P.Venkadesh, “A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notificationâ€, Research Journal of Applied Sciences, Engineering and Technology, 7 (14), 2946-2953, 2014.

  • Downloads

  • How to Cite

    V. Divya, S., Monika, B., & ., V. (2018). A P-NTRU and secret key sharing techniques of access control scheme for big data storage in cloud. International Journal of Engineering & Technology, 7(2.33), 818-821. https://doi.org/10.14419/ijet.v7i2.33.15505