A Survey on Secure and Verifiable Access Control Scheme for Enormous Information Storage In Clouds

Authors

  • R S. Akshaya Subhasri
  • M Ranganayaki
  • K Ulaga Priya
  • K Kalaivani
  • A Sartiha

DOI:

https://doi.org/10.14419/ijet.v7i3.27.17986

Published:

2018-08-15

Keywords:

Enormous InfoStorage, uses control, the NTRU cryptosystem, access code renew, distributed figuring.

Abstract

A secure and verifiable access control scheme for enormous information storage in cloud is based on   open source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data .To overcome the decryption failures of the original LLL, the NTRU decryption algorithm is analysed. It allows to analyze it correctness, accuracy, security qualities and computational effectiveness. When a new entry permission is granted by the data users. It allows the cloud main system to update the cipher method details. It also able to update the counter against the hacking behavior on the cloud. It includes the data holder and eligible users who need to check the data user for accessing the data, the user check the content given by the next user for accurate plain text recovery. Through test shows, this scheme can prevent qualified user against hacking together with some other different raid  such as scam attacks.

 

 

References

[1] Arora P, Wadhawan RC & Ahuja ESP, “Cloud computing security issues in infrastructure as a serviceâ€, International journal of advanced research in computer science and software engineering, Vol.2, No.1, (2012).

[2] Yang K, Jia X & Ren K, “Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloudâ€, IEEE Transactions on Parallel and Distributed Systems, (2014).

[3] Goyal V, Pandey O, Sahai A & Waters B, “Attribute-based encryption for fine-grained access control of encrypted dataâ€, Proceedings of the 13th ACM conference on Computer and communications security, (2006), pp.89-98.

[4] Bethencourt J, Sahai A & Waters B, “Ciphertext-policy attribute-based encryptionâ€, IEEE Symposium on Security and Privacy, (2007), pp.321-334.

[5] Waters B, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realizationâ€, International Workshop on Public Key Cryptography, (2011), pp. 53–70.

[6] Beimel A, “Secure schemes for secret sharing and key distributionâ€, DSc dissertation, (1996).

[7] Metev SM & Veiko VP, Laser Assisted Micro technology, 2nd ed., Ed. Berlin, Germany: Springer-Verlag, (1998).

[8] Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, Opción, Año 33. 475-499

[9] G Mussabekova, S Chakanova, A Boranbayeva, A Utebayeva, K Kazybaeva, K Alshynbaev (2018). Structural conceptual model of forming readiness for innovative activity of future teachers in general education school. Opción, Año 33. 217-240

View Full Article: