Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Implementation of Secure and Verifiable Access Control Procedures using the NTRU Cryptosystem to Store Big Data in the Cloud Environment

Author(s): Ravindra Babu B.*, Swati Saxena, Gunawan Widjaja, Vedha Vinodha D., Batyrkhan Omarov, Gurumurthy B. Ramaiah and Prashant Vats

Volume 19, Issue 2, 2025

Published on: 20 October, 2023

Article ID: e201023222439 Pages: 14

DOI: 10.2174/0118722121246209231009055816

Price: $65

conference banner
Abstract

Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores.

Method: However, access to a user's access legitimacy and improving a decrypted text on the cloud depending on an improved access policy (AP) specified by the data owner are the key challenges for making large data storage realistic and effective in clouds. The traditional ways either totally remove the problem of AP development or offer renewal to arbiter power, but in real-time, enhancing the AP is essential to maximising security and handling agility.

Results: In this patent paper, a safe and verifiable access control program characterised by the NTRU cryptographic system for large storage of data in the clouds is proposed. Primarily, an improved NTRU decryption protocol to deal with the decryption failures of the prime NTRU is established, and in addition, the program is analysed for its security strength and computational performance. When a new AP is specified by the data owner, the cloud server allows the program to improve ciphertext and allows the owner to verify the upgrade to oppose the cloud's fraudulent behaviour.

Conclusion: It enables (i) checking the user's legitimacy to access the data owner and qualified users, and (ii) allowing the user to verify the data provided by other users for the recovery of the right user. Strong analysis can prevent and block delinquency from various attacks, namely the collusion attack that could potentially target fraud users.

Keywords: Big data storage, NTRU cryptosystem, secret sharing, access policy update, cloud computing, access control.


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy