A P-NTRU and secret key sharing techniques of access control scheme for big data storage in cloud

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Outsourcing the ciphertexts in the cloud storage server becomes an effective way for storing the big data. However, verifying the access policy of the user and updating it regularly in the cloud server makes it really challenging. Various approaches have been proposed but they do not offer a complete solution. Hence, an efficient and secure proposed NTRU (P-NTRU) is proposed. Moreover, the P-NTRU system efficiently updates the stored cipher-text in the server when the owner’s access policy is changed. The proposed P-NTRU system enables the owner to verify the legitimacy of the user. With the introduction of the certificate authority, the burden of the data owner is highly reduced. Analysis proves that the proposed P-NTRU system is efficient and secure.

     

     


  • Keywords


    Access Policy; Certificate Authority; Legitimacy; NTRU.

  • References


      [1] M.A.Beyer and D.Laney, “The importance of bug data: a definition”, Stanford, CT: Gartner, 2012.

      [2] A.Sahai and B.Waters, “Fuzzy identity based encryption”, Advances in Cryptology-EUROCRYPT 2005, pp. 457-473, 2005.

      [3] V.Goyal, O.Pandey, A.Sahai and B.Waters, “Attribute-based encryption for fine-grained access control of encrypted data” , in Proceedings of the 13th ACM conference on Computer and Communications Security, ACM 2006,pp.89-98.

      [4] C.Hu,X.Cheng ,Z.Tian,J.Yu,K.Akkaya and L.Sun, “An attribute-based signcryption scheme to secure attribute-defined multicast communications”, in Secure Communications 2015,Springer ,pp.418-435,2015.

      [5] B.Waters, “Ciphertext –policy attribute based encryption: An expressive, efficient and provably secure realization”, Public key cryptography-PKC 2011, pp.53-70, 2011.

      [6] M.H.Dehkordi and S.Mashhadi, “New efficient and practical verifiable multi-secret sharing schemes”, Information Sciences, Vol.178, no.9, pp.2262-2274, 2008.

      [7] J.Zhao,J.Zhang and R.Zhao, “A practical verifiable multi-secret sharing scheme”, Computer Standards & Interfaces,vol.29,no.1,pp.138-141,2007.

      [8] O.Regev, “New lattice-based cryptographic constructions”, Journal of the ACM (JACM), vol.51, no.6, pp.899-942, 2004.

      [9] J.Hoffstein, J.Pipher , and J.Silverman, “ NTRU :A ring-based public key cryptosystem”, in Algorithmic number theory:third international symposium, ANTS-III, Portland,Oregon, USA,June 21-25,1998:Proceedings,vol.1423, Springer Verlag,1998,pp.267-288

      [10] N.Cryptosystems, “The NTRU public key cryptosystem- a tutorial “, 1998.

      [11] A.Lewko and B.Waters, “Decentralizing attribute-based encryption”, Advances in Cryptology- EUROCRYPT 2011, pp. 568-588, 2011.

      [12] A. Shamir, “How to share a secret”, Communications of the ACM, vol.22, no.11, pp.612-613, 1979.

      [13] M.H.Dehkordi and S.Mashhadi, “New efficient and practical verifiable multi-secret sharing schemes”, Information Sciences, vol.178, no.9, pp.2262-2274, 2008.

      [14] Z.Eslami and J.Z.Ahmadabadi “A verifiable multi-secret sharing scheme based on cellular automata”, Information Sciences, vol.180, no.15, pp.2889-2894, 2010.

      [15] Chunqiang Hu, Wei Li, Xiuzhen Cheng,Jiguo Yu,Shengling Wang, Rongfang Bie, “ A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds”, IEEE Transactions on Big Data,DOI:10.1109/TBDATA.2016.2621106.

      [16] S.V.Divya, R.S.Shaji, P.Venkadesh, “A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification”, Research Journal of Applied Sciences, Engineering and Technology, 7 (14), 2946-2953, 2014.


 

View

Download

Article ID: 15505
 
DOI: 10.14419/ijet.v7i2.33.15505




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.