A Concrete Construction Encryption Mechanism Based Spatio Temporal Analysis for Securing BigData Storage in Cloud

International Journal of Electronics and Communication Engineering
© 2023 by SSRG - IJECE Journal
Volume 10 Issue 8
Year of Publication : 2023
Authors : S. Vijayanand, C. Viji, S. Vijayalakshmi, G. Vennila, B. Prabhu Shankar, N. Rajkumar
pdf
How to Cite?

S. Vijayanand, C. Viji, S. Vijayalakshmi, G. Vennila, B. Prabhu Shankar, N. Rajkumar, "A Concrete Construction Encryption Mechanism Based Spatio Temporal Analysis for Securing BigData Storage in Cloud," SSRG International Journal of Electronics and Communication Engineering, vol. 10,  no. 8, pp. 68-77, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I8P107

Abstract:

Cloud computing has regenerated how processing infrastructure is abstracted and used as a significant architecture for large-scale computation. In addition to the issues posed by Big Data storage, the rapid growth of cloud computing increases the complexity of data confidentiality, data security, and user access regulations, resulting in a loss of cloud service trustworthiness. The country and society rely heavily on its security. We introduce a new, improved NTRU cryptosystem that raises an alert whenever it detects quantum computing attacks to extract spatial and temporal features. A Spatio-temporal constrained Secure and Verifiable Attribute-Based Access Control Scheme (SSVAABAC) is proposed in this research. This method’s primary purpose is to successfully update and check access policies to improve authorization flexibility, resource usage, and business timeliness. On the one hand, INTRU cryptosystem and Attribute Based Access Control (ABAC) Schemes are combined to improve the efficiency of security strength in cloud servers and provide efficient access policies enforced access decisions without adding any permission. It is easier to modify attributes than to change or define new roles in cloud servers by data owners, resulting in less computational overhead than traditional methods. On the other hand, the developed SSVA-ACS will support temporal and spatial constrained attributes to enable the user’s accessibility of cypher text from CSs associated with the location and valid time interval. The effectiveness of decryption is successful if the Access policies and Spatio-temporal details of users satisfy data owners’ detail. Thus, the proposed scheme fits the user secret key for the users specified in the location and time interval. As a result, a concrete structure implements the suggested technique by implementing an encryption device that associates a user’s time-related privilege with the current access time. The final results show that the SVACS and ABAC are more effective than the SSVAACS.

Keywords:

Adaptive NTRU cryptosystem, Attribute based access control, Big data, Cloud computing, Spatio temporal analysis, SVACS and ABAC.

References:

[1] Zhifeng Xiao, and Yang Xiao, “Security and Privacy in Cloud Computing,” IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843-859, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Rajkumar Kannan et al., Managing and Processing Big Data in Cloud Computing, IGI Global, 2016.
[CrossRef] [Google Scholar] [Publisher Link]v
[3] Huaglory Tianfield, “Security Issues in Cloud Computing,” 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, Korea (South), pp. 1082-1089, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Yunchuan Sun et al., “Data Security and Privacy in Cloud Computing,” International Journal of Distributed Sensor Networks, vol. 10, no. 7, pp. 1-9, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Sridhar Vemula, Ram Mohan Rao Kovvur, and Dyna Marneni, “CryptNoSQL – A Methodology for Secure Querying and Processing of Encrypted NoSQL Data on the Cloud Environment,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 5, pp. 14-27, 2023.
[CrossRef] [Publisher Link]
[6] Syed Asad Hussain et al., “Multilevel Classification of Security Concerns in Cloud Computing,” Applied Computing and Informatics, vol. 13, no. 1, pp. 57-65, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[7] K. Radha et al., “Service Level Agreements in Cloud Computing and Big Data,” International Journal of Electrical and Computer Engineering, vol. 5, no. 1, pp. 158-165, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Ashutosh Kumar, “Quality and Security in Big Data: Challenges as opportunity to Make a Powerful Conclude Clarification,” International Journal of P2P Network Trends and Technology, vol. 10, no. 3, pp. 10-17, 2020.
[Google Scholar] [Publisher Link]
[9] Abhishek Gupta et al., “Information Assurance via Big Data Security Analytics,” International Journal of Computer & Organization Trends (IJCOT), vol. 5, no. 2, pp. 85-91, 2015.
[Publisher Link]
[10] Rishav Chatterjee, and Sharmistha Roy, “Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud,” International Journal of Engineering Science and Computing, vol. 7, no. 5, pp. 11818-11821, 2017.
[Google Scholar] [Publisher Link]
[11] D. Shravani, “Review of Literature on Web Services Security Architecture Extended to Cloud, Big Data and IOT,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 6, no. 4, pp. 7-12, 2016.
[Publisher Link]
[12] D. Shravani, “Model Driven Architecture Based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT,” International Journal of Computer & Organization Trends (IJCOT), vol. 6, no. 4, pp. 55-64, 2016.
[Google Scholar] [Publisher Link]
[13] Chunqiang Hu et al., “A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds,” IEEE Transactions on Big Data, vol. 4, no. 3, pp. 341-355, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Adeline Langlois, Damien Stehlé, and Ron Steinfeld, “GGHLite: More Efficient Multilinear Maps from Ideal Lattices,” Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 239-256, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Sanjam Garg, Craig Gentry, and Shai Halevi, “Candidate Multilinear Maps from Ideal Lattices,” Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 1-17, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Kritika Soni, and Suresh Kumar, “Comparison of RBAC and ABAC Security Models for Private Cloud,” 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing(COMITCon), Faridabad, India, pp. 584-587, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Zechao Liu et al., “A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage,” 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, USA, pp. 614-623, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Zhiquan Lv et al., “Efficiently Attribute-Based Access Control for Mobile Cloud Storage System,” 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, pp. 292-299, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Joonsang Baek et al., “A Secure Cloud Computing-Based Framework for Extensive Data Information Management of the Smart Grid,” IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 233-244, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Kan Yang et al., “Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud,” IEEE INFOCOM 2014- IEEE Conference on Computer Communications, Toronto, Canada, pp. 2013-2021, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Gaoqiang Zhuo et al., “Privacy-Preserving Verifiable Data Aggregation and Analysis for Cloud-Assisted Mobile Crowdsourcing,” IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, pp. 1-9, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[22] M. H. Xing, and W. M. Li, “An Attribute-Based Access Control Scheme in the Cloud Storage Environment,” Software Engineering and Information Technology, pp. 129-134, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Rohit Ahuja, and Sraban Kumar Mohanty, “A Scalable Attribute-Based Access Control Scheme with Flexible Delegation Cum Sharing of Access Privileges for Cloud Storage,” IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 32-44, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] K. Rajalakshmi et al., “An Effective Approach for Improving Data Access Time using Intelligent Node Selection Model (INSM) in Cloud Computing Environment,” SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 5, pp. 174-184, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Banoth SeethaRamulu, H. Balaji, and Bashetty Suman, “Attribute Based Access Control Scheme in Cloud Storage System,” International Journal of Engineering & Technology, vol. 7, no. 4.6, pp. 33-35, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Heng He et al., “An Efficient Attribute-Based Hierarchical Data Access Control Scheme in Cloud Computing,” Human-Centric Computing and Information Sciences, vol. 10, no. 1, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Hanshu Hong, and Zhixin Sun, “A Flexible Attribute Based Data Access Management Scheme for Sensor-Cloud System,” Journal of Systems Architecture, vol. 119, p. 102234, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Mariem Bouchaala, Cherif Ghazel, and Leila Azzouz Saidane, “TRAK-CPABE: A Novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption Scheme in Cloud Computing,” Journal of Information Security and Applications, vol. 61, p. 102914, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[29] S. Veerapandi, R. Surendiran, and K. Alagarsamy, “Live Virtual Machine Pre-copy Migration Algorithm for Fault Isolation in Cloud Based Computing Systems,” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 23-31, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[30] S. Veerapandi, R. Surendiran, and K. Alagarsamy, “Enhanced Fault Tolerant Cloud Architecture to Cloud Based Computing using Both Proactive and Reactive Mechanisms,” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 32-40, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Qian Xu et al., “Decentralized and Expressive Data Publish-Subscribe Scheme in Cloud Based on Attribute-Based Keyword Search,” Journal of Systems Architecture, vol. 119, p. 102274, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Prabhu Shankar et al., “Energy-Efficient Data Offloading using Data Access Strategy-Based Data Grouping Scheme,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 5, pp. 28-37, 2023.
[CrossRef] [Publisher Link]