A Hybrid Secure Cloud Platform Maintenance Based on Improved Attribute-Based Encryption Strategies
Autor:
Kumar, Abhishek
; Kumar, Swarn Avinash
; Dutt, Vishal
; Dubey, A. K.
; Narang, Sushil
Fecha:
06/2023Palabra clave:
Revista / editorial:
International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)Tipo de Ítem:
articleDirección web:
https://www.ijimai.org/journal/bibcite/reference/3048
Resumen:
In the modern era, Cloud Platforms are the most needed port to maintain documents remotely with proper security norms. The concept of cloud environments is similar to the network channel. Still, the Cloud is considered the refined form of network, in which the data can easily be stored into the server without any range restrictions. The data maintained into the remote server needs a high-security feature, and the processing power of data should be high to retrieve the data back from the respective server. In the past, there were several security schemes available to protect the remote cloud server reasonably. However, the attack possibilities over the cloud platform remain; only all the researchers continuously work on this platform without any delay. This paper introduces a hybrid data security scheme called the Improved Attribute-Based Encryption Scheme (IABES). This IABES combines two powerful data security algorithms: Advanced Encryption Standard (AES) and Attribute-Based Encryption (ABE) algorithm. These two algorithms are combined to provide massive support to the proposed approach of data maintenance over the remote cloud server with high-end security norms. This hybrid data security algorithm assures the data cannot be attacked over the server by the attacker or intruder in any case because of its robustness. The essential generation process generates a credential for the users. It cannot be identified or visible to anyone as well as the generated certificates cannot be extracted even if the corresponding user forgets the credentials. The only way to get back the certification is resetting the credential. The obtained results prove the accuracy level of the proposed cypher security schemes compared with the regular cloud security management scheme, and the proposed algorithm essential generation process is unique. No one can guess or acquire it. Even the person may be the service provider or server administrator. For all, the proposed system assures data maintenance over the cloud platform with a high level of security and robustness in Quality of Service.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
| Año |
| 2012 |
| 2013 |
| 2014 |
| 2015 |
| 2016 |
| 2017 |
| 2018 |
| 2019 |
| 2020 |
| 2021 |
| 2022 |
| 2023 |
| 2024 |
| 2025 |
| 2026 |
| Vistas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 235 |
| 201 |
| 98 |
| 22 |
| Descargas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 58 |
| 122 |
| 128 |
| 52 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
An Adaptive Salp-Stochastic-Gradient-Descent-Based Convolutional LSTM With MapReduce Framework for the Prediction of Rainfall
Manoj, S. Oswalt; Kumar, Abhishek; Dubey, Ashutosh Kumar; Ananth, J. P. (UNIR, 01/09/2025)Rainfall prediction is considered to be an esteemed research area that impacts the day-to-day life of Indians. The predominant income source of most of the Indian population is agriculture. It helps the farmers to make the ... -
Business and Social Behaviour Intelligence Analysis Using PSO
Bhaskar, Vinay S; Kumar Singh, Abhishek; Dhruw, Jyoti; Parashar, Anubha; Sharma, Mradula (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2014)The goal of this paper is to elaborate swarm intelligence for business intelligence decision making and the business rules management improvement. The paper introduces the decision making model which is based on the ... -
A Holistic Methodology for Improved RFID Network Lifetime by Advanced Cluster Head Selection using Dragonfly Algorithm
Rathore, Pramod Singh; Kumar, Abhishek; García-Díaz, Vicente (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2020)Radio Frequency Identification (RFID) networks usually require many tags along with readers and computation facilities. Those networks have limitations with respect to computing power and energy consumption. Thus, for ...





