Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
by
K., Sowmya T.
, R., Mohan Naik
, Bharathrajkumar, M.
, M., Sharath S.
, Gadiyar, H. Manoj T.
in
Access control
/ Algorithms
/ Cloud computing
/ Completion time
/ Confidentiality
/ Constraints
/ Control systems
/ Cryptography
/ Data encryption
/ Data storage
/ Data transmission
/ Datasets
/ Encryption
/ Internet of Things
/ Number systems
/ Residue number systems
/ Social networks
/ Time measurement
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
by
K., Sowmya T.
, R., Mohan Naik
, Bharathrajkumar, M.
, M., Sharath S.
, Gadiyar, H. Manoj T.
in
Access control
/ Algorithms
/ Cloud computing
/ Completion time
/ Confidentiality
/ Constraints
/ Control systems
/ Cryptography
/ Data encryption
/ Data storage
/ Data transmission
/ Datasets
/ Encryption
/ Internet of Things
/ Number systems
/ Residue number systems
/ Social networks
/ Time measurement
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
by
K., Sowmya T.
, R., Mohan Naik
, Bharathrajkumar, M.
, M., Sharath S.
, Gadiyar, H. Manoj T.
in
Access control
/ Algorithms
/ Cloud computing
/ Completion time
/ Confidentiality
/ Constraints
/ Control systems
/ Cryptography
/ Data encryption
/ Data storage
/ Data transmission
/ Datasets
/ Encryption
/ Internet of Things
/ Number systems
/ Residue number systems
/ Social networks
/ Time measurement
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
Journal Article
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
2024
Request Book From Autostore
and Choose the Collection Method
Overview
PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
Publisher
Emerald Group Publishing Limited
Subject
/ Datasets
This website uses cookies to ensure you get the best experience on our website.