Repeated Attribute Optimization for Big Data Encryption

نویسندگان

چکیده

Big data denotes the variety, velocity, and massive volume of data. Existing databases are unsuitable to store big owing its high volume. Cloud computing is an optimal solution process However, significant issue lies in handling access control privacy, wherein should be encrypted unauthorized user must restricted through efficient control. Attribute-based encryption (ABE) permits users encrypt decrypt for policy work practical scenarios, attributes repeated. In case specific policies, it not possible avoid attribute repetition even after application Boolean optimization approaches obtain a formula. For these there exists variety evaluated secret shares repeated attributes. Therefore, calculation cipher text irreducible policies seems lengthy computationally intensive. To address this problem, improved meta-heuristic-based on cipher-text policy-ABE (CP-ABE) developed study. Here, meta-heuristic concept phase, which returns optimized single share value each considering all shares. The only minimizes cost but also communication cost. Herein, sun flower (SFO), called newly updated SFO (NU-SFO) used perform CP-ABE. Finally, performance evaluation confirms reliability robustness scheme comparisons with traditional constructions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time domain attribute based encryption for big data access control in cloud environment

Due to high volume, variety and velocity of big data, organizations apprehend to store these huge data on the cloud environment, because of its scalability and processing power services in terms of pay as you use. Due to the security demand of data in terms of storage and access structure, data owner cannot store data on cloud in plain text format and hence has to define the encryption algorith...

متن کامل

Functional Encryption for Secured Big Data Analytics

Big Data has gained a lot of interest now a days due to the enormous scope it introduces for a better understanding of the business and decision making process for an organization. There has been a wide range of researches going on around the globe on this to make the most out of it and quite a number of technical platforms are available to perform various big data analytics. Though, Scientists...

متن کامل

π-Cipher: Authenticated Encryption for Big Data

In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data. It is designed with the special purpose of providing confidentiality and integrity for big data in tr...

متن کامل

Convex Optimization for Big Data

This article reviews recent advances in convex optimization algorithms for Big Data, which aim to reduce the computational, storage, and communications bottlenecks. We provide an overview of this emerging field, describe contemporary approximation techniques like first-order methods and randomization for scalability, and survey the important role of parallel and distributed computation. The new...

متن کامل

Attribute Based Encryption Schemes for Efficient Verifiable Data Sharing

Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer systems science and engineering

سال: 2022

ISSN: ['0267-6192']

DOI: https://doi.org/10.32604/csse.2022.017597