Comparison of Encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based Encryption Algorithm

In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography strategy for secure cloud data sharing. Tools and Methods for Scientific Research: To successfully analyze encryption time for safe data sha...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International Conference on Computing, Communication, and Networking Technologies (Online) s. 1 - 5
Hlavní autoři: Reddy, Peram Venkata Krishna Teja, Justin Thangaraj, S. John
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 24.06.2024
Témata:
ISSN:2473-7674
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography strategy for secure cloud data sharing. Tools and Methods for Scientific Research: To successfully analyze encryption time for safe data sharing in the cloud, Google Cloud supplies the necessary dataset. Cloud computing frameworks and applications will be explored, planned, and built in this article. Two encryption approaches, Ciphertext-Policy-Attribute Based and Lightweight Cryptography Method, are examined once the database sets are imported. You may think of two main groups into which both algorithms fall. An 80% G-power, a 95% confidence interval, and a 0.05 significance level are all part of the 97 -sample requirement for each dataset. The results may be yours if you can figure out how many milliseconds it takes to encrypt the given inputs. Using the IBM SPSS application, the data is obtained. There is a significant result from the independent sample \mathbf{t}-test, as shown by the following: \mathbf{p = 0. 0 0 0} (\mathbf{\lt}0.05). Both approaches are very different from one another from a statistical perspective. The results show that compared to the Lightweight Cryptography Method, Chipper Text-PolicyAttribute Based Encryption Algorithm encrypts data much more quickly. The Lightweight Cryptography Method encrypts data in 0.2059 milliseconds, which is much faster than the Chipper Text-Policy-Attribute Based Encryption Algorithm's 0.3939 milliseconds.
AbstractList In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography strategy for secure cloud data sharing. Tools and Methods for Scientific Research: To successfully analyze encryption time for safe data sharing in the cloud, Google Cloud supplies the necessary dataset. Cloud computing frameworks and applications will be explored, planned, and built in this article. Two encryption approaches, Ciphertext-Policy-Attribute Based and Lightweight Cryptography Method, are examined once the database sets are imported. You may think of two main groups into which both algorithms fall. An 80% G-power, a 95% confidence interval, and a 0.05 significance level are all part of the 97 -sample requirement for each dataset. The results may be yours if you can figure out how many milliseconds it takes to encrypt the given inputs. Using the IBM SPSS application, the data is obtained. There is a significant result from the independent sample \mathbf{t}-test, as shown by the following: \mathbf{p = 0. 0 0 0} (\mathbf{\lt}0.05). Both approaches are very different from one another from a statistical perspective. The results show that compared to the Lightweight Cryptography Method, Chipper Text-PolicyAttribute Based Encryption Algorithm encrypts data much more quickly. The Lightweight Cryptography Method encrypts data in 0.2059 milliseconds, which is much faster than the Chipper Text-Policy-Attribute Based Encryption Algorithm's 0.3939 milliseconds.
Author Reddy, Peram Venkata Krishna Teja
Justin Thangaraj, S. John
Author_xml – sequence: 1
  givenname: Peram Venkata Krishna Teja
  surname: Reddy
  fullname: Reddy, Peram Venkata Krishna Teja
  organization: Saveetha Institute of Medical and Technical Sciences,Saveetha School of Engineering,Dept of CSE,Chennai,India
– sequence: 2
  givenname: S. John
  surname: Justin Thangaraj
  fullname: Justin Thangaraj, S. John
  organization: Saveetha Institute of Medical and Technical Sciences,Saveetha School of Engineering,Dept of CSE,Chennai,India
BookMark eNpNUEtOwzAUNAgkSukNWJgDpPiTxMmyWOUjtcAi-8pOXhKjJI4cp5AbcUxaPhKbGc1oNBrNJTrrbAcI3VCypJSkt09SyucspoTQJSMsXFIiWCQSeoIWqUgTHhEuDn56imYsFDwQsQgv0GIY3gghnDMiOJmhT2nbXjkz2A7bEq-73E29NweVmRZwaR3ejo03QQN7aPBq9DV03uTqO2M6LBs7FngcTFfhjalq_w5HxPLYYyun-nrCW_C1LbDdg8OyNn1_4Aw-fPBqG5NPK--d0aMHfKcGKP6vWDWVdcbX7RU6L1UzwOKX5yi7X2fyMdi8PDzJ1SYwKfWBYElR0LCMNCVRHuVQJIoB1QlNtFZU5CGLKWXAi1AzzVNRJprQKGRax6kKNZ-j659aAwC73plWuWn39y3_Ah5XdVA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCCNT61001.2024.10725781
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798350370249
EISSN 2473-7674
EndPage 5
ExternalDocumentID 10725781
Genre orig-research
GroupedDBID 6IE
6IL
6IN
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i91t-728dd14f5b105c5ced8a2e1b818bba17c426112e3d4b2b397f8b01542bb69a4b3
IEDL.DBID RIE
IngestDate Wed Aug 27 03:07:31 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-728dd14f5b105c5ced8a2e1b818bba17c426112e3d4b2b397f8b01542bb69a4b3
PageCount 5
ParticipantIDs ieee_primary_10725781
PublicationCentury 2000
PublicationDate 2024-June-24
PublicationDateYYYYMMDD 2024-06-24
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-June-24
  day: 24
PublicationDecade 2020
PublicationTitle International Conference on Computing, Communication, and Networking Technologies (Online)
PublicationTitleAbbrev ICCCNT
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003320730
Score 1.8742508
Snippet In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Authentication
Chipper Text Policy-Attribute Based Encryption Algorithm
Cloud computing
Encryption
Encryption Time
Multilevel authentication
Novel Lightweight Cryptography Method Technology
Testing
Title Comparison of Encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based Encryption Algorithm
URI https://ieeexplore.ieee.org/document/10725781
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT4NAEN5oY4xefNX4zph4pZZleR0raaOJNj1w6K3ZXZaWpEKDVOM_8me6s9BaDx48QUggm2WYx8f3zRByx7tpkNoUcQ03sBj3lBW4PLVSzxFdGkqHe9wMm_CHw2A8DkeNWN1oYZRShnymOnhq_uUnhVwiVKa_cB8tTBc7277v1WKtNaDiOBTNdZfcNn0075-iKBrGHnYZ0oUgZZ3V_b8mqZhAMjj45xIOSftHkgejdbA5IlsqPyb7G90ET8hXtJ4pCEUK_VyWn8YhAOo8QGenYOS21hyJQoDgGFKFaswOshyiebFMAJnwU3jGov3D4KYQ4XOa1tbwYkZOAzI_IZpli4U-xlg-1x2Ge1U9QkvBg46PyeYqevNpUWbV7LVN4kE_jh6tZhCDlYV2Zfk0SBKbpa7QyZh0pUoCTpUtdKwXgtu-xDLMpspJmKBCJzhpIDA1o0J4IWfCOSWtvMjVGYGukgFj6AWkZFInpzrB79KUa7fiKO7556SNez5Z1K02Jqvtvvjj-iXZwzeL3C3KrkirKpfqmuzI9yp7K2-MgXwDGDu_9A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELYQIB4LryLeHBJrIHGc11giEBVt1SEDW2U7DkQqSRVSEP-In4nPCaUMDEyJMliWc7n77svdd4RccjsLM4cir-GFFuO-skKPZ1bmu8KmkXS5z82wiWA4DB8fo1HbrG56YZRSpvhMXeGt-ZeflnKGVJn-wgO0MJ3srHiMUbtp15pTKq5L0WDXyEWrpHndi-N4mPioM6RTQcquvlf4NUvFhJK7rX9uYpt0fpryYDQPNztkSRW7ZHNBT3CPfMbzqYJQZnBbyOrDuATATg_Q-BRMw601wVIhQHoMi4Ua1g7yAuJJOUsBa-GfoI9p-7thTiHGdVpxaxiYodOAtZ8QP-fTqb4mmEA3GsPduhmipeBGR8h0cRfdyVNZ5fXzS4ckd7dJfG-1oxisPHJqK6Bhmjos84SGY9KTKg05VY7Q0V4I7gQSEzGHKjdlggoNcbJQIDijQvgRZ8LdJ8tFWagDAraSIWPoB6RkUsNTDfFtmnHtWFzF_eCQdPDMx9NGbGP8fdxHfzw_J-v3yaA_7veGD8dkA98yVnJRdkKW62qmTsmqfKvz1-rMGMsXOHbDOw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Computing%2C+Communication%2C+and+Networking+Technologies+%28Online%29&rft.atitle=Comparison+of+Encryption+Time+for+Multi-level+Authentication+in+Cloud+using+Lightweight+Cryptography+Method+over+Chipper+Text-PolicyAttribute+Based+Encryption+Algorithm&rft.au=Reddy%2C+Peram+Venkata+Krishna+Teja&rft.au=Justin+Thangaraj%2C+S.+John&rft.date=2024-06-24&rft.pub=IEEE&rft.eissn=2473-7674&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICCCNT61001.2024.10725781&rft.externalDocID=10725781