Identity and Access Control Techniques for Enhanced Data Communication in Cloud

IF 0.6 Q3 MATHEMATICS Contemporary Mathematics Pub Date : 2023-12-10 DOI:10.37256/cm.5120243721
Rashmi Dixit, K. Ravindranath
{"title":"Identity and Access Control Techniques for Enhanced Data Communication in Cloud","authors":"Rashmi Dixit, K. Ravindranath","doi":"10.37256/cm.5120243721","DOIUrl":null,"url":null,"abstract":"The preservation of sensitive data and prevention of unauthorized access are critical objectives in cloud computing environments, necessitating the implementation of robust security measures. The present study delves into the amalgamation of the Hierarchical Role Based Access Control Model (HR-ACM), Composikey, a composite key encryption algorithm, and Interactive Tree Based zero knowledge protocol (ITZKP) to construct a robust security framework for cloud security. This study presents an investigation into the viability and efficacy of integrating HRACM, Composikey, and ITZKP as a means of augmenting security measures and reducing potential hazards in cloudbased systems. The execution times comparison of the Composikey, IBPRE, and KPRE models were compared for different filesizes (1 KB to 2 GB) to evaluate the performance of the HRACM method. As roles increase, RBAC a execution time increases significantly. The HRACM Method takes 0.001 to 0.002 seconds to implement across all role counts. The results show that the HRACM Method is more efficient and time-effective than the RBAC Method. The response time measured in microseconds for the existing ZKP and Libra systems for different file sizes, ranging from 1KB to 1 GB. The results reveal that the verifier time for the ITZKP system aligns closely with the existing systems, demonstrating its ability to perform efficient verification processes. These findings collectively demonstrate the potential of the integrated security framework in enhancing cloud security.","PeriodicalId":29767,"journal":{"name":"Contemporary Mathematics","volume":"1057 ","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Contemporary Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37256/cm.5120243721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0

Abstract

The preservation of sensitive data and prevention of unauthorized access are critical objectives in cloud computing environments, necessitating the implementation of robust security measures. The present study delves into the amalgamation of the Hierarchical Role Based Access Control Model (HR-ACM), Composikey, a composite key encryption algorithm, and Interactive Tree Based zero knowledge protocol (ITZKP) to construct a robust security framework for cloud security. This study presents an investigation into the viability and efficacy of integrating HRACM, Composikey, and ITZKP as a means of augmenting security measures and reducing potential hazards in cloudbased systems. The execution times comparison of the Composikey, IBPRE, and KPRE models were compared for different filesizes (1 KB to 2 GB) to evaluate the performance of the HRACM method. As roles increase, RBAC a execution time increases significantly. The HRACM Method takes 0.001 to 0.002 seconds to implement across all role counts. The results show that the HRACM Method is more efficient and time-effective than the RBAC Method. The response time measured in microseconds for the existing ZKP and Libra systems for different file sizes, ranging from 1KB to 1 GB. The results reveal that the verifier time for the ITZKP system aligns closely with the existing systems, demonstrating its ability to perform efficient verification processes. These findings collectively demonstrate the potential of the integrated security framework in enhancing cloud security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
增强云计算数据通信的身份和访问控制技术
保护敏感数据和防止未经授权的访问是云计算环境中的关键目标,因此必须实施强有力的安全措施。本研究将基于角色的分级访问控制模型(HR-ACM)、复合密钥加密算法 Composikey 和基于树的交互式零知识协议(ITZKP)结合起来,为云安全构建一个强大的安全框架。本研究探讨了将 HRACM、Composikey 和 ITZKP 集成为增强安全措施和减少云系统潜在危害的一种手段的可行性和有效性。比较了 Composikey、IBPRE 和 KPRE 模型在不同文件大小(1 KB 至 2 GB)下的执行时间,以评估 HRACM 方法的性能。随着角色的增加,RBAC 的执行时间也大幅增加。在所有角色数中,HRACM 方法的执行时间为 0.001 至 0.002 秒。结果表明,HRACM 方法比 RBAC 方法更高效、更省时。以微秒为单位测量现有 ZKP 和 Libra 系统对不同文件大小(从 1KB 到 1GB)的响应时间。结果表明,ITZKP 系统的验证时间与现有系统非常接近,这表明它有能力执行高效的验证流程。这些发现共同证明了集成安全框架在增强云安全方面的潜力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
0.60
自引率
33.30%
发文量
0
期刊最新文献
Algorithm Optimizer in GA-LSTM for Stock Price Forecasting Controllability of Hilfer Fractional Semilinear Integro-Differential Equation of Order α ∊ (0, 1), β ∊ [0, 1] A Study on Approximate Controllability of Ψ-Caputo Fractional Differential Equations with Impulsive Effects A Study of Some Problems on the Dirichlet Characters (mod q) Topological Indices and Properties of the Prime Ideal Graph of a Commutative Ring and Its Line Graph
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1