An Adaptive Security Scheme for Key Access on Cloud Computing

  • Conference paper
  • First Online:
Soft Computing and Signal Processing (ICSCSP 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 864))

Included in the following conference series:

  • 55 Accesses

Abstract

This research proposes a novel access management scheme that enables the seamless migration of hierarchical-like access policies to digital platforms. The work’s main objective is to transform any public cloud system into a private cloud with enhanced security features. Specifically, this focus is on addressing the needs of data owners who consist of multiple organizational units. This presents a secure approach that allows each user within the entity to access the public cloud securely whether they are within or outside the company’s network. In this, the key access control scheme is based on the polynomial interpolation method and Shamir’s secret sharing algorithm. It provides a safe, elastic then ranked entree apparatus, which is particularly suitable for organizations with a hierarchical structure and mission critical data. Our scheme ensures that only authorized users with sufficient privileges contain an admission of the key by leveraging the topologic gathering of a focused diagram, counting self-loops. This work has reduced the primary expenses by way of the community besides isolated packing requirements to a manageable equal while maintaining computational efficiency during key derivation. Furthermore, this scheme is resilient toward partnership occurrences and offers significant detectable safety. By not storing it vital anywhere, this has eliminated the risk of data breaches resulting from key disclosure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar P, Kumar K, Itagi S (2022) Design & study of quadrature hybrid 4 port network for matching, isolation, and coupling around the operating frequency. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp 1363–1366. https://doi.org/10.1109/IIHC55949.2022.10060810

  2. Supreeth S, Patil K, Patil SD, Rohith S, Vishwanath Y, Prasad KSV (2022) An efficient policy-based scheduling and allocation of virtual machines in cloud computing environment. J Electrical Comput Eng 1–12 (Hindawi Limited). https://doi.org/10.1155/2022/5889948

  3. Supreeth S, Patil K, Patil SD, Rohith S (2022) Comparative approach for VM scheduling using modified particle swarm optimization and genetic algorithm in cloud computing. In: 2022 IEEE International Conference on Data Science and Information System (ICDSIS). IEEE, 29 Jul 2022. https://doi.org/10.1109/icdsis55133.2022.9915907

  4. Supreeth S, Patil K (2022) VM scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in cloud computing environment. KSII Trans Internet Inf Syst 16(6). 30 Jun 2022 (Korean Society for Internet Information (KSII)). https://doi.org/10.3837/tiis.2022.06.007

  5. Patil K (2022) Hybrid Genetic Algorithm and Modified-Particle Swarm Optimization algorithm (GA-MPSO) for predicting scheduling virtual machines in educational cloud platforms. Int J Emerging Technol Learn (iJET) 17(07):208–225 (International Association of Online Engineering (IAOE)), 12 Apr 2022. https://doi.org/10.3991/ijet.v17i07.29223

  6. Supreeth S, Patil KK (2019) Virtual machine scheduling strategies in cloud computing—a review. Zenodo. https://doi.org/10.5281/ZENODO.6144561

  7. Hyder MS, Vijeth J, Sushma S, Bawzir MK, Supreeth S (2020) Power aware virtual machine migration for resource allocation in cloud. Zenodo. https://doi.org/10.5281/ZENODO.7027884

  8. Shruthi G, Mundada M, Supreeth S (2022) The Resource allocation using weighted greedy knapsack based algorithm in an educational fog computing environment. Int J Emerg Technol Learn 17(18):261–274

    Google Scholar 

  9. Shruthi G, Mundada MR, Sowmya BJ, Supreeth S (2022) Mayfly Taylor optimisation-based scheduling algorithm with deep reinforcement learning for dynamic scheduling in fog-cloud computing. Appl Comput Intell Soft Comput 1–17, 28 Aug 2022 (Hindawi Limited). https://doi.org/10.1155/2022/2131699

  10. Dhingra G, Supreeth S, Neha KR, Amruthashree RV, Eshitha D (2019) Traffic management using convolution neural network. Zenodo. https://doi.org/10.5281/ZENODO.7027893

  11. Mackinnon, Taylor, Meijer, Akl (1985) An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans Comput C-34(9):797–802. https://doi.org/10.1109/TC.1985.1676635

  12. Zhou L, Varadharajan V, Hitchens M (2015) Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans Inf Forensics Security 10(11):2381–2395

    Article  Google Scholar 

  13. D’Arco P, De Santis A, Ferrara AL, Masucci B (2010) Variations on a theme by Akl and Taylor: security and tradeoffs. Theor Comput Sci 411(1):213–227

    Article  MathSciNet  Google Scholar 

  14. Chen H-Y (2004) Efficient time-bound hierarchical key assignment scheme. IEEE Trans Knowl Data Eng 16(10):1301–1304. https://doi.org/10.1109/TKDE.2004.59

    Article  Google Scholar 

  15. Chang C, Hwang R-J, Wu T-C (1992) Cryptographic key assignment scheme for access control in a hierarchy. Inf Syst 17(3):243–247

    Article  Google Scholar 

  16. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  17. Liaw HT, Wang SJ, Lei CL (1993) A dynamic cryptographic key assignment scheme in a tree structure. Comput Math Appl 25(6):109–114

    Article  MathSciNet  Google Scholar 

  18. Hwang MS, Chang CC, Yang WP (1993) Modified Chang-Hwang-Wu access control scheme. Electron Lett 29(24):2095–2096

    Article  Google Scholar 

  19. Liaw H-T, Lei C-L (1993) An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT 33(1):46–56

    Article  MathSciNet  Google Scholar 

  20. Min-Shiang H (1997) A cryptographic key assignment scheme in a hierarchy for access control. Math Comput Model 26(2):27–31

    Article  MathSciNet  Google Scholar 

  21. Gowda NC, Manvi SS (2021) An efficient authentication scheme for fog computing environment using symmetric cryptographic methods. In: 2021 IEEE 9th Region 10 Humanitarian Technology Conference (R10-HTC), Bangalore, India, pp 01–06. https://doi.org/10.1109/R10-HTC53172.2021.9641591

  22. Rohith S, Mahesh MR, Basavaraj GM, Bhargavi S, Supreeth S, Chetan S (2022) Reversible data embedding scheme in encrypted image using Arnold transform for satellite images. In: 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), Vijaypur, India, pp 1–5. https://doi.org/10.1109/NKCon56289.2022.10126927

  23. Rohith S, Jahnavi L, Bhuvaneshwari SC, Supreeth S, Sujatha BK (2020) Image encryption and decryption using key sequence of triple logistic map for medical applications. In: 2020 third International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bengaluru, India, pp 1–5. https://doi.org/10.1109/ICAECC50550.2020.9339529

  24. Supreeth S, Ramya R, Chaitra Lakshmi L et al. (2019) Password processing scheme using enhanced visual cryptography and OCR in hybrid cloud environment. Zenodo. https://doi.org/10.5281/ZENODO.7027753

  25. Azam F, Yadav SK, Priyadarshi N, Padmanaban S, Bansal RC (2021) A comprehensive review of authentication schemes in vehicular ad-hoc network. IEEE Access 9:31309–31321. https://doi.org/10.1109/ACCESS.2021.3060046

    Article  Google Scholar 

  26. Azam F, Biradar A, Priyadarshi N, Kumari S, Tangade S (2021) A review of blockchain based approach for secured communication in Internet of Vehicle (IoV) scenario. In: 2021 second International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), Bengaluru, India, pp 1–6. https://doi.org/10.1109/ICSTCEE54422.2021.9708555

  27. Yerriswamy T, Gururaj M (2021) An efficient algorithm for anomaly intrusion detection in a network. In: Global transitions proceedings, vol 2. https://doi.org/10.1016/j.gltp.2021.08.066

  28. Yerriswamy T, Gururaj M (2020) Study of evolutionary techniques in the field of network security, pp 594–598. https://doi.org/10.1109/ICSTCEE49637.2020.9277082

  29. Yerriswamy T, Gururaj M (2022) Signature-based traffic classification for DDoS attack detection and analysis of mitigation for DDoS attacks using programmable commodity switches. Int J Performability Eng 18:529. https://doi.org/10.23940/ijpe.22.07.p8.529536

  30. Yerriswamy T, Gururaj M (2022) An efficient hybrid protocol framework for DDoS attack detection and mitigation using evolutionary technique. J Telecommun Inf Technol 4:77–83. https://doi.org/10.26636/jtit.2022.165122

  31. Supreeth S, Raja Rajeshwari MM (2018) Using map-reduce for image analysis in cloud environment. In: Guru D, Vasudev T, Chethan H, Kumar Y (eds) Proceedings of international conference on cognition and recognition. Lecture Notes in Networks and Systems, vol 14. Springer, Singapore. https://doi.org/10.1007/978-981-10-5146-3_11

Download references

Acknowledgements

The authors acknowledge the support from REVA University for the facilities provided to carry out the research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Supreeth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, D.M., Patil, K.K., Supreeth, S., Ambika, B.J., Vishwanath, Y., Shruthi, G. (2024). An Adaptive Security Scheme for Key Access on Cloud Computing. In: Reddy, V.S., Wang, J., Reddy, K. (eds) Soft Computing and Signal Processing. ICSCSP 2023. Lecture Notes in Networks and Systems, vol 864. Springer, Singapore. https://doi.org/10.1007/978-981-99-8628-6_41

Download citation

Publish with us

Policies and ethics

Navigation