Abstract
This research proposes a novel access management scheme that enables the seamless migration of hierarchical-like access policies to digital platforms. The work’s main objective is to transform any public cloud system into a private cloud with enhanced security features. Specifically, this focus is on addressing the needs of data owners who consist of multiple organizational units. This presents a secure approach that allows each user within the entity to access the public cloud securely whether they are within or outside the company’s network. In this, the key access control scheme is based on the polynomial interpolation method and Shamir’s secret sharing algorithm. It provides a safe, elastic then ranked entree apparatus, which is particularly suitable for organizations with a hierarchical structure and mission critical data. Our scheme ensures that only authorized users with sufficient privileges contain an admission of the key by leveraging the topologic gathering of a focused diagram, counting self-loops. This work has reduced the primary expenses by way of the community besides isolated packing requirements to a manageable equal while maintaining computational efficiency during key derivation. Furthermore, this scheme is resilient toward partnership occurrences and offers significant detectable safety. By not storing it vital anywhere, this has eliminated the risk of data breaches resulting from key disclosure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kumar P, Kumar K, Itagi S (2022) Design & study of quadrature hybrid 4 port network for matching, isolation, and coupling around the operating frequency. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp 1363–1366. https://doi.org/10.1109/IIHC55949.2022.10060810
Supreeth S, Patil K, Patil SD, Rohith S, Vishwanath Y, Prasad KSV (2022) An efficient policy-based scheduling and allocation of virtual machines in cloud computing environment. J Electrical Comput Eng 1–12 (Hindawi Limited). https://doi.org/10.1155/2022/5889948
Supreeth S, Patil K, Patil SD, Rohith S (2022) Comparative approach for VM scheduling using modified particle swarm optimization and genetic algorithm in cloud computing. In: 2022 IEEE International Conference on Data Science and Information System (ICDSIS). IEEE, 29 Jul 2022. https://doi.org/10.1109/icdsis55133.2022.9915907
Supreeth S, Patil K (2022) VM scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in cloud computing environment. KSII Trans Internet Inf Syst 16(6). 30 Jun 2022 (Korean Society for Internet Information (KSII)). https://doi.org/10.3837/tiis.2022.06.007
Patil K (2022) Hybrid Genetic Algorithm and Modified-Particle Swarm Optimization algorithm (GA-MPSO) for predicting scheduling virtual machines in educational cloud platforms. Int J Emerging Technol Learn (iJET) 17(07):208–225 (International Association of Online Engineering (IAOE)), 12 Apr 2022. https://doi.org/10.3991/ijet.v17i07.29223
Supreeth S, Patil KK (2019) Virtual machine scheduling strategies in cloud computing—a review. Zenodo. https://doi.org/10.5281/ZENODO.6144561
Hyder MS, Vijeth J, Sushma S, Bawzir MK, Supreeth S (2020) Power aware virtual machine migration for resource allocation in cloud. Zenodo. https://doi.org/10.5281/ZENODO.7027884
Shruthi G, Mundada M, Supreeth S (2022) The Resource allocation using weighted greedy knapsack based algorithm in an educational fog computing environment. Int J Emerg Technol Learn 17(18):261–274
Shruthi G, Mundada MR, Sowmya BJ, Supreeth S (2022) Mayfly Taylor optimisation-based scheduling algorithm with deep reinforcement learning for dynamic scheduling in fog-cloud computing. Appl Comput Intell Soft Comput 1–17, 28 Aug 2022 (Hindawi Limited). https://doi.org/10.1155/2022/2131699
Dhingra G, Supreeth S, Neha KR, Amruthashree RV, Eshitha D (2019) Traffic management using convolution neural network. Zenodo. https://doi.org/10.5281/ZENODO.7027893
Mackinnon, Taylor, Meijer, Akl (1985) An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans Comput C-34(9):797–802. https://doi.org/10.1109/TC.1985.1676635
Zhou L, Varadharajan V, Hitchens M (2015) Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans Inf Forensics Security 10(11):2381–2395
D’Arco P, De Santis A, Ferrara AL, Masucci B (2010) Variations on a theme by Akl and Taylor: security and tradeoffs. Theor Comput Sci 411(1):213–227
Chen H-Y (2004) Efficient time-bound hierarchical key assignment scheme. IEEE Trans Knowl Data Eng 16(10):1301–1304. https://doi.org/10.1109/TKDE.2004.59
Chang C, Hwang R-J, Wu T-C (1992) Cryptographic key assignment scheme for access control in a hierarchy. Inf Syst 17(3):243–247
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Liaw HT, Wang SJ, Lei CL (1993) A dynamic cryptographic key assignment scheme in a tree structure. Comput Math Appl 25(6):109–114
Hwang MS, Chang CC, Yang WP (1993) Modified Chang-Hwang-Wu access control scheme. Electron Lett 29(24):2095–2096
Liaw H-T, Lei C-L (1993) An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT 33(1):46–56
Min-Shiang H (1997) A cryptographic key assignment scheme in a hierarchy for access control. Math Comput Model 26(2):27–31
Gowda NC, Manvi SS (2021) An efficient authentication scheme for fog computing environment using symmetric cryptographic methods. In: 2021 IEEE 9th Region 10 Humanitarian Technology Conference (R10-HTC), Bangalore, India, pp 01–06. https://doi.org/10.1109/R10-HTC53172.2021.9641591
Rohith S, Mahesh MR, Basavaraj GM, Bhargavi S, Supreeth S, Chetan S (2022) Reversible data embedding scheme in encrypted image using Arnold transform for satellite images. In: 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), Vijaypur, India, pp 1–5. https://doi.org/10.1109/NKCon56289.2022.10126927
Rohith S, Jahnavi L, Bhuvaneshwari SC, Supreeth S, Sujatha BK (2020) Image encryption and decryption using key sequence of triple logistic map for medical applications. In: 2020 third International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bengaluru, India, pp 1–5. https://doi.org/10.1109/ICAECC50550.2020.9339529
Supreeth S, Ramya R, Chaitra Lakshmi L et al. (2019) Password processing scheme using enhanced visual cryptography and OCR in hybrid cloud environment. Zenodo. https://doi.org/10.5281/ZENODO.7027753
Azam F, Yadav SK, Priyadarshi N, Padmanaban S, Bansal RC (2021) A comprehensive review of authentication schemes in vehicular ad-hoc network. IEEE Access 9:31309–31321. https://doi.org/10.1109/ACCESS.2021.3060046
Azam F, Biradar A, Priyadarshi N, Kumari S, Tangade S (2021) A review of blockchain based approach for secured communication in Internet of Vehicle (IoV) scenario. In: 2021 second International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), Bengaluru, India, pp 1–6. https://doi.org/10.1109/ICSTCEE54422.2021.9708555
Yerriswamy T, Gururaj M (2021) An efficient algorithm for anomaly intrusion detection in a network. In: Global transitions proceedings, vol 2. https://doi.org/10.1016/j.gltp.2021.08.066
Yerriswamy T, Gururaj M (2020) Study of evolutionary techniques in the field of network security, pp 594–598. https://doi.org/10.1109/ICSTCEE49637.2020.9277082
Yerriswamy T, Gururaj M (2022) Signature-based traffic classification for DDoS attack detection and analysis of mitigation for DDoS attacks using programmable commodity switches. Int J Performability Eng 18:529. https://doi.org/10.23940/ijpe.22.07.p8.529536
Yerriswamy T, Gururaj M (2022) An efficient hybrid protocol framework for DDoS attack detection and mitigation using evolutionary technique. J Telecommun Inf Technol 4:77–83. https://doi.org/10.26636/jtit.2022.165122
Supreeth S, Raja Rajeshwari MM (2018) Using map-reduce for image analysis in cloud environment. In: Guru D, Vasudev T, Chethan H, Kumar Y (eds) Proceedings of international conference on cognition and recognition. Lecture Notes in Networks and Systems, vol 14. Springer, Singapore. https://doi.org/10.1007/978-981-10-5146-3_11
Acknowledgements
The authors acknowledge the support from REVA University for the facilities provided to carry out the research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, D.M., Patil, K.K., Supreeth, S., Ambika, B.J., Vishwanath, Y., Shruthi, G. (2024). An Adaptive Security Scheme for Key Access on Cloud Computing. In: Reddy, V.S., Wang, J., Reddy, K. (eds) Soft Computing and Signal Processing. ICSCSP 2023. Lecture Notes in Networks and Systems, vol 864. Springer, Singapore. https://doi.org/10.1007/978-981-99-8628-6_41
Download citation
DOI: https://doi.org/10.1007/978-981-99-8628-6_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8627-9
Online ISBN: 978-981-99-8628-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)