Identity and Access Control Techniques for Enhanced Data Communication in Cloud

IF 0.6 Q3 MATHEMATICS
Rashmi Dixit, K. Ravindranath
{"title":"Identity and Access Control Techniques for Enhanced Data Communication in Cloud","authors":"Rashmi Dixit, K. Ravindranath","doi":"10.37256/cm.5120243721","DOIUrl":null,"url":null,"abstract":"The preservation of sensitive data and prevention of unauthorized access are critical objectives in cloud computing environments, necessitating the implementation of robust security measures. The present study delves into the amalgamation of the Hierarchical Role Based Access Control Model (HR-ACM), Composikey, a composite key encryption algorithm, and Interactive Tree Based zero knowledge protocol (ITZKP) to construct a robust security framework for cloud security. This study presents an investigation into the viability and efficacy of integrating HRACM, Composikey, and ITZKP as a means of augmenting security measures and reducing potential hazards in cloudbased systems. The execution times comparison of the Composikey, IBPRE, and KPRE models were compared for different filesizes (1 KB to 2 GB) to evaluate the performance of the HRACM method. As roles increase, RBAC a execution time increases significantly. The HRACM Method takes 0.001 to 0.002 seconds to implement across all role counts. The results show that the HRACM Method is more efficient and time-effective than the RBAC Method. The response time measured in microseconds for the existing ZKP and Libra systems for different file sizes, ranging from 1KB to 1 GB. The results reveal that the verifier time for the ITZKP system aligns closely with the existing systems, demonstrating its ability to perform efficient verification processes. These findings collectively demonstrate the potential of the integrated security framework in enhancing cloud security.","PeriodicalId":29767,"journal":{"name":"Contemporary Mathematics","volume":"1057 ","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Contemporary Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37256/cm.5120243721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0

Abstract

The preservation of sensitive data and prevention of unauthorized access are critical objectives in cloud computing environments, necessitating the implementation of robust security measures. The present study delves into the amalgamation of the Hierarchical Role Based Access Control Model (HR-ACM), Composikey, a composite key encryption algorithm, and Interactive Tree Based zero knowledge protocol (ITZKP) to construct a robust security framework for cloud security. This study presents an investigation into the viability and efficacy of integrating HRACM, Composikey, and ITZKP as a means of augmenting security measures and reducing potential hazards in cloudbased systems. The execution times comparison of the Composikey, IBPRE, and KPRE models were compared for different filesizes (1 KB to 2 GB) to evaluate the performance of the HRACM method. As roles increase, RBAC a execution time increases significantly. The HRACM Method takes 0.001 to 0.002 seconds to implement across all role counts. The results show that the HRACM Method is more efficient and time-effective than the RBAC Method. The response time measured in microseconds for the existing ZKP and Libra systems for different file sizes, ranging from 1KB to 1 GB. The results reveal that the verifier time for the ITZKP system aligns closely with the existing systems, demonstrating its ability to perform efficient verification processes. These findings collectively demonstrate the potential of the integrated security framework in enhancing cloud security.
增强云计算数据通信的身份和访问控制技术
保护敏感数据和防止未经授权的访问是云计算环境中的关键目标,因此必须实施强有力的安全措施。本研究将基于角色的分级访问控制模型(HR-ACM)、复合密钥加密算法 Composikey 和基于树的交互式零知识协议(ITZKP)结合起来,为云安全构建一个强大的安全框架。本研究探讨了将 HRACM、Composikey 和 ITZKP 集成为增强安全措施和减少云系统潜在危害的一种手段的可行性和有效性。比较了 Composikey、IBPRE 和 KPRE 模型在不同文件大小(1 KB 至 2 GB)下的执行时间,以评估 HRACM 方法的性能。随着角色的增加,RBAC 的执行时间也大幅增加。在所有角色数中,HRACM 方法的执行时间为 0.001 至 0.002 秒。结果表明,HRACM 方法比 RBAC 方法更高效、更省时。以微秒为单位测量现有 ZKP 和 Libra 系统对不同文件大小(从 1KB 到 1GB)的响应时间。结果表明,ITZKP 系统的验证时间与现有系统非常接近,这表明它有能力执行高效的验证流程。这些发现共同证明了集成安全框架在增强云安全方面的潜力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
0.60
自引率
33.30%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信