{"title":"Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment","authors":"Smita Athanere Parte, Ramesh Thakur","doi":"10.1007/s12046-024-02580-2","DOIUrl":null,"url":null,"abstract":"<p>In the present time, cloud platforms are gaining more popularity for outsourcing features. So, many public or private organizations are fascinated towards cloud technology since it can handle enormous amounts of data. Cloud services also enable secure data exchanges among the registered and legitimate users. Depending on data sensitivity, cloud dependent data transfer suffers from security and privacy issues. This raises a big challenge for cloud dependent data sharing. Available solutions are having some limitations such as failure at single point, inconvenient and inefficient in terms of weak data model or revocation of user. In this research, we have suggested a quorum based scheme. In the suggested scheme, the quorum concept is assimilated with HM-ACS. For non-quorum and quorum approaches, experiments are performed. Thus, experimental analysis proved that the proposed schemes are performing much better in terms of key generation, memory required, encryption decryption and computation requirements. These schemes are also efficient and secured against all threats for data and user privacy.</p>","PeriodicalId":21498,"journal":{"name":"Sādhanā","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sādhanā","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s12046-024-02580-2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the present time, cloud platforms are gaining more popularity for outsourcing features. So, many public or private organizations are fascinated towards cloud technology since it can handle enormous amounts of data. Cloud services also enable secure data exchanges among the registered and legitimate users. Depending on data sensitivity, cloud dependent data transfer suffers from security and privacy issues. This raises a big challenge for cloud dependent data sharing. Available solutions are having some limitations such as failure at single point, inconvenient and inefficient in terms of weak data model or revocation of user. In this research, we have suggested a quorum based scheme. In the suggested scheme, the quorum concept is assimilated with HM-ACS. For non-quorum and quorum approaches, experiments are performed. Thus, experimental analysis proved that the proposed schemes are performing much better in terms of key generation, memory required, encryption decryption and computation requirements. These schemes are also efficient and secured against all threats for data and user privacy.