Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique

被引:0
|
作者
Kousalya A. [1 ]
Baik N.-K. [2 ]
机构
[1] Department of Information Technology, Sri Krishna College of Engineering and Technology, Coimbatore
[2] Dept. of Cyber Security, College of Science and Technology, Duksung Women's University, 33, Samyang-ro 144-gil, Dobong-gu, Seoul
来源
International Journal of Intelligent Networks | 2023年 / 4卷
关键词
Admission control; Cloud computing; Cryptography; Privacy; Security;
D O I
10.1016/j.ijin.2023.03.003
中图分类号
学科分类号
摘要
In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility are mandatory. The proposed design introduced a significantly better encryption strategy to ensure better protection of overall resource admissions. This proposed work uses Improved RSA-based role-based access control (RBAC) with extendable access connectivity markup language (XACML) to encrypt information and maintain privileges. This approach enables storing information within the online computer using cryptographic ideas and information available via a basic admission management mechanism. To ensure the overall protection of sensitive information, the encryption method is employed that merged the conventional homogeneous encryption procedure with unstable information distribution method. This hybrid technique provides user to get advantage from retrieved information in a protected manner. The overall execution of proposed work is considerably quicker than other existing encryption methods. © 2023
引用
收藏
页码:62 / 67
页数:5
相关论文
共 50 条
  • [1] On the security of a RSA-based certificateless signature scheme
    He, Debiao
    Khan, Muhammad Khurram
    Wu, Shuhua
    International Journal of Network Security, 2014, 16 (01) : 78 - 80
  • [2] On the provable security of an efficient RSA-based Pseudorandom Generator
    Steinfeld, Ron
    Pieprzyk, Josef
    Wang, Huaxiong
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 194 - +
  • [3] Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack
    Hyder, Muhammad Faraz
    Tooba, Syeda
    Waseemullah
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (04) : 7321 - 7325
  • [4] The sampling twice technique for the RSA-based cryptosystems with anonymity
    Hayashi, R
    Tanaka, K
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 216 - 233
  • [5] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [6] A complete and explicit security reduction algorithm for RSA-based cryptosystems
    Kurosawa, K
    Schmidt-Samoa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 474 - 491
  • [7] An improved RSA-based access control scheme for hierarchical groups
    Cao, J
    Yao, ZA
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 719 - 723
  • [8] AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS
    Salem, Fatty M.
    Zaky, Nisreen F.
    Saad, Elsayed M.
    Hosny, Hadeer A. Hassan
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2024, 10 (03): : 247 - 264
  • [9] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [10] Security analysis on an improvement of RSA-based password authenticated key exchange
    Wang, SH
    Bao, F
    Wang, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1641 - 1646