Role-based access using partial homomorphic encryption for securing cloud data

被引:0
|
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
[2] Noida,undefined
关键词
RBAC; Cloud computing; Malicious attacks; Outsourced computations; Secure transmission;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be in its infancy and will unfold its hidden potential by augmenting its services with future technologies like Metaverse, Augmented Reality, and Virtual Reality. The demand for computing resources has also increased with the increase in the number of service users, thus, the data owners outsource their computational demands to the cloud servers configured at remote locations. Since the cloud offers multi-tenancy, the risk for unauthorized access and network attacks like Denial-of-Service attacks, and Sybil attacks, increases due to the consumption of shared resources and hypervisor exploitation. In order to protect the owner's data from unauthorized access, it needs to be encrypted before being outsourced. Conventional cryptosystems decrypt the encoded message before performing computations on the outsourced data, which increases the computational complexity of the system. Homomorphic Encryption permits the cloud service provider to perform computations on encrypted data without the need for decryption. Hence, in this paper, we introduce a layer of secure cipher gateway for user data. This work demonstrates an integrated scheme based on Partial Homomorphic Encryption and Role-Based Access Control policies to restrict unauthorized access. Data access is granted strictly as per the user-role mapping in the role-based hierarchy to ensure data integrity. The proposed model also suggests mitigation techniques for various cloud attacks. The work has been compared with its peers based on a secured communication channel for data transmission with reduced encryption and decryption time.
引用
收藏
页码:950 / 966
页数:16
相关论文
共 50 条
  • [1] Role-based access using partial homomorphic encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (03) : 950 - 966
  • [2] Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud
    Boomija, M. D.
    Raja, S. V. Kasmir
    [J]. SOFT COMPUTING, 2023, 27 (01) : 559 - 568
  • [3] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182
  • [4] Role based access control using identity and broadcast based encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (03) : 171 - 182
  • [5] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [6] A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context
    Sultan, Nazatul Haque
    Varadharajan, Vijay
    Zhou, Lan
    Barbhuiya, Ferdous Ahmed
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1647 - 1661
  • [7] Applying Homomorphic Encryption For Securing Cloud Database
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 658 - 664
  • [8] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [9] Securing the Web of Things with Role-Based Access Control
    Barka, Ezedine
    Mathew, Sujith Samuel
    Atif, Yacine
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 14 - 26
  • [10] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160