TY - GEN
T1 - An Adaptive Security Scheme for Key Access on Cloud Computing
AU - Patel, Darshan M.
AU - Patil, Kiran Kumari
AU - Supreeth, S.
AU - Ambika, B. J.
AU - Vishwanath, Y.
AU - Shruthi, G.
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
PY - 2024
Y1 - 2024
N2 - This research proposes a novel access management scheme that enables the seamless migration of hierarchical-like access policies to digital platforms. The work’s main objective is to transform any public cloud system into a private cloud with enhanced security features. Specifically, this focus is on addressing the needs of data owners who consist of multiple organizational units. This presents a secure approach that allows each user within the entity to access the public cloud securely whether they are within or outside the company’s network. In this, the key access control scheme is based on the polynomial interpolation method and Shamir’s secret sharing algorithm. It provides a safe, elastic then ranked entree apparatus, which is particularly suitable for organizations with a hierarchical structure and mission critical data. Our scheme ensures that only authorized users with sufficient privileges contain an admission of the key by leveraging the topologic gathering of a focused diagram, counting self-loops. This work has reduced the primary expenses by way of the community besides isolated packing requirements to a manageable equal while maintaining computational efficiency during key derivation. Furthermore, this scheme is resilient toward partnership occurrences and offers significant detectable safety. By not storing it vital anywhere, this has eliminated the risk of data breaches resulting from key disclosure.
AB - This research proposes a novel access management scheme that enables the seamless migration of hierarchical-like access policies to digital platforms. The work’s main objective is to transform any public cloud system into a private cloud with enhanced security features. Specifically, this focus is on addressing the needs of data owners who consist of multiple organizational units. This presents a secure approach that allows each user within the entity to access the public cloud securely whether they are within or outside the company’s network. In this, the key access control scheme is based on the polynomial interpolation method and Shamir’s secret sharing algorithm. It provides a safe, elastic then ranked entree apparatus, which is particularly suitable for organizations with a hierarchical structure and mission critical data. Our scheme ensures that only authorized users with sufficient privileges contain an admission of the key by leveraging the topologic gathering of a focused diagram, counting self-loops. This work has reduced the primary expenses by way of the community besides isolated packing requirements to a manageable equal while maintaining computational efficiency during key derivation. Furthermore, this scheme is resilient toward partnership occurrences and offers significant detectable safety. By not storing it vital anywhere, this has eliminated the risk of data breaches resulting from key disclosure.
UR - https://www.scopus.com/pages/publications/85192456451
UR - https://www.scopus.com/inward/citedby.url?scp=85192456451&partnerID=8YFLogxK
U2 - 10.1007/978-981-99-8628-6_41
DO - 10.1007/978-981-99-8628-6_41
M3 - Conference contribution
AN - SCOPUS:85192456451
SN - 9789819986279
T3 - Lecture Notes in Networks and Systems
SP - 483
EP - 492
BT - Soft Computing and Signal Processing - Proceedings of 6th ICSCSP 2023
A2 - Reddy, Vustikayala Sivakumar
A2 - Wang, Jiacun
A2 - Reddy, K. T. V.
PB - Springer Science and Business Media Deutschland GmbH
T2 - 6th International Conference on Soft Computing and Signal Processing, ICSCSP 2023
Y2 - 23 June 2023 through 24 June 2023
ER -