User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Autor:
Kumar, Tarun
; Kumar, Prabhat
; Namasudra, Suyel
Fecha:
05/2024Palabra clave:
Revista / editorial:
International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)Citación:
T. Kumar, P. Kumar, S. Namasudra. User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment, International Journal of Interactive Multimedia and Artificial Intelligence, (2024), http://dx.doi.org/10.9781/ijimai.2024.05.001Tipo de Ítem:
articleResumen:
Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. However, an unresolved yet critical challenge in cloud data-sharing systems is the revocation of malicious users. One of the common methods for revocation involves periodically updating users' private keys. This approach increases the workload of the Key Generation Center (KGC) as the number of users increases. In this work, an efficient Revocable Identity-Based Signature (RIBS) scheme is proposed, wherein the revocation functionality is delegated to an External Revocation Server (ERS). This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. In the proposed method, a user uses its private key and secret time key to sign a message. Furthermore, to maintain data confidentiality, symmetric encryption and Elliptic Curve Cryptography (ECC) based asymmetric encryption techniques are used before outsourcing data to the cloud server. The results illustrate that the proposed scheme outperforms some of the existing schemes by providing reduced computation costs.
Ficheros en el ítem
Nombre: User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment.pdf
Tamaño: 868.8Kb
Formato: application/pdf
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
119 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
58 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)
Namasudra, Suyel; González-Crespo, Rubén ; Kumar, Sathish (Computers and Electrical Engineering, 2022)With the rapid advancement of emerging technologies, such as Internet of Things (IoT), cloud computing, and many more, a huge amount of data is generated and processed in daily life. As these technologies are based on the ... -
Improving security of medical big data by using Blockchain technology
Sharma, Pratima; Borah, Malaya Dutta; Namasudra, Suyel (Elsevier Ltd, 2021)Big data refers to a very large and diverse set of data that grow at exponential rates. In the modern healthcare system, medical big data face many security issues due to the presence of hackers and malicious users. Nowadays, ... -
A robust drug recall supply chain management system using hyperledger blockchain ecosystem
Agrawal, Divyansh; Minocha, Sachin; Namasudra, Suyel ; Gandomi, Amir H. (Elsevier Ltd, 2022)Drug recall is a critical issue for manufacturing companies, as a manufacturer might face criticism and severe business downfall due to a defective drug. A defective drug is a highly detrimental issue, as it can cost several ...