Özet
In this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret keys generated and managed by this scheme can be utilized for various purposes within the cloud computing, including data encryption, integrity checks, secure communications, and accessing critical infrastructures or services. Our implementation performs dynamic update operations with minimal computational cost and storage demands, as users within the hierarchical structure do not store any key components. Through security analysis, the scheme demonstrates strong key indistinguishability security (S-KI-security), effectively safeguarding keys against various cryptographic attacks. The scheme's flexibility allows it to be tailored to specific organizational needs, whether for securing sensitive data, ensuring compliance with regulatory standards, or facilitating secure data sharing and collaboration in cloud environments. Thus, we advocate for the practical implementation of the HKAS in transitioning to cloud environments.
Orijinal dil | İngilizce |
---|---|
Ana bilgisayar yayını başlığı | 2024 28th International Conference on Information Technology, IT 2024 |
Yayınlayan | Institute of Electrical and Electronics Engineers Inc. |
ISBN (Elektronik) | 9798350369618 |
DOI'lar | |
Yayın durumu | Yayınlandı - 2024 |
Etkinlik | 2024 28th International Conference on Information Technology, IT 2024 - Zabljak, Montenegro Süre: 21 Şub 2024 → 24 Şub 2024 |
Yayın serisi
Adı | 2024 28th International Conference on Information Technology, IT 2024 |
---|
???event.eventtypes.event.conference???
???event.eventtypes.event.conference??? | 2024 28th International Conference on Information Technology, IT 2024 |
---|---|
Ülke/Bölge | Montenegro |
Şehir | Zabljak |
Periyot | 21/02/24 → 24/02/24 |
Bibliyografik not
Publisher Copyright:© 2024 IEEE.