Academic Journal

A Higher-Level Security Scheme for Key Access on Cloud Computing

التفاصيل البيبلوغرافية
العنوان: A Higher-Level Security Scheme for Key Access on Cloud Computing
المؤلفون: Baris Celiktas, Ibrahim Celikbilek, Enver Ozdemir
المصدر: IEEE Access, Vol 9, Pp 107347-107359 (2021)
بيانات النشر: IEEE, 2021.
سنة النشر: 2021
المجموعة: LCC:Electrical engineering. Electronics. Nuclear engineering
مصطلحات موضوعية: Cloud security, hierarchical, interpolation, key access, key assignment, secret sharing, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
الوصف: In this work, we construct a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud. We consider the data owner an entity consisting of several organization units. We provide a secure method for each user of this entity to access the public cloud from both inside and outside the company’s network. The idea of our key access control scheme, which is based on Shamir’s secret sharing algorithm and polynomial interpolation method, is suitable especially for hierarchical organizational structures. It offers a secure, flexible, and hierarchical key access mechanism for organizations utilizing mission-critical data. It also minimizes concerns about moving mission-critical data to the public cloud and ensures that only users with sufficient approvals from the same or higher privileged users can access the key by making use of the topological ordering of a directed graph, including self-loop. Main overheads such as public and private storage needs are reduced to a tolerable level, and the key derivation is computationally efficient. From a security perspective, our scheme is both resistant to collaboration attacks and provides key indistinguishability security. Since the key does not need to be held anywhere, the problem of a data breach based on key disclosure risk is also eliminated.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
تدمد: 2169-3536
Relation: https://ieeexplore.ieee.org/document/9500230/; https://doaj.org/toc/2169-3536
DOI: 10.1109/ACCESS.2021.3101048
URL الوصول: https://doaj.org/article/943325014ede4b47b85b5418795f59e3
رقم الانضمام: edsdoj.943325014ede4b47b85b5418795f59e3
قاعدة البيانات: Directory of Open Access Journals
ResultId 1
Header edsdoj
Directory of Open Access Journals
edsdoj.943325014ede4b47b85b5418795f59e3
944
3
Academic Journal
academicJournal
943.9462890625
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsdoj&AN=edsdoj.943325014ede4b47b85b5418795f59e3&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => https://doaj.org/article/943325014ede4b47b85b5418795f59e3 [Name] => EDS - DOAJ [Category] => fullText [Text] => View record in DOAJ [MouseOverText] => View record in DOAJ ) [1] => Array ( [Url] => https://resolver.ebscohost.com/openurl?custid=s6537998&groupid=main&authtype=ip,guest&sid=EBSCO:edsdoj&genre=article&issn=21693536&ISBN=&volume=9&issue=&date=20210101&spage=107347&pages=107347-107359&title=IEEE Access&atitle=A%20Higher-Level%20Security%20Scheme%20for%20Key%20Access%20on%20Cloud%20Computing&id=DOI:10.1109/ACCESS.2021.3101048 [Name] => Full Text Finder (s6537998api) [Category] => fullText [Text] => Full Text Finder [Icon] => https://imageserver.ebscohost.com/branding/images/FTF.gif [MouseOverText] => Full Text Finder ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => A Higher-Level Security Scheme for Key Access on Cloud Computing )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Baris+Celiktas%22">Baris Celiktas</searchLink><br /><searchLink fieldCode="AR" term="%22Ibrahim+Celikbilek%22">Ibrahim Celikbilek</searchLink><br /><searchLink fieldCode="AR" term="%22Enver+Ozdemir%22">Enver Ozdemir</searchLink> )
Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => IEEE Access, Vol 9, Pp 107347-107359 (2021) )
Array ( [Name] => Publisher [Label] => Publisher Information [Group] => PubInfo [Data] => IEEE, 2021. )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2021 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => LCC:Electrical engineering. Electronics. Nuclear engineering )
Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Cloud+security%22">Cloud security</searchLink><br /><searchLink fieldCode="DE" term="%22hierarchical%22">hierarchical</searchLink><br /><searchLink fieldCode="DE" term="%22interpolation%22">interpolation</searchLink><br /><searchLink fieldCode="DE" term="%22key+access%22">key access</searchLink><br /><searchLink fieldCode="DE" term="%22key+assignment%22">key assignment</searchLink><br /><searchLink fieldCode="DE" term="%22secret+sharing%22">secret sharing</searchLink><br /><searchLink fieldCode="DE" term="%22Electrical+engineering%2E+Electronics%2E+Nuclear+engineering%22">Electrical engineering. Electronics. Nuclear engineering</searchLink><br /><searchLink fieldCode="DE" term="%22TK1-9971%22">TK1-9971</searchLink> )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => In this work, we construct a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud. We consider the data owner an entity consisting of several organization units. We provide a secure method for each user of this entity to access the public cloud from both inside and outside the company’s network. The idea of our key access control scheme, which is based on Shamir’s secret sharing algorithm and polynomial interpolation method, is suitable especially for hierarchical organizational structures. It offers a secure, flexible, and hierarchical key access mechanism for organizations utilizing mission-critical data. It also minimizes concerns about moving mission-critical data to the public cloud and ensures that only users with sufficient approvals from the same or higher privileged users can access the key by making use of the topological ordering of a directed graph, including self-loop. Main overheads such as public and private storage needs are reduced to a tolerable level, and the key derivation is computationally efficient. From a security perspective, our scheme is both resistant to collaboration attacks and provides key indistinguishability security. Since the key does not need to be held anywhere, the problem of a data breach based on key disclosure risk is also eliminated. )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => article )
Array ( [Name] => Format [Label] => File Description [Group] => SrcInfo [Data] => electronic resource )
Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English )
Array ( [Name] => ISSN [Label] => ISSN [Group] => ISSN [Data] => 2169-3536 )
Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => https://ieeexplore.ieee.org/document/9500230/; https://doaj.org/toc/2169-3536 )
Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.1109/ACCESS.2021.3101048 )
Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="https://doaj.org/article/943325014ede4b47b85b5418795f59e3" linkWindow="_blank">https://doaj.org/article/943325014ede4b47b85b5418795f59e3</link> )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsdoj.943325014ede4b47b85b5418795f59e3 )
RecordInfo Array ( [BibEntity] => Array ( [Identifiers] => Array ( [0] => Array ( [Type] => doi [Value] => 10.1109/ACCESS.2021.3101048 ) ) [Languages] => Array ( [0] => Array ( [Text] => English ) ) [PhysicalDescription] => Array ( [Pagination] => Array ( [PageCount] => 13 [StartPage] => 107347 ) ) [Subjects] => Array ( [0] => Array ( [SubjectFull] => Cloud security [Type] => general ) [1] => Array ( [SubjectFull] => hierarchical [Type] => general ) [2] => Array ( [SubjectFull] => interpolation [Type] => general ) [3] => Array ( [SubjectFull] => key access [Type] => general ) [4] => Array ( [SubjectFull] => key assignment [Type] => general ) [5] => Array ( [SubjectFull] => secret sharing [Type] => general ) [6] => Array ( [SubjectFull] => Electrical engineering. Electronics. Nuclear engineering [Type] => general ) [7] => Array ( [SubjectFull] => TK1-9971 [Type] => general ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => A Higher-Level Security Scheme for Key Access on Cloud Computing [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Baris Celiktas ) ) ) [1] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Ibrahim Celikbilek ) ) ) [2] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Enver Ozdemir ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 01 [M] => 01 [Type] => published [Y] => 2021 ) ) [Identifiers] => Array ( [0] => Array ( [Type] => issn-print [Value] => 21693536 ) ) [Numbering] => Array ( [0] => Array ( [Type] => volume [Value] => 9 ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => IEEE Access [Type] => main ) ) ) ) ) ) )
IllustrationInfo