Identity and Access Control Techniques for Enhanced Data Communication in Cloud

Authors

  • Rashmi Dixit Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, India https://orcid.org/0000-0003-2754-2304
  • K. Ravindranath Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, India

DOI:

https://doi.org/10.37256/cm.5120243721

Keywords:

cloud computing, hierarchical role-based access control (HR-ACM), composikey encryption algorithm, interactive tree-based zero knowledge protocol (ITZKP), data security, access control

Abstract

The preservation of sensitive data and prevention of unauthorized access are critical objectives in cloud computing environments, necessitating the implementation of robust security measures. The present study delves into the amalgamation of the Hierarchical Role Based Access Control Model (HR-ACM), Composikey, a composite key encryption algorithm, and Interactive Tree Based zero knowledge protocol (ITZKP) to construct a robust security framework for cloud security. This study presents an investigation into the viability and efficacy of integrating HRACM, Composikey, and ITZKP as a means of augmenting security measures and reducing potential hazards in cloudbased systems. The execution times comparison of the Composikey, IBPRE, and KPRE models were compared for different filesizes (1 KB to 2 GB) to evaluate the performance of the HRACM method. As roles increase, RBAC a execution time increases significantly. The HRACM Method takes 0.001 to 0.002 seconds to implement across all role counts. The results show that the HRACM Method is more efficient and time-effective than the RBAC Method. The response time measured in microseconds for the existing ZKP and Libra systems for different file sizes, ranging from 1KB to 1 GB. The results reveal that the verifier time for the ITZKP system aligns closely with the existing systems, demonstrating its ability to perform efficient verification processes. These findings collectively demonstrate the potential of the integrated security framework in enhancing cloud security.

Downloads

Published

2023-12-10

How to Cite

1.
Dixit R, Ravindranath K. Identity and Access Control Techniques for Enhanced Data Communication in Cloud. Contemp. Math. [Internet]. 2023 Dec. 10 [cited 2024 Dec. 21];5(1):1-16. Available from: https://ojs.wiserpub.com/index.php/CM/article/view/3721