Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments

被引:0
|
作者
Yakoob, S. K. [1 ]
Reddy, V. Krishna [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Guntur, Andhra Pradesh, India
关键词
Access Control Policy; Byzantine Protocol; DepSky; Distributed Computing; Multi-Cloud Security; Shamir Secret Key Sharing; SLEEP STAGE CLASSIFICATION; DECISION-SUPPORT-SYSTEM; EEG SIGNALS; AUTOMATED IDENTIFICATION; DECOMPOSITION;
D O I
10.4018/IJeC.316771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed computing is a forceful idea in disseminated registering which depicts versatile information to the executives for a minimal price dependent on client interest to various business associations. Because of multi-cloud identity-based encryption over distributed environment, in this document, the authors present and implement a novel identity-based multi-cloud security access control approach (NIMSACPA) for efficient security in multi data security and privacy based on three basic parametric concepts: 1) open minded security between autonomous user privacy using Byzantine protocol, 2) to classify the security privileges with respect to multi-cloud data sharing is described using DepSky Architecture, and 3) for identity-based information distribution between diverse users in CC described using Shamir secret key sharing procedure. This execution gives better and critical execution as far as data stockpiling and information investigation contrast and existing cryptographic techniques alongside practical multi-cloud information.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An Identity-Based Security Infrastructure for Cloud Environments
    Schridde, Christian
    Doernemann, Tim
    Juhnke, Ernst
    Freisleben, Bernd
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
  • [2] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 356 - 365
  • [3] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Bian, Genqing
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2723 - 2727
  • [4] A framework for evaluating security in multi-cloud environments
    Afolaranmi, Samuel Olaiya
    Ferrer, Borja Ramis
    Lastra, Jose Luis Martinez
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 3059 - 3066
  • [5] Cooperative Data Access in Multi-cloud Environments
    Le, Meixing
    Kant, Krishna
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 14 - 28
  • [6] Security-as-a-Service in Multi-cloud and Federated Cloud Environments
    Pawar, Pramod S.
    Sajjad, Ali
    Dimitrakos, Theo
    Chadwick, David W.
    TRUST MANAGEMENT IX, 2015, 454 : 251 - 261
  • [7] Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud
    Song, Lingwei
    Wei, Jinxia
    Wang, Licheng
    Cao, Chenlei
    Niu, Xinxin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1930 - 1945
  • [8] Enhanced Trust Based Access Control for Multi-Cloud Environment
    Paul, N. R. Rejin
    Raj, D. Paul
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (03): : 3079 - 3093
  • [9] RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
    Guo, Zirui
    Zhang, Kai
    Wei, Lifei
    Chen, Siyuan
    Wang, Liangliang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 141
  • [10] Secure Access Control for Multi-Cloud Resources
    Graupner, Hendrik
    Torkura, Kennedy
    Berger, Philipp
    Meinel, Christoph
    Schnjakin, Maxim
    2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS), 2015, : 722 - 729