Dynamic security for multi-user access control in distributed environment

被引:0
|
作者
Prakash, S. Jaya [1 ]
Kumar, K. Varada Raj [1 ]
Nedunuri, Deepak [1 ]
机构
[1] Sir CR Reddy Coll Engn, Dept CSE, Eluru, India
关键词
Cloud Computing; IGSA; Secure Multi key Word Search; KEYWORD SEARCH; ENCRYPTION;
D O I
10.1088/1742-6596/1228/1/012016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is an on-demand facilities that allows customers to access processing sources and services from anywhere and at any time. Information protection means defending the information from illegal individuals or online hackers. We propose Integrated Group Sharing Approach (IGSA) schema for multiple customer accessibility control in customer operations like information insertion, deletion and in customer cancellation immediately reasoning database integration. We look at the security of IGSA plan and assess with the current IGSA techniques which are used for information access immediately reasoning computing for achieving real-time applications in reasoning. Our experimental results show efficient information removal from multiple customer accessibility in search of information from reasoning server. In future, some protection systems are to be developed to provide protection to cloud.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Multi-User Guesswork and Brute Force Security
    Christiansen, Mark M.
    Duffy, Ken R.
    Calmon, Flavio du Pin
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (12) : 6876 - 6886
  • [42] Distributed Optimization in Fog Radio Access Networks - Channel Estimation and Multi-user Detection
    He, Qi
    Zhang, Qi
    Quek, Tony Q. S.
    Chen, Zhi
    Li, Shaoqian
    2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2018,
  • [43] Security of Signature Schemes in a Multi-User Setting
    Alfred Menezes
    Nigel Smart
    Designs, Codes and Cryptography, 2004, 33 : 261 - 274
  • [44] On Signatures with Tight Security in the Multi-User Setting
    Hanaoka, Goichiro
    Schuldt, Jacob C. N.
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 91 - 95
  • [45] Tight Multi-User Security Bound of DbHtS
    Datta, Nilanjan
    Dutta, Avijit
    Nandi, Mridul
    Talnikar, Suprita
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 192 - 223
  • [46] Security of signature schemes in a multi-user setting
    Menezes, A
    Smart, N
    DESIGNS CODES AND CRYPTOGRAPHY, 2004, 33 (03) : 261 - 274
  • [47] Research on Multi-user Access Control Scheme for Private Cloud in Space Control Center
    Liang, Min
    Zhang, Hui
    Gao, Fei
    Wang, Hao
    Wei, Jun
    Huang, Ming
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 558 - 564
  • [48] Security Analysis of CMAC in the Multi-user Model
    Zhang, Xiangyang
    Shen, Yaobin
    Wang, Lei
    INFORMATION SECURITY, PT I, ISC 2024, 2025, 15257 : 67 - 86
  • [49] Multi-user chaos MIMO-OFDM scheme for physical layer multi-access security
    Inaba, Yuma
    Okamoto, Eiji
    IEICE NONLINEAR THEORY AND ITS APPLICATIONS, 2014, 5 (02): : 172 - 183
  • [50] Optimal Dynamic Spectrum Access in Multi-Channel Multi-User Cognitive Radio Networks
    Lin, Pochiang
    Lin, Tsungnan
    2010 IEEE 21ST INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2010, : 1637 - 1642