Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption
نویسندگان
چکیده
Authentication, authorization, and data access control are playing major roles in security privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable non-dependable factors parameters based on providing for tenants through a hybrid approach of fully homomorphic encryption methodology: enhanced cryptosystem (EHC) Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed four elements: blended schemes, EHC BGV; secure token key implications don-dependable factors; an algorithm generating tokens suitable keys, depending user’s role; execution experimental test cases by using generation, time periods. tested 152 end-users integrating six multi-tenants, five head tenants, two enterprise levels; achieved 92 percent success rate. 32-bit plain text taking into consideration time, decryption generation transmission via cloud servers. efficient preventing from ciphertext attacks high rate transmitting between user-role-user type
منابع مشابه
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme
As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. In this paper, we are interested in designing a protocol for the secure outsourcing matching problem on encrypted data. We propose an efficient method to securely search a matching position with the query data and extra...
متن کاملTowards Secure the Multi-Cloud using Homomorphic Encryption Scheme
Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is e...
متن کاملSecure License Plate Matching using Homomorphic Encryption
License plate matching plays an important role in applications like law enforcement and road pricing where the plate is first recognized and then compared to a database of authorized vehicle plates. If an entity with a license plate wants to find a match in the license plates database which is in the possession of another entity; matching in the encrypted domain ensures that the privacy of data...
متن کاملSecure Signal Processing Using Fully Homomorphic Encryption
This paper investigates the problem of performing signal processing via remote execution methods while maintaining the privacy of the data. Primary focus on this problem is a situation where there are two parties; a client with data or a signal that needs to be processed and a server with computational resources. Revealing the signal unencrypted causes a violation of privacy for the client. One...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11131942