Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption

نویسندگان

چکیده

Authentication, authorization, and data access control are playing major roles in security privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable non-dependable factors parameters based on providing for tenants through a hybrid approach of fully homomorphic encryption methodology: enhanced cryptosystem (EHC) Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed four elements: blended schemes, EHC BGV; secure token key implications don-dependable factors; an algorithm generating tokens suitable keys, depending user’s role; execution experimental test cases by using generation, time periods. tested 152 end-users integrating six multi-tenants, five head tenants, two enterprise levels; achieved 92 percent success rate. 32-bit plain text taking into consideration time, decryption generation transmission via cloud servers. efficient preventing from ciphertext attacks high rate transmitting between user-role-user type

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme

As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. In this paper, we are interested in designing a protocol for the secure outsourcing matching problem on encrypted data. We propose an efficient method to securely search a matching position with the query data and extra...

متن کامل

Towards Secure the Multi-Cloud using Homomorphic Encryption Scheme

Cloud computing is a model to acces shared pool of configurable computing resources which include servers, storage, applications, and also services to network effort or service interaction provider . This cloud model promotes availability and is composed of five essential fetures, in that service models are three, and four are deployment models. However, as the shape of the cloud computing is e...

متن کامل

Secure License Plate Matching using Homomorphic Encryption

License plate matching plays an important role in applications like law enforcement and road pricing where the plate is first recognized and then compared to a database of authorized vehicle plates. If an entity with a license plate wants to find a match in the license plates database which is in the possession of another entity; matching in the encrypted domain ensures that the privacy of data...

متن کامل

Secure Signal Processing Using Fully Homomorphic Encryption

This paper investigates the problem of performing signal processing via remote execution methods while maintaining the privacy of the data. Primary focus on this problem is a situation where there are two parties; a client with data or a signal that needs to be processed and a server with computational resources. Revealing the signal unencrypted causes a violation of privacy for the client. One...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11131942