Title | Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Biswas, Ankur, Karan, Ashish, Nigam, Nidhi, Doreswamy, Hema, Sadykanova, Serikkhan, Rauliyevna, Mangazina Zhanel |
Conference Name | 2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) |
Keywords | Access Control, Aerospace electronics, cloud computing, Cloud Security, Computer crime, cryptography, cyber security, data protection, homomorphic encryption, Human Behavior, human factors, Information security, Metrics, pubcrawl, resilience, Resiliency, RKHEA, Scalability, SKA |
Abstract | Cloud computing plays major role in the development of accessing clouduser's document and sensitive information stored. It has variety of content and representation. Cyber security and attacks in the cloud is a challenging aspect. Information security attains a vital part in Cyber Security management. It involves actions intended to reduce the adverse impacts of such incidents. To access the documents stored in cloud safely and securely, access control will be introduced based on cloud users to access the user's document in the cloud. To achieve this, it is highly required to combine security components (e.g., Access Control, Usage Control) in the security document to get automatic information. This research work has proposed a Role Key Homomorphic Encryption Algorithm (RKHEA) to monitor the cloud users, who access the services continuously. This method provides access creation of session-based key to store the singularized encryption to reduce the key size from random methods to occupy memory space. It has some terms and conditions to be followed by the cloud users and also has encryption method to secure the document content. Hence the documents are encrypted with the RKHEA algorithm based on Service Key Access (SKA). Then, the encrypted key will be created based on access control conditions. The proposed analytics result shows an enhanced control over the documents in cloud and improved security performance. |
DOI | 10.1109/I-SMAC55078.2022.9987407 |
Citation Key | biswas_implementation_2022 |