This paper is published in Volume-9, Issue-2, 2023
Area
Cloud Computing
Author
Choragudi Sasidhar, Narreddy Pallavi, Sreeramdasu Pravalika, Palagiri Manoj Kumar Reddy, Yerragudi Sandeep
Org/Univ
Annamacharya Institute of Technology and Sciences, Rajampet, Andhra Pradesh, India
Pub. Date
03 April, 2023
Paper ID
V9I2-1165
Publisher
Keywords
Cloud Security, Hierarchical, Interpolation, Key Access, Key Assignment, Secret Sharing

Citationsacebook

IEEE
Choragudi Sasidhar, Narreddy Pallavi, Sreeramdasu Pravalika, Palagiri Manoj Kumar Reddy, Yerragudi Sandeep. Advanced key access security system on cloud computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Choragudi Sasidhar, Narreddy Pallavi, Sreeramdasu Pravalika, Palagiri Manoj Kumar Reddy, Yerragudi Sandeep (2023). Advanced key access security system on cloud computing. International Journal of Advance Research, Ideas and Innovations in Technology, 9(2) www.IJARIIT.com.

MLA
Choragudi Sasidhar, Narreddy Pallavi, Sreeramdasu Pravalika, Palagiri Manoj Kumar Reddy, Yerragudi Sandeep. "Advanced key access security system on cloud computing." International Journal of Advance Research, Ideas and Innovations in Technology 9.2 (2023). www.IJARIIT.com.

Abstract

In this study, we create a system for managing key access that translates any access control policies with a hierarchical system to digital media. The given approach can be applied to any cloud infrastructure system as a private cloud. We consider the data owner to be a composite organizational entity. Every user of this organization has a secure way to connect to the public cloud within as well as outside the corporate servers. Our key access control mechanism, which is based upon Shamir's secret image-sharing method and the polynomials interpolation technique, is particularly well suited for tiered organizational structures. It offers a hierarchy, secure, and flexible key access solution for organizations handling mission-critical data. Moreover, it always concerns with moving quest information into the public cloud by using the topology order of shapes the way, including self-loop, and making sure that only individuals with The Keys can be accessible with enough permission from similarly privileged users or above. A significant overhead, such as the need for both public and private storage, is reduced to a manageable level by the computationally efficient key derivation. Our solution provides crucial security that can be distinguished from other systems as well as resistance to group attacks. In addition to removing the chance of a data breach caused by key exposure, the fact that the key is not required to be kept elsewhere also eliminates this necessity.