Show simple item record

dc.contributor.authorÇelikbilek, İbrahimen_US
dc.contributor.authorÇeliktaş, Barışen_US
dc.contributor.authorÖzdemir, Enveren_US
dc.date.accessioned2024-04-22T13:20:16Z
dc.date.available2024-04-22T13:20:16Z
dc.date.issued2024-03-25
dc.identifier.citationÇelikbilek, İ., Çeliktaş, B. & Özdemir, E. (2024). Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing. Paper presented at the 2024 28th International Conference on Information Technology (IT), 1-5. doi:10.1109/IT61232.2024.10475744en_US
dc.identifier.isbn9798350369618
dc.identifier.isbn9798350369625
dc.identifier.issn2836-3744en_US
dc.identifier.issn2836-3736en_US
dc.identifier.urihttps://hdl.handle.net/11729/5981
dc.identifier.urihttp://dx.doi.org/10.1109/IT61232.2024.10475744
dc.description.abstractIn this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret keys generated and managed by this scheme can be utilized for various purposes within the cloud computing, including data encryption, integrity checks, secure communications, and accessing critical infrastructures or services. Our implementation performs dynamic update operations with minimal computational cost and storage demands, as users within the hierarchical structure do not store any key components. Through security analysis, the scheme demonstrates strong key indistinguishability security (S-KI-security), effectively safeguarding keys against various cryptographic attacks. The scheme's flexibility allows it to be tailored to specific organizational needs, whether for securing sensitive data, ensuring compliance with regulatory standards, or facilitating secure data sharing and collaboration in cloud environments. Thus, we advocate for the practical implementation of the HKAS in transitioning to cloud environments.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2024 28th International Conference on Information Technology (IT)en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAccess controlen_US
dc.subjectCloud securityen_US
dc.subjectCloud storageen_US
dc.subjectCryptographyen_US
dc.subjectRegulatory complianceen_US
dc.subjectCloud computing environmentsen_US
dc.subjectCloud environmentsen_US
dc.subjectCloud-computingen_US
dc.subjectData encryptionen_US
dc.subjectDynamic updateen_US
dc.subjectHierarchical key assignmenten_US
dc.subjectIntegrity checken_US
dc.subjectKey assignment schemesen_US
dc.subjectSecret keyen_US
dc.subjectSecure accessingen_US
dc.subjectSensitive dataen_US
dc.titleImplementing lightweight, dynamic hierarchical key assignment scheme for cloud computingen_US
dc.typeConference Objecten_US
dc.description.versionPublisher's Versionen_US
dc.departmentIşık Üniversitesien_US
dc.departmentIşık Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.departmentIşık University, Faculty of Engineering and Natural Sciences, Department of Computer Engineeringen_US
dc.authorid0000-0003-2865-6370
dc.authorid0000-0003-2865-6370en_US
dc.identifier.startpage1
dc.identifier.endpage5
dc.peerreviewedYesen_US
dc.publicationstatusPublisheden_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.institutionauthorÇeliktaş, Barışen_US
dc.indekslendigikaynakScopusen_US
dc.identifier.scopus2-s2.0-85190425436en_US
dc.identifier.doi10.1109/IT61232.2024.10475744
dc.identifier.scopusqualityN/Aen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record