Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption
Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2022-07, Vol.11 (13), p.1942 |
---|---|
Hauptverfasser: | , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 13 |
container_start_page | 1942 |
container_title | Electronics (Basel) |
container_volume | 11 |
creator | Dhiman, Pooja Henge, Santosh Kumar Ramalingam, Rajakumar Dumka, Ankur Singh, Rajesh Gehlot, Anita Rashid, Mamoon Alshamrani, Sultan S. AlGhamdi, Ahmed Saeed Alshehri, Abdullah |
description | Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers. |
doi_str_mv | 10.3390/electronics11131942 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2686184027</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A723418552</galeid><sourcerecordid>A723418552</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</originalsourceid><addsrcrecordid>eNptUcFOwzAMrRBITGNfwCUS546mSdv0OKZBJ4Y4sHGtMs8dGW1Skg7RG__AH_IlZBoHDtgHW_Z7z7IdBJc0GjOWR9dYI3TWaAWOUspozuOTYBBHWR7mcR6f_snPg5Fzu8hbTplg0SD4eELYWyRL84r6-_PrHnsyb9pageyU0Y4oTaQmM92hba1ySB72dafCJWqpofeNd-VnN6g7snJKb8nN3bPXmRVTUvRrqzakMI13274o8HCwfXtQvgjOKlk7HP3GYbC6nS2nRbh4vJtPJ4sQWEq7EEVSiQo58g3nVFYAkqdJLv0GSQZZloGgiRS8WgMwhtRvymGdpVzwDXgIGwZXR93Wmrc9uq7cmb3VfmQZpyKlgkfxATU-orayxlLpynRWgvcNNgqMxkr5-iSLGaciSWJPYEcCWOOcxar012mk7UsalYe3lP-8hf0AzXCGLA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2686184027</pqid></control><display><type>article</type><title>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Dhiman, Pooja ; Henge, Santosh Kumar ; Ramalingam, Rajakumar ; Dumka, Ankur ; Singh, Rajesh ; Gehlot, Anita ; Rashid, Mamoon ; Alshamrani, Sultan S. ; AlGhamdi, Ahmed Saeed ; Alshehri, Abdullah</creator><creatorcontrib>Dhiman, Pooja ; Henge, Santosh Kumar ; Ramalingam, Rajakumar ; Dumka, Ankur ; Singh, Rajesh ; Gehlot, Anita ; Rashid, Mamoon ; Alshamrani, Sultan S. ; AlGhamdi, Ahmed Saeed ; Alshehri, Abdullah</creatorcontrib><description>Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11131942</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Algorithms ; Authentication ; Data encryption ; Data security ; Data transmission ; Encryption ; Mathematical models ; Medical research ; Methods ; Parameters ; Privacy ; Tenants</subject><ispartof>Electronics (Basel), 2022-07, Vol.11 (13), p.1942</ispartof><rights>COPYRIGHT 2022 MDPI AG</rights><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</citedby><cites>FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</cites><orcidid>0000-0002-9165-7600 ; 0000-0001-6463-9581 ; 0000-0003-1884-9945 ; 0000-0002-3164-8905 ; 0000-0002-8302-4571 ; 0000-0003-0008-9394 ; 0000-0002-0734-3423 ; 0000-0002-9353-6159 ; 0000-0001-8194-9354</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Dhiman, Pooja</creatorcontrib><creatorcontrib>Henge, Santosh Kumar</creatorcontrib><creatorcontrib>Ramalingam, Rajakumar</creatorcontrib><creatorcontrib>Dumka, Ankur</creatorcontrib><creatorcontrib>Singh, Rajesh</creatorcontrib><creatorcontrib>Gehlot, Anita</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Alshamrani, Sultan S.</creatorcontrib><creatorcontrib>AlGhamdi, Ahmed Saeed</creatorcontrib><creatorcontrib>Alshehri, Abdullah</creatorcontrib><title>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</title><title>Electronics (Basel)</title><description>Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Authentication</subject><subject>Data encryption</subject><subject>Data security</subject><subject>Data transmission</subject><subject>Encryption</subject><subject>Mathematical models</subject><subject>Medical research</subject><subject>Methods</subject><subject>Parameters</subject><subject>Privacy</subject><subject>Tenants</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUcFOwzAMrRBITGNfwCUS546mSdv0OKZBJ4Y4sHGtMs8dGW1Skg7RG__AH_IlZBoHDtgHW_Z7z7IdBJc0GjOWR9dYI3TWaAWOUspozuOTYBBHWR7mcR6f_snPg5Fzu8hbTplg0SD4eELYWyRL84r6-_PrHnsyb9pageyU0Y4oTaQmM92hba1ySB72dafCJWqpofeNd-VnN6g7snJKb8nN3bPXmRVTUvRrqzakMI13274o8HCwfXtQvgjOKlk7HP3GYbC6nS2nRbh4vJtPJ4sQWEq7EEVSiQo58g3nVFYAkqdJLv0GSQZZloGgiRS8WgMwhtRvymGdpVzwDXgIGwZXR93Wmrc9uq7cmb3VfmQZpyKlgkfxATU-orayxlLpynRWgvcNNgqMxkr5-iSLGaciSWJPYEcCWOOcxar012mk7UsalYe3lP-8hf0AzXCGLA</recordid><startdate>20220701</startdate><enddate>20220701</enddate><creator>Dhiman, Pooja</creator><creator>Henge, Santosh Kumar</creator><creator>Ramalingam, Rajakumar</creator><creator>Dumka, Ankur</creator><creator>Singh, Rajesh</creator><creator>Gehlot, Anita</creator><creator>Rashid, Mamoon</creator><creator>Alshamrani, Sultan S.</creator><creator>AlGhamdi, Ahmed Saeed</creator><creator>Alshehri, Abdullah</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-9165-7600</orcidid><orcidid>https://orcid.org/0000-0001-6463-9581</orcidid><orcidid>https://orcid.org/0000-0003-1884-9945</orcidid><orcidid>https://orcid.org/0000-0002-3164-8905</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-0008-9394</orcidid><orcidid>https://orcid.org/0000-0002-0734-3423</orcidid><orcidid>https://orcid.org/0000-0002-9353-6159</orcidid><orcidid>https://orcid.org/0000-0001-8194-9354</orcidid></search><sort><creationdate>20220701</creationdate><title>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</title><author>Dhiman, Pooja ; Henge, Santosh Kumar ; Ramalingam, Rajakumar ; Dumka, Ankur ; Singh, Rajesh ; Gehlot, Anita ; Rashid, Mamoon ; Alshamrani, Sultan S. ; AlGhamdi, Ahmed Saeed ; Alshehri, Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Authentication</topic><topic>Data encryption</topic><topic>Data security</topic><topic>Data transmission</topic><topic>Encryption</topic><topic>Mathematical models</topic><topic>Medical research</topic><topic>Methods</topic><topic>Parameters</topic><topic>Privacy</topic><topic>Tenants</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dhiman, Pooja</creatorcontrib><creatorcontrib>Henge, Santosh Kumar</creatorcontrib><creatorcontrib>Ramalingam, Rajakumar</creatorcontrib><creatorcontrib>Dumka, Ankur</creatorcontrib><creatorcontrib>Singh, Rajesh</creatorcontrib><creatorcontrib>Gehlot, Anita</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Alshamrani, Sultan S.</creatorcontrib><creatorcontrib>AlGhamdi, Ahmed Saeed</creatorcontrib><creatorcontrib>Alshehri, Abdullah</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dhiman, Pooja</au><au>Henge, Santosh Kumar</au><au>Ramalingam, Rajakumar</au><au>Dumka, Ankur</au><au>Singh, Rajesh</au><au>Gehlot, Anita</au><au>Rashid, Mamoon</au><au>Alshamrani, Sultan S.</au><au>AlGhamdi, Ahmed Saeed</au><au>Alshehri, Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-07-01</date><risdate>2022</risdate><volume>11</volume><issue>13</issue><spage>1942</spage><pages>1942-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11131942</doi><orcidid>https://orcid.org/0000-0002-9165-7600</orcidid><orcidid>https://orcid.org/0000-0001-6463-9581</orcidid><orcidid>https://orcid.org/0000-0003-1884-9945</orcidid><orcidid>https://orcid.org/0000-0002-3164-8905</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-0008-9394</orcidid><orcidid>https://orcid.org/0000-0002-0734-3423</orcidid><orcidid>https://orcid.org/0000-0002-9353-6159</orcidid><orcidid>https://orcid.org/0000-0001-8194-9354</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2022-07, Vol.11 (13), p.1942 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2686184027 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Access control Algorithms Authentication Data encryption Data security Data transmission Encryption Mathematical models Medical research Methods Parameters Privacy Tenants |
title | Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T04%3A06%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Token%E2%80%93Key%20Implications%20in%20an%20Enterprise%20Multi-Tenancy%20Environment%20Using%20BGV%E2%80%93EHC%20Hybrid%20Homomorphic%20Encryption&rft.jtitle=Electronics%20(Basel)&rft.au=Dhiman,%20Pooja&rft.date=2022-07-01&rft.volume=11&rft.issue=13&rft.spage=1942&rft.pages=1942-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11131942&rft_dat=%3Cgale_proqu%3EA723418552%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2686184027&rft_id=info:pmid/&rft_galeid=A723418552&rfr_iscdi=true |