Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption

Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2022-07, Vol.11 (13), p.1942
Hauptverfasser: Dhiman, Pooja, Henge, Santosh Kumar, Ramalingam, Rajakumar, Dumka, Ankur, Singh, Rajesh, Gehlot, Anita, Rashid, Mamoon, Alshamrani, Sultan S., AlGhamdi, Ahmed Saeed, Alshehri, Abdullah
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 13
container_start_page 1942
container_title Electronics (Basel)
container_volume 11
creator Dhiman, Pooja
Henge, Santosh Kumar
Ramalingam, Rajakumar
Dumka, Ankur
Singh, Rajesh
Gehlot, Anita
Rashid, Mamoon
Alshamrani, Sultan S.
AlGhamdi, Ahmed Saeed
Alshehri, Abdullah
description Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.
doi_str_mv 10.3390/electronics11131942
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2686184027</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A723418552</galeid><sourcerecordid>A723418552</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</originalsourceid><addsrcrecordid>eNptUcFOwzAMrRBITGNfwCUS546mSdv0OKZBJ4Y4sHGtMs8dGW1Skg7RG__AH_IlZBoHDtgHW_Z7z7IdBJc0GjOWR9dYI3TWaAWOUspozuOTYBBHWR7mcR6f_snPg5Fzu8hbTplg0SD4eELYWyRL84r6-_PrHnsyb9pageyU0Y4oTaQmM92hba1ySB72dafCJWqpofeNd-VnN6g7snJKb8nN3bPXmRVTUvRrqzakMI13274o8HCwfXtQvgjOKlk7HP3GYbC6nS2nRbh4vJtPJ4sQWEq7EEVSiQo58g3nVFYAkqdJLv0GSQZZloGgiRS8WgMwhtRvymGdpVzwDXgIGwZXR93Wmrc9uq7cmb3VfmQZpyKlgkfxATU-orayxlLpynRWgvcNNgqMxkr5-iSLGaciSWJPYEcCWOOcxar012mk7UsalYe3lP-8hf0AzXCGLA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2686184027</pqid></control><display><type>article</type><title>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Dhiman, Pooja ; Henge, Santosh Kumar ; Ramalingam, Rajakumar ; Dumka, Ankur ; Singh, Rajesh ; Gehlot, Anita ; Rashid, Mamoon ; Alshamrani, Sultan S. ; AlGhamdi, Ahmed Saeed ; Alshehri, Abdullah</creator><creatorcontrib>Dhiman, Pooja ; Henge, Santosh Kumar ; Ramalingam, Rajakumar ; Dumka, Ankur ; Singh, Rajesh ; Gehlot, Anita ; Rashid, Mamoon ; Alshamrani, Sultan S. ; AlGhamdi, Ahmed Saeed ; Alshehri, Abdullah</creatorcontrib><description>Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11131942</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Algorithms ; Authentication ; Data encryption ; Data security ; Data transmission ; Encryption ; Mathematical models ; Medical research ; Methods ; Parameters ; Privacy ; Tenants</subject><ispartof>Electronics (Basel), 2022-07, Vol.11 (13), p.1942</ispartof><rights>COPYRIGHT 2022 MDPI AG</rights><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</citedby><cites>FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</cites><orcidid>0000-0002-9165-7600 ; 0000-0001-6463-9581 ; 0000-0003-1884-9945 ; 0000-0002-3164-8905 ; 0000-0002-8302-4571 ; 0000-0003-0008-9394 ; 0000-0002-0734-3423 ; 0000-0002-9353-6159 ; 0000-0001-8194-9354</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Dhiman, Pooja</creatorcontrib><creatorcontrib>Henge, Santosh Kumar</creatorcontrib><creatorcontrib>Ramalingam, Rajakumar</creatorcontrib><creatorcontrib>Dumka, Ankur</creatorcontrib><creatorcontrib>Singh, Rajesh</creatorcontrib><creatorcontrib>Gehlot, Anita</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Alshamrani, Sultan S.</creatorcontrib><creatorcontrib>AlGhamdi, Ahmed Saeed</creatorcontrib><creatorcontrib>Alshehri, Abdullah</creatorcontrib><title>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</title><title>Electronics (Basel)</title><description>Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Authentication</subject><subject>Data encryption</subject><subject>Data security</subject><subject>Data transmission</subject><subject>Encryption</subject><subject>Mathematical models</subject><subject>Medical research</subject><subject>Methods</subject><subject>Parameters</subject><subject>Privacy</subject><subject>Tenants</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUcFOwzAMrRBITGNfwCUS546mSdv0OKZBJ4Y4sHGtMs8dGW1Skg7RG__AH_IlZBoHDtgHW_Z7z7IdBJc0GjOWR9dYI3TWaAWOUspozuOTYBBHWR7mcR6f_snPg5Fzu8hbTplg0SD4eELYWyRL84r6-_PrHnsyb9pageyU0Y4oTaQmM92hba1ySB72dafCJWqpofeNd-VnN6g7snJKb8nN3bPXmRVTUvRrqzakMI13274o8HCwfXtQvgjOKlk7HP3GYbC6nS2nRbh4vJtPJ4sQWEq7EEVSiQo58g3nVFYAkqdJLv0GSQZZloGgiRS8WgMwhtRvymGdpVzwDXgIGwZXR93Wmrc9uq7cmb3VfmQZpyKlgkfxATU-orayxlLpynRWgvcNNgqMxkr5-iSLGaciSWJPYEcCWOOcxar012mk7UsalYe3lP-8hf0AzXCGLA</recordid><startdate>20220701</startdate><enddate>20220701</enddate><creator>Dhiman, Pooja</creator><creator>Henge, Santosh Kumar</creator><creator>Ramalingam, Rajakumar</creator><creator>Dumka, Ankur</creator><creator>Singh, Rajesh</creator><creator>Gehlot, Anita</creator><creator>Rashid, Mamoon</creator><creator>Alshamrani, Sultan S.</creator><creator>AlGhamdi, Ahmed Saeed</creator><creator>Alshehri, Abdullah</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-9165-7600</orcidid><orcidid>https://orcid.org/0000-0001-6463-9581</orcidid><orcidid>https://orcid.org/0000-0003-1884-9945</orcidid><orcidid>https://orcid.org/0000-0002-3164-8905</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-0008-9394</orcidid><orcidid>https://orcid.org/0000-0002-0734-3423</orcidid><orcidid>https://orcid.org/0000-0002-9353-6159</orcidid><orcidid>https://orcid.org/0000-0001-8194-9354</orcidid></search><sort><creationdate>20220701</creationdate><title>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</title><author>Dhiman, Pooja ; Henge, Santosh Kumar ; Ramalingam, Rajakumar ; Dumka, Ankur ; Singh, Rajesh ; Gehlot, Anita ; Rashid, Mamoon ; Alshamrani, Sultan S. ; AlGhamdi, Ahmed Saeed ; Alshehri, Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-e85f8fe4e4d441afcca4659a00957c777c815a84fbcc33e10794cb76484dc9573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Authentication</topic><topic>Data encryption</topic><topic>Data security</topic><topic>Data transmission</topic><topic>Encryption</topic><topic>Mathematical models</topic><topic>Medical research</topic><topic>Methods</topic><topic>Parameters</topic><topic>Privacy</topic><topic>Tenants</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dhiman, Pooja</creatorcontrib><creatorcontrib>Henge, Santosh Kumar</creatorcontrib><creatorcontrib>Ramalingam, Rajakumar</creatorcontrib><creatorcontrib>Dumka, Ankur</creatorcontrib><creatorcontrib>Singh, Rajesh</creatorcontrib><creatorcontrib>Gehlot, Anita</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Alshamrani, Sultan S.</creatorcontrib><creatorcontrib>AlGhamdi, Ahmed Saeed</creatorcontrib><creatorcontrib>Alshehri, Abdullah</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dhiman, Pooja</au><au>Henge, Santosh Kumar</au><au>Ramalingam, Rajakumar</au><au>Dumka, Ankur</au><au>Singh, Rajesh</au><au>Gehlot, Anita</au><au>Rashid, Mamoon</au><au>Alshamrani, Sultan S.</au><au>AlGhamdi, Ahmed Saeed</au><au>Alshehri, Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-07-01</date><risdate>2022</risdate><volume>11</volume><issue>13</issue><spage>1942</spage><pages>1942-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Authentication, authorization, and data access control are playing major roles in data security and privacy. The proposed model integrated the multi-factor authentication–authorization process with dependable and non-dependable factors and parameters based on providing security for tenants through a hybrid approach of fully homomorphic encryption methodology: the enhanced homomorphic cryptosystem (EHC) and the Brakersky–Gentry–Vaikuntanathan (BGV) scheme. This research was composed of four major elements: the fully homomorphic encryption blended schemes, EHC and BGV; secure token and key implications based on dependable and don-dependable factors; an algorithm for generating the tokens and the suitable keys, depending on the user’s role; and the execution of experimental test cases by using the EHC algorithm for key and token generation, based on dependable and non-dependable parameters and time periods. The proposed approach was tested with 152 end-users by integrating six multi-tenants, five head tenants, and two enterprise levels; and achieved a 92 percent success rate. The research integrated 32-bit plain text in the proposed hybrid approach by taking into consideration the encryption time, decryption time, and key generation time of data transmission via cloud servers. The proposed blended model was efficient in preventing data from ciphertext attacks and achieved a high success rate for transmitting data between the multi-tenants, based on the user-role-user type of enterprise cloud servers.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11131942</doi><orcidid>https://orcid.org/0000-0002-9165-7600</orcidid><orcidid>https://orcid.org/0000-0001-6463-9581</orcidid><orcidid>https://orcid.org/0000-0003-1884-9945</orcidid><orcidid>https://orcid.org/0000-0002-3164-8905</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-0008-9394</orcidid><orcidid>https://orcid.org/0000-0002-0734-3423</orcidid><orcidid>https://orcid.org/0000-0002-9353-6159</orcidid><orcidid>https://orcid.org/0000-0001-8194-9354</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2022-07, Vol.11 (13), p.1942
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2686184027
source MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals
subjects Access control
Algorithms
Authentication
Data encryption
Data security
Data transmission
Encryption
Mathematical models
Medical research
Methods
Parameters
Privacy
Tenants
title Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T04%3A06%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Token%E2%80%93Key%20Implications%20in%20an%20Enterprise%20Multi-Tenancy%20Environment%20Using%20BGV%E2%80%93EHC%20Hybrid%20Homomorphic%20Encryption&rft.jtitle=Electronics%20(Basel)&rft.au=Dhiman,%20Pooja&rft.date=2022-07-01&rft.volume=11&rft.issue=13&rft.spage=1942&rft.pages=1942-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11131942&rft_dat=%3Cgale_proqu%3EA723418552%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2686184027&rft_id=info:pmid/&rft_galeid=A723418552&rfr_iscdi=true