EconPapers    
Economics at your fingertips  
 

Blockchain-Assisted Access Control with Shuffled Shepherd Fire Hawk Optimisation-Key Generation for Privacy Protection in Cloud

Vitthal Sadashiv Gutte, Yogita Hande (), Sarika Tanaji Deokate (), Poonam Chandrakant Bhosale () and Yogesh R. Kulkarni ()
Additional contact information
Vitthal Sadashiv Gutte: School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT-World Peace University, S. No. 124, Paud Road, Kothrud, Pune, Maharashtra 411038, India
Yogita Hande: School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT-World Peace University, S. No. 124, Paud Road, Kothrud, Pune, Maharashtra 411038, India
Sarika Tanaji Deokate: ��Department of Computer Engineering, Pimpri Chinchwad College of Engineering, Pune, Sector 26, Pradhikaran, Nigdi, Near Akurdi Railway Station, Pune 411044, Maharashtra 411038, India
Poonam Chandrakant Bhosale: School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT-World Peace University, S. No. 124, Paud Road, Kothrud, Pune, Maharashtra 411038, India
Yogesh R. Kulkarni: School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT-World Peace University, S. No. 124, Paud Road, Kothrud, Pune, Maharashtra 411038, India

Journal of Information & Knowledge Management (JIKM), 2024, vol. 23, issue 03, 1-30

Abstract: Cloud is a model of computing providing on-demand availability of computer system resources, mainly data storage and computing power, without the user’s active management. This provides sharing and reduces user computing and storage costs. With the development of cloud scale and intensification, cloud security is becoming a vital issue in the cloud computing field. Here, a newly optimised hybridisation algorithm, namely, Shuffled Shepherd Fire Hawk Optimization (SSFHO) algorithm is proposed for key generation to initiate privacy protection in the cloud. The different entities involved in this approach are Data Owner (DO), Data User (DU), blockchain, and Cloud Service Provider (CSP). Here, the access control process includes seven categories, such as initialisation, registration, generation of key, data access control, authorisation, authorisation revocation and data protection. Also, registration is done in three phases, like registration of cloud, registration of user and resource publishing. Moreover, SSFHO is the integration among Shuffled Shepherd Optimization Algorithm (SSOA) and Fire Hawk Optimization (FHO) algorithm. The performance of the model is done with various performance metrics like, authorisation time, privacy rate, and memory. These revealed high values of privacy rate of 0.93, low values of authorisation time and memory of 0.559 and 0.843 GHz.

Keywords: Privacy protection; data owner (DO); Fire Hawk Optimization (FHO); data user (DU); Shuffled Shepherd Optimization Algorithm (SSOA) (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.worldscientific.com/doi/abs/10.1142/S021964922450014X
Access to full text is restricted to subscribers

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:wsi:jikmxx:v:23:y:2024:i:03:n:s021964922450014x

Ordering information: This journal article can be ordered from

DOI: 10.1142/S021964922450014X

Access Statistics for this article

Journal of Information & Knowledge Management (JIKM) is currently edited by Professor Suliman Hawamdeh

More articles in Journal of Information & Knowledge Management (JIKM) from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().

 
Page updated 2025-03-20
Handle: RePEc:wsi:jikmxx:v:23:y:2024:i:03:n:s021964922450014x