Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
-
Published:2023-02-28
Issue:5
Volume:13
Page:3142
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Affiliation:
1. Computer Science Department, College of Computer Sciences & Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia 2. Mathematics Department, Faculty of Science, Zagazig University, Zagazig 44519, Egypt
Abstract
To increase the usage of renewable energy, it is vital to maximize local energy production by properly combining various renewable-energy sources by collecting their data and storing it on the cloud. The energy optimization utility, which is used for making decisions to optimize renewable-energy resources, is hosted on the cloud to benefit from cloud capabilities in data storage. Hosting such sensitive data and utilities on the cloud has created some cybersecurity challenges. This paper presents a new token-revocation access control (TR-AC) which revokes the authorization of malicious users before authorizing them to access cloud-hosted energy optimization utilities. TR-AC employs a set of multi-authorities to measure the authentic level for each authenticated user. Although the user is authenticated to access the online system, this authentication can be revoked to utilize the energy optimization utility based on the user’s level of authentication. The cloud storage servers are not fully trusted and, therefore, have no control over access controls. Finally, the proposed TR-AC has been proven to be secure against any attacker that is not authentic according to Diffie-Hellman assumptions. In addition, performance analysis has proven that the time elapsed for both encryption and decryption in TR-AC is very small compared with previously introduced schemes. Therefore, it will not affect the performance of the cloud-hosted system.
Funder
Institutional Funding track by the Vice Presidency for Graduate Studies and Scientific Research, King Faisal University, Ministry of Education, Saudi Arabia
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference25 articles.
1. Basarudin, N.A., Yeon, A.L., and Yusoff, Z.M. (2022). Good Governance and the Sustainable Development Goals in Southeast Asia, Routledge. 2. Prospects and challenges of renewable energy-based microgrid system in Bangladesh: A comprehensive review;Mojumder;Clean Technol. Environ. Policy,2022 3. Raimundo, R.J., and Rosário, A.T. (2022). Cybersecurity in the Internet of Things in Industrial Management. Appl. Sci., 12. 4. Fagbola, F.I., and Venter, H.S. (2022). Smart digital forensic readiness model for shadow IoT devices. Appl. Sci., 12. 5. Vangala, A., Das, A.K., Chamola, V., Korotaev, V., and Rodrigues, J.J. (2022). Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges. Clust. Comput., 1–24.
|
|