A Hybrid Key Management Approach for enhancing Data Sharing Security with Insider Threat Detection

Hrushikesava Raju S.,Sesadri U,Thulasi Krishna S.,Selvam K.,Balaji V.,Gunikhan Sonowal
DOI: https://doi.org/10.61552/jsi.2024.02.005
2024-01-01
Abstract:The secure sharing of group data in cloud environments poses challenges, particularly when attempting to identify individuals engaging in fraudulent behaviors. While existing studies have touched upon this issue, this research introduces a novel key management strategy that prioritizes crucial features such as performance, accuracy, and trustworthiness. In the context of cloud data sharing, several key points are considered, including the precise assignment of privileges to groups, the tracking of reports containing sensitive user information, the monitoring of user or group misconduct using an innovative key management technique, and timely alerting of the cloud owner. The proposed novel key management technique adopts a level-wise authorization process, diligently recording all actions based on the rights assigned to perform specific tasks. Performance, accuracy, and trustworthiness metrics are then evaluated against a set of well-defined strategies, and the results are effectively visualized. The efficiency of this approach is assessed and visualized in results. This ensures the approach's robustness and suitability for various cloud environments. By addressing the challenges associated with identifying misbehaving attitudes in cloud settings, an efficient and trustworthy key management system is ensured. The proposed approach enhances data security and the integrity of information sharing in the cloud, benefiting individual users and businesses alike. Ultimately, this innovative solution contributes to creating a safer and more reliable cloud computing environment, fostering seamless collaboration and information sharing among users while safeguarding their valuable data.
What problem does this paper attempt to address?