{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T17:53:18Z","timestamp":1767203598655,"version":"build-2238731810"},"reference-count":95,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["Network"],"abstract":"<jats:p>Cloud computing has witnessed rapid growth and notable technological progress in recent years. Nevertheless, it is still regarded as being in its early developmental phase, with substantial potential remaining to be explored\u2014particularly through integration with emerging technologies such as the Metaverse, Augmented Reality (AR), and Virtual Reality (VR). As the number of service users increases, so does the demand for computational resources, leading data owners to outsource processing tasks to remote cloud servers. The internet-based delivery of cloud computing services consequently expands the attack surface and impacts the trust relationship between the service user and the service provider. To address these challenges, this study proposes a restricted access control framework based on homomorphic encryption (HE) and identity-based encryption (IBE) mechanisms. A formal analysis of the proposed model is also conducted under an unauthenticated communication model. Simulation results indicate that the proposed approach achieves a 20\u201340% reduction in encryption and decryption times, respectively, compared with existing state-of-the-art homomorphic encryption schemes. The simulation was performed using a 2048-bit key and data size, consistent with current industry standards, to improve key management efficiency. Additionally, the role-based hierarchy was implemented in a Salesforce cloud environment to ensure secure and restricted access control.<\/jats:p>","DOI":"10.3390\/network5020019","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T05:54:05Z","timestamp":1749448445000},"page":"19","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control"],"prefix":"10.3390","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0419-4530","authenticated-orcid":false,"given":"Urvashi Rahul","family":"Saxena","sequence":"first","affiliation":[{"name":"School of IT and Engineering (SITE), Melbourne Institute of Technology (MIT), 288 La Trobe Street, Melbourne, VIC 3000, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9207-2148","authenticated-orcid":false,"given":"Rajan","family":"Kadel","sequence":"additional","affiliation":[{"name":"School of IT and Engineering (SITE), Melbourne Institute of Technology (MIT), 288 La Trobe Street, Melbourne, VIC 3000, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"ref_1","unstructured":"Drapkin, A. (2023). Data Breaches That Have Happened in 2022 and 2023 So Far, Tech.co."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bassett, G., Hylender, C.D., Langlois, P., Pinto, A., and Widup, S. (2021). Data Breach Investigations Report, Verizon Business.","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"42644","DOI":"10.1109\/ACCESS.2023.3270619","article-title":"A Novel Digital Forensic Framework for Data Breach Investigation","volume":"11","author":"Hakim","year":"2023","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"IBM Security (2021). Cost of a Data Breach Report, IBM Corporation. Available online: https:\/\/www.ibm.com\/reports\/data-breach.","DOI":"10.1016\/S1361-3723(21)00082-8"},{"key":"ref_5","unstructured":"IBM Security (2024). Identity Comes Under Attack, Straining Enterprises Recovery Time from Breaches, IBM Corporation. Available online: https:\/\/newsroom.ibm.com\/2024-02-21-IBM-Report-Identity-Comes-Under-Attack,-Straining-Enterprises-Recovery-Time-from-Breaches."},{"key":"ref_6","first-page":"11","article-title":"Cybercrime to Cost the World $10.5 Trillion Annually by 2025","volume":"13","author":"Morgan","year":"2020","journal-title":"Cybercrime Mag."},{"key":"ref_7","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hong, M.Q., Wang, P.Y., and Zhao, W.B. (2016, January 9\u201310). Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing. Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.51"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., and Lou, W. (2010, January 14\u201319). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the 2010 IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Ma, D., Hu, C.J., and Huang, D. (2013, January 8). How to use attribute-based encryption to implement role-based access control in the cloud. Proceedings of the 2013 International Workshop on Security in Cloud Computing, Hangzhou, China.","DOI":"10.1145\/2484402.2484411"},{"key":"ref_11","first-page":"65","article-title":"Multi-tenant attribute-based access control for cloud infrastructure services","volume":"27","author":"Ngo","year":"2016","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1361-3723(20)30052-X","article-title":"A multi-cloud world requires a multi-cloud security approach","volume":"2020","author":"Duncan","year":"2020","journal-title":"Comput. Fraud. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(18)30023-0","article-title":"How a zero-trust approach can help to secure your AWS environment","volume":"2018","author":"Scott","year":"2018","journal-title":"Netw. Secur."},{"key":"ref_14","unstructured":"Jain, P., and Lu, E. (2025, April 05). Identity and Access Management-Introducing Oracle Universal Authenticator for Secure and Seamless Access. Available online: https:\/\/www.oracle.com\/au\/security\/identity-management\/access-management\/."},{"key":"ref_15","unstructured":"Ritcher, F. (2025, April 09). Cloud Infrastructure Market. Available online: https:\/\/www.statista.com\/chart\/18819\/worldwide-market-share-of-leading-cloud-infrastructure-service-providers."},{"key":"ref_16","unstructured":"Gunda, S. (2025, March 22). Azure Synapse Analytics Security White Paper: Access Control\u2014Azure Synapse Analytics. Available online: https:\/\/learn.microsoft.com\/en-us\/azure\/synapse-analytics\/guidance\/security-white-paper-access-control#synapse-role-based-access-control."},{"key":"ref_17","unstructured":"Amazon Web Services, Inc (2025, May 30). AWS Whitepapers & Guides. Available online: https:\/\/aws.amazon.com\/whitepapers."},{"key":"ref_18","unstructured":"Microsoft (2023). What Is Identity and Access Management (IAM)?, Microsoft Corporation. Available online: https:\/\/www.microsoft.com\/en-au\/security\/business\/security-101\/what-is-identity-access-management-iam."},{"key":"ref_19","unstructured":"Google Cloud (2025, April 07). Google Cloud Whitepapers. Available online: https:\/\/cloud.google.com."},{"key":"ref_20","unstructured":"Google Cloud (2025, April 04). Identity and Access Management Documentation. Available online: https:\/\/cloud.google.com\/iam\/docs."},{"key":"ref_21","unstructured":"IBM Security (2023). Cost of a Data Breach, IBM Corp.. Available online: https:\/\/www.ibm.com\/reports\/data-breach."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.conengprac.2017.07.004","article-title":"Secure and private control using semi-homomorphic encryption","volume":"67","author":"Farokhi","year":"2017","journal-title":"Control Eng. Pract."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wei, Z. (2020). A Pairing-Based Homomorphic Encryption Scheme for Multi-User Settings. Cryptography: Breakthroughs in Research and Practice, IGI Global.","DOI":"10.4018\/978-1-7998-1763-5.ch017"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4931","DOI":"10.1016\/j.jksuci.2021.06.014","article-title":"Cloud-based private data analytic using secure computation over encrypted data","volume":"34","author":"Zaraket","year":"2022","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., and Song, Y. (2017, January 3\u20137). Homomorphic encryption for arithmetic of approximate numbers. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1250295","DOI":"10.1155\/2020\/1250295","article-title":"An Efficient Encrypted Floating\u2014Point Representation Using HEAAN and TFHE","volume":"2020","author":"Moon","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3620","DOI":"10.1007\/s11227-016-1796-6","article-title":"Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data","volume":"74","author":"Youn","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1007\/s12652-018-1093-8","article-title":"LR-HIDS: Logistic Regression Host-Based Intrusion Detection System for Cloud Environments","volume":"10","author":"Besharati","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/s11390-011-1169-9","article-title":"Provably Secure Role-Based Encryption with Revocation Mechanism","volume":"26","author":"Zhu","year":"2011","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S., De Capitani di Vimercati, S., De Santis, A., Foresti, S., Paraboschi, S., and Samarati, P. (2009). Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. Emerging Challenges for Security, Privacy and Trust\u2014Proceedings of the 24th IFIP TC 11 International Information Security Conference (SEC 2009), Pafos, Cyprus, 18\u201320 May 2009, Springer.","DOI":"10.1007\/978-3-642-01244-0_32"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s11277-021-08889-z","article-title":"An ADS-PAYG Approach Using Trust Factor Against Economic Denial of Sustainability Attacks in Cloud Storage","volume":"122","author":"Karthika","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.1109\/TIFS.2015.2455952","article-title":"Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage","volume":"10","author":"Zhou","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TPDS.2018.2870652","article-title":"A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud","volume":"30","author":"Ghafoorian","year":"2018","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_34","first-page":"2934","article-title":"Trust Management in E-Commerce Websites","volume":"4","author":"Mahajan","year":"2017","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TPDS.2015.2408613","article-title":"CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services","volume":"27","author":"Noor","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"27","DOI":"10.63180\/jcsra.thestap.2025.2.3","article-title":"Classification of threats and countermeasures of cloud computing","volume":"2","author":"Almanasir","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"12","DOI":"10.63180\/jcsra.thestap.2025.2.2","article-title":"Analyzing cybersecurity risks and threats in IT infrastructure based on NIST framework","volume":"2","author":"Aljumaiah","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.63180\/jcsra.thestap.2025.1.1","article-title":"Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions","volume":"1","author":"Almuqren","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"36","DOI":"10.63180\/jcsra.thestap.2025.1.4","article-title":"Machine learning for cybersecurity issues: A systematic review","volume":"1","author":"Alshuaibi","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"47","DOI":"10.63180\/jcsra.thestap.2025.1.5","article-title":"Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks","volume":"1","author":"Alotaibi","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Uikey, C., and Bhilare, D.S. (2017, January 17\u201319). TrustRBAC: Trust Role-Based Access Control Model in Multi-Domain Cloud Environments. Proceedings of the 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), Indore, India.","DOI":"10.1109\/ICOMICON.2017.8279087"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Verizon (2021). Data Breach Investigations Report, Verizon Enterprise Solutions. Available online: http:\/\/www.verizonbusiness.com\/resources\/security\/data_breach_report.pdf.","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"ref_43","first-page":"113","article-title":"Digital Transformation of Business-to-Business Sales: What Needs to Be Unlearned?","volume":"41","author":"Mattila","year":"2021","journal-title":"J. Pers. Sell. Sales Manag."},{"key":"ref_44","unstructured":"Bulao, J. (2025, April 05). How Many Companies Use Cloud Computing in 2022?. All You Need To Know., Available online: https:\/\/techjury.net\/blog\/how-many-companies-use-cloud-computing\/#gref."},{"key":"ref_45","first-page":"332","article-title":"Differential Cryptanalysis","volume":"24","author":"Biham","year":"2011","journal-title":"J. Cryptol."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. (2002). The Design of Rijndael, Springer-Verlag.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"ref_47","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme, Stanford University."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient Fully Homomorphic Encryption from (Standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., and Vaikuntanathan, V. (2011, January 14\u201318). Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","article-title":"Evaluating 2-DNF Formulas on Ciphertexts","volume":"Volume 2","author":"Boneh","year":"2005","journal-title":"Proceedings of the 2nd Theory of Cryptography Conference (TCC 2005)"},{"key":"ref_51","first-page":"315","article-title":"Batch Fully Homomorphic Encryption over the Integers","volume":"Volume 32","author":"Cheon","year":"2013","journal-title":"Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques\u2014EUROCRYPT 2013"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Lee, H.T., and Seo, J.H. (2014, January 3\u20137). A New Additive Homomorphic Encryption Based on the Co-ACD Problem. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660335"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Coron, J.S., Mandal, A., Naccache, D., and Tibouchi, M. (2011, January 14\u201318). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Coron, J.S., Naccache, D., and Tibouchi, M. (2012, January 15\u201319). Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2012), Cambridge, UK.","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Van Dijk, M., Gentry, C., Halevi, S., and Vaikuntanathan, V. (June, January 30). Fully Homomorphic Encryption over the Integers. Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France.","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Gentry, C. (June, January 31). Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC 2009), Bethesda, MD, USA.","DOI":"10.1145\/1536414.1536440"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Gentry, C., and Halevi, S. (2011, January 15\u201319). Implementing Gentry\u2019s Fully-Homomorphic Encryption Scheme. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2011), Tallinn, Estonia.","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S., and Smart, N.P. (2012, January 15\u201319). Fully Homomorphic Encryption with Polylog Overhead. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2012), Cambridge, UK.","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S., and Vaikuntanathan, V. (June, January 30). A Simple BGN-Type Cryptosystem from LWE. Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France.","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Aftab, M.U., Qin, Z., Quadri, S.F., Javed, A., and Nie, X. (2019, January 19\u201321). Role-Based ABAC Model for Implementing Least Privileges. Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA 2019), Penang, Malaysia.","DOI":"10.1145\/3316615.3316667"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.future.2020.10.021","article-title":"Cryptographic Framework for Role Control Remedy: A Secure Role Engineering Mechanism for Single Authority Organizations","volume":"117","author":"Rashid","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Ragothaman, K., Wang, Y., Rimal, B., and Lawrence, M. (2023). Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions. Sensors, 23.","DOI":"10.3390\/s23041805"},{"key":"ref_63","first-page":"102421","article-title":"Implementation and Practical Problems of Chaos-Based Cryptography Revisited","volume":"50","author":"Teh","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1093\/comjnl\/bxr080","article-title":"Enforcing role-based access control for secure data storage in the cloud","volume":"54","author":"Zhou","year":"2011","journal-title":"Comput. J."},{"key":"ref_65","first-page":"837","article-title":"Enhanced role-based access control for cloud security","volume":"Volume 1","author":"Balamurugan","year":"2015","journal-title":"Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/TSC.2022.3194252","article-title":"A role-based encryption (RBE) scheme for securing outsourced cloud data in a multi-organization context","volume":"16","author":"Sultan","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1007\/s00500-015-1715-4","article-title":"A trusted user-to-role and role-to-key access control scheme","volume":"20","author":"Chen","year":"2016","journal-title":"Soft Comput."},{"key":"ref_68","unstructured":"Zhou, X., Liu, J., Liu, W., and Wu, Q. (June, January 30). Anonymous role-based access control on e-health records. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (AsiaCCS \u201916), Xi\u2019an, China."},{"key":"ref_69","first-page":"105","article-title":"The ARBAC97 model for role-based administration of roles. ACM Trans","volume":"2","author":"Sandhu","year":"1999","journal-title":"Inf. Syst. Secur."},{"key":"ref_70","unstructured":"Sandhu, R., and Munawer, Q. (1999, January 6\u201310). The ARBAC99 model for administration of roles. Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC\u201999), Phoenix, AZ, USA."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Oh, S., and Sandhu, R. (2002, January 3\u20134). A model for role administration using organization structure. Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT \u201802), Monterey, CA, USA.","DOI":"10.1145\/507735.507737"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/1151414.1151415","article-title":"An effective role administration model using organization structure","volume":"9","author":"Oh","year":"2006","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Crampton, J. (2002, January 3\u20134). Administrative scope and role hierarchy operations. Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey, CA, USA.","DOI":"10.1145\/507735.507736"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/357369.357372","article-title":"Cryptographic solution to a problem of access control in a hierarchy","volume":"1","author":"Akl","year":"1983","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Miklau, G., and Suciu, D. (2003, January 9\u201312). Controlling access to published data using cryptography. Proceedings of the 2003 VLDB Conference, Berlin, Germany.","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., and Samarati, P. (2007, January 2). A data outsourcing architecture combining cryptography and access control. Proceedings of the 2007 ACM Workshop on Computer Security Architecture (CSAW 2007), Fairfax, VA, USA.","DOI":"10.1145\/1314466.1314477"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"3197","DOI":"10.1016\/j.comnet.2006.12.011","article-title":"Key management for content access control in a hierarchy","volume":"51","author":"Hassen","year":"2007","journal-title":"Comput. Netw."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Blanton, M., and Frikken, K.B. (2006, January 7\u20139). Key Management for Non-Tree Access Hierarchies. Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT \u201906), Lake Tahoe, CA, USA.","DOI":"10.1145\/1133058.1133062"},{"key":"ref_79","unstructured":"Gentry, C., and Silverberg, A. (2002, January 1\u20135). Hierarchical ID-based cryptography. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand. Proceedings 8."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., and Goh, E.J. (2005, January 22\u201326). Hierarchical identity-based encryption with constant size ciphertext. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.","DOI":"10.1007\/11426639_26"},{"key":"ref_81","unstructured":"Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., and Samarati, P. (2007, January 23\u201327). Over-encryption: Management of access control evolution on outsourced data. Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Teli, T.A., Masoodi, F.S., and Bahmdi, A.M. (2021). HIBE: Hierarchical Identity-Based Encryption. Functional Encryption, Springer International Publishing.","DOI":"10.1007\/978-3-030-60890-3_11"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1455526.1455531","article-title":"Dynamic and efficient key management for access hierarchies","volume":"12","author":"Atallah","year":"2009","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"110320","DOI":"10.1016\/j.ress.2024.110320","article-title":"Integrated management of safety and security barriers in chemical plants to cope with emerging cyber-physical attack risks under uncertainties","volume":"250","author":"Yuan","year":"2024","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"107920","DOI":"10.1016\/j.ress.2021.107920","article-title":"Security and reliability of N-version cloud-based task solvers with individual version cancellation under data theft attacks","volume":"216","author":"Levitin","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1007\/s13198-023-01896-2","article-title":"Role-based access using partial homomorphic encryption for securing cloud data","volume":"14","author":"Saxena","year":"2023","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11416-021-00402-1","article-title":"Role based access control using identity and broadcast-based encryption for securing cloud data","volume":"18","author":"Saxena","year":"2022","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.1007\/s13198-023-02112-x","article-title":"Provisioning trust-oriented role-based access control for maintaining data integrity in cloud","volume":"14","author":"Saxena","year":"2023","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s11761-023-00377-5","article-title":"Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems","volume":"17","author":"Saxena","year":"2023","journal-title":"Serv. Orient. Comput. Appl."},{"key":"ref_90","unstructured":"Saxena, U.R., and Alam, T. (2022, January 6\u20137). Modified identify and broadcast-based encryption scheme to secure cloud. Proceedings of the 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), Agra, India."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"3","DOI":"10.12968\/S1353-4858(22)70029-3","article-title":"Ransomware\u2013One of the Biggest Threats Facing Enterprises Today","volume":"2022","author":"Grillenmeier","year":"2022","journal-title":"Netw. Secur."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"2205","DOI":"10.1007\/s12652-019-01366-3","article-title":"Fast Cloud\u2013Paillier Homomorphic Schemes for Protecting Confidentiality of Sensitive Data in Cloud Computing","volume":"11","author":"Ezzati","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_93","first-page":"1063","article-title":"Secure Keyword Search Using Dual Encryption in Cloud Computing","volume":"12","author":"Tariq","year":"2020","journal-title":"Int. J. Inf. Technol."},{"key":"ref_94","unstructured":"Erickson, J. (2025, April 05). Prediction: 80% of Enterprise IT Will Move to the Cloud by 2025. Available online: https:\/\/www.forbes.com\/sites\/oracle\/2019\/02\/07\/prediction-80-of-enterprise-it-will-move-to-the-cloud-by-2025\/?sh=91d331e2a676."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Canetti, R., and Krawczyk, H. (2001). Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. Advances in Cryptology\u2014EUROCRYPT 2001, Springer.","DOI":"10.1007\/3-540-44987-6_28"}],"updated-by":[{"DOI":"10.3390\/network5030031","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000}}],"container-title":["Network"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2673-8732\/5\/2\/19\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T12:27:21Z","timestamp":1755606441000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2673-8732\/5\/2\/19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":95,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["network5020019"],"URL":"https:\/\/doi.org\/10.3390\/network5020019","relation":{},"ISSN":["2673-8732"],"issn-type":[{"value":"2673-8732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,9]]}}}