Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability

To increase the usage of renewable energy, it is vital to maximize local energy production by properly combining various renewable-energy sources by collecting their data and storing it on the cloud. The energy optimization utility, which is used for making decisions to optimize renewable-energy res...

Full description

Bibliographic Details
Main Author: Khaled Riad
Format: Article
Language:English
Published: MDPI AG 2023-02-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/5/3142
_version_ 1797615735253499904
author Khaled Riad
author_facet Khaled Riad
author_sort Khaled Riad
collection DOAJ
description To increase the usage of renewable energy, it is vital to maximize local energy production by properly combining various renewable-energy sources by collecting their data and storing it on the cloud. The energy optimization utility, which is used for making decisions to optimize renewable-energy resources, is hosted on the cloud to benefit from cloud capabilities in data storage. Hosting such sensitive data and utilities on the cloud has created some cybersecurity challenges. This paper presents a new token-revocation access control (TR-AC) which revokes the authorization of malicious users before authorizing them to access cloud-hosted energy optimization utilities. TR-AC employs a set of multi-authorities to measure the authentic level for each authenticated user. Although the user is authenticated to access the online system, this authentication can be revoked to utilize the energy optimization utility based on the user’s level of authentication. The cloud storage servers are not fully trusted and, therefore, have no control over access controls. Finally, the proposed TR-AC has been proven to be secure against any attacker that is not authentic according to Diffie-Hellman assumptions. In addition, performance analysis has proven that the time elapsed for both encryption and decryption in TR-AC is very small compared with previously introduced schemes. Therefore, it will not affect the performance of the cloud-hosted system.
first_indexed 2024-03-11T07:30:53Z
format Article
id doaj.art-93a6e00489b040f28dec38b77c1c8d4f
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T07:30:53Z
publishDate 2023-02-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-93a6e00489b040f28dec38b77c1c8d4f2023-11-17T07:19:47ZengMDPI AGApplied Sciences2076-34172023-02-01135314210.3390/app13053142Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental SustainabilityKhaled Riad0Computer Science Department, College of Computer Sciences & Information Technology, King Faisal University, Al-Ahsa 31982, Saudi ArabiaTo increase the usage of renewable energy, it is vital to maximize local energy production by properly combining various renewable-energy sources by collecting their data and storing it on the cloud. The energy optimization utility, which is used for making decisions to optimize renewable-energy resources, is hosted on the cloud to benefit from cloud capabilities in data storage. Hosting such sensitive data and utilities on the cloud has created some cybersecurity challenges. This paper presents a new token-revocation access control (TR-AC) which revokes the authorization of malicious users before authorizing them to access cloud-hosted energy optimization utilities. TR-AC employs a set of multi-authorities to measure the authentic level for each authenticated user. Although the user is authenticated to access the online system, this authentication can be revoked to utilize the energy optimization utility based on the user’s level of authentication. The cloud storage servers are not fully trusted and, therefore, have no control over access controls. Finally, the proposed TR-AC has been proven to be secure against any attacker that is not authentic according to Diffie-Hellman assumptions. In addition, performance analysis has proven that the time elapsed for both encryption and decryption in TR-AC is very small compared with previously introduced schemes. Therefore, it will not affect the performance of the cloud-hosted system.https://www.mdpi.com/2076-3417/13/5/3142access controlenergy optimization utilityenvironmental sustainabilitycloud securityuser revocation
spellingShingle Khaled Riad
Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
Applied Sciences
access control
energy optimization utility
environmental sustainability
cloud security
user revocation
title Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
title_full Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
title_fullStr Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
title_full_unstemmed Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
title_short Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability
title_sort token revocation access control to cloud hosted energy optimization utility for environmental sustainability
topic access control
energy optimization utility
environmental sustainability
cloud security
user revocation
url https://www.mdpi.com/2076-3417/13/5/3142
work_keys_str_mv AT khaledriad tokenrevocationaccesscontroltocloudhostedenergyoptimizationutilityforenvironmentalsustainability