Privacy preserving model-based authentication and data security in cloud computing

被引:5
|
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, Belagavi, India
[2] Govt Coll Engn & Res, Comp Engn, Avasari, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi, India
关键词
Authentication; Privacy preservation; Security; Encryption; Decryption;
D O I
10.1108/IJPCC-11-2020-0193
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.
引用
收藏
页码:173 / 190
页数:18
相关论文
共 50 条
  • [1] PRIVACY PRESERVING FOR DATA STORAGE SECURITY IN HOSPITAL CLOUD COMPUTING
    Wang, Y. R.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 106 - 107
  • [2] Study of Data Security and Privacy Preserving Solutions in Cloud Computing
    Choubey, Siddharth Dutt
    Namdeo, Mohit Kumar
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1101 - 1106
  • [3] Data Security and Authentication in Hybrid Cloud Computing Model
    Wang, Jingxin K.
    Jia, Xinpei
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [4] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [5] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [6] Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
    Liu, Hong
    Ning, Huansheng
    Xiong, Qingxu
    Yang, Laurence T.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) : 241 - 251
  • [7] Privacy preserving steganography based biometric authentication system for cloud computing environment
    Prabhu D.
    Vijay Bhanu S.
    Suthir S.
    Measurement: Sensors, 2022, 24
  • [8] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [9] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [10] Privacy preserving security using biometrics in cloud computing
    Kumar, Santosh
    Singh, Sanjay Kumar
    Singh, Amit Kumar
    Tiwari, Shrikant
    Singh, Ravi Shankar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11017 - 11039