Privacy preserving model-based authentication and data security in cloud computing

被引:5
|
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, Belagavi, India
[2] Govt Coll Engn & Res, Comp Engn, Avasari, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi, India
关键词
Authentication; Privacy preservation; Security; Encryption; Decryption;
D O I
10.1108/IJPCC-11-2020-0193
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.
引用
收藏
页码:173 / 190
页数:18
相关论文
共 50 条
  • [21] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [22] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [23] A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography
    Al Hamid, Hadeal Abdulaziz
    Rahman, Sk Md Mizanur
    Hossain, M. Shamim
    Almogren, Ahmad
    Alamri, Atif
    IEEE ACCESS, 2017, 5 : 22313 - 22328
  • [24] Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security
    Subha, T.
    Jayashri, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 55 - 60
  • [25] Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 387 - 397
  • [26] Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 259 - 266
  • [27] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [28] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong L.
    Peng D.
    Peng T.
    Liang H.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [29] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [30] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651