Privacy preserving model-based authentication and data security in cloud computing

被引:5
|
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, Belagavi, India
[2] Govt Coll Engn & Res, Comp Engn, Avasari, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi, India
关键词
Authentication; Privacy preservation; Security; Encryption; Decryption;
D O I
10.1108/IJPCC-11-2020-0193
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.
引用
收藏
页码:173 / 190
页数:18
相关论文
共 50 条
  • [31] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [32] Security and privacy aware data aggregation on cloud computing
    Silva, Leandro V.
    Barbosa, Pedro
    Marinho, Rodolfo
    Brito, Andrey
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9
  • [33] Evaluation of The faults of Data Security and Privacy in the Cloud Computing
    Waleed, Al-Museelem
    Li Chunlin
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1838 - 1843
  • [34] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [35] Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing
    Ramaiah, Y. Govinda
    Kumari, G. Vijaya
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1559 - 1566
  • [36] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [37] A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing
    Ushida, Mebae
    Itoh, Kouichi
    Katayama, Yoshinori
    Kozakura, Fumihiko
    Tsuda, Hiroshi
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 141 - 148
  • [38] PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing
    Li, Ji
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [39] Privacy Based Data Publishing Model for Cloud Computing Environment
    Bibal Benifa, J. V.
    Venifa Mini, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 2215 - 2241
  • [40] Privacy Based Data Publishing Model for Cloud Computing Environment
    J. V. Bibal Benifa
    G. Venifa Mini
    Wireless Personal Communications, 2020, 113 : 2215 - 2241