Privacy preserving model-based authentication and data security in cloud computing

被引:5
|
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, Belagavi, India
[2] Govt Coll Engn & Res, Comp Engn, Avasari, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi, India
关键词
Authentication; Privacy preservation; Security; Encryption; Decryption;
D O I
10.1108/IJPCC-11-2020-0193
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.
引用
收藏
页码:173 / 190
页数:18
相关论文
共 50 条
  • [41] ALP: An Authentication and Leak Prediction Model for Cloud Computing Privacy
    Farhatullah, Mohammad
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 48 - 51
  • [42] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [43] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [44] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [45] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [46] An Efficient Model for Privacy and Security in Mobile Cloud Computing
    Ragini
    Mehrotra, Parul
    Venkatesan, S.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [47] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [48] Privacy Preserving Approaches In Cloud Computing
    Karthiban, K.
    Smys, S.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 462 - 467
  • [49] Providing Privacy Preserving in Cloud Computing
    Wang, Jian
    Zhao, Yan
    Jiang, Shuo
    Le, Jiajin
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 472 - 475
  • [50] Privacy preserving in cloud computing environment
    Zou, Deqing
    Xiang, Yang
    Min, Geyong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2752 - 2753