Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment

被引:0
|
作者
Benifa, J. V. Bibal [1 ]
Mini, G. Venifa [2 ]
机构
[1] Indian Inst Informat Technol, Kottayam, Kerala, India
[2] Noorul Islam Ctr Higher Educ, Kumaracoil, Tamil Nadu, India
关键词
Access control mechanism; Chebyshev polynomial; Elliptic curve cryptography; Cloud infrastructure; AUTHENTICATION SCHEME; PROVABLY SECURE; PASSWORD AUTHENTICATION; OUTSOURCED DATA; KEY AGREEMENT; EFFICIENT; PROTOCOL; INTERNET; SERVICE;
D O I
10.1007/s11761-020-00307-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a popular model for offering infinite storage resources for the users. In the present scenario, extremely sensitive data is stored in the third-party cloud service provider's infrastructure. For instance, patients who have direct access to the healthcare system may access the cloud-based health care data at any time based on the needs. Such sensitive data is subjected to various security issues because of the entities from multiple hosts connecting to cloud storage. In the proposed work, an optimized secured data access control mechanism named as modified Chebyshev polynomial-based access control (MCPAC) is presented. In MCPAC scheme, multiple levels of verification and authentications are carried out to provide resilience against widely recognized attacks. The proposed access control scheme is evaluated in a real private cloud infrastructure using the metrics, such as precision, recall and detection rate. It is proved that the proposed MCPAC offers better privacy protection with the precision of 0.8947, recall of 0.8983, and detection rate of 85.63%, which is high as compared to the conventional state-of-the-art methods. Security analysis is also done for the MCPAC scheme, and it indicates that the system efficiently handles the well-known attacks. The performance analysis shows that MCPAC meets the essential security mandates and excels in computational efficiency by making it suitable for the realistic applications hosted in a cloud computing environment.
引用
收藏
页码:187 / 203
页数:17
相关论文
共 50 条
  • [21] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [22] An efficient signcryption for data access control in cloud computing
    Fagen Li
    Bo Liu
    Jiaojiao Hong
    Computing, 2017, 99 : 465 - 479
  • [23] Research on Resource Allocation Scheme based on Access Control in Cloud Computing Environment
    Wang, Jun-she
    Liu, Jin-liang
    Zhang, Hong-bin
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 377 - 380
  • [24] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    COMPUTING, 2017, 99 (05) : 465 - 479
  • [25] REVERSIBLE HIDDEN DATA ACCESS ALGORITHM IN CLOUD COMPUTING ENVIRONMENT
    Xu, Jinsong
    DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2019, 12 (4-5): : 1219 - 1232
  • [26] Research into Synthesizing Access Control Strategies in Cloud Computing Environment
    Ni, Ping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 : 440 - 445
  • [27] Fine Grained Access Control and Revocation for Secure Cloud Environment - a polynomial based approach
    Mohan, Lija
    Elayidom, Sudheep M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 719 - 724
  • [28] A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
    Li, Xinlong
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [29] HS-TBAC A Highly Secured Token Based Access Control for Outsourced Data in Cloud
    Senthilkumar, Sudha
    Viswanatham, Madhu
    Vinothini, Maya
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [30] Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing
    Kaur, Amardeep
    Verma, Amandeep
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2023, 2023