Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment

被引:0
|
作者
Benifa, J. V. Bibal [1 ]
Mini, G. Venifa [2 ]
机构
[1] Indian Inst Informat Technol, Kottayam, Kerala, India
[2] Noorul Islam Ctr Higher Educ, Kumaracoil, Tamil Nadu, India
关键词
Access control mechanism; Chebyshev polynomial; Elliptic curve cryptography; Cloud infrastructure; AUTHENTICATION SCHEME; PROVABLY SECURE; PASSWORD AUTHENTICATION; OUTSOURCED DATA; KEY AGREEMENT; EFFICIENT; PROTOCOL; INTERNET; SERVICE;
D O I
10.1007/s11761-020-00307-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a popular model for offering infinite storage resources for the users. In the present scenario, extremely sensitive data is stored in the third-party cloud service provider's infrastructure. For instance, patients who have direct access to the healthcare system may access the cloud-based health care data at any time based on the needs. Such sensitive data is subjected to various security issues because of the entities from multiple hosts connecting to cloud storage. In the proposed work, an optimized secured data access control mechanism named as modified Chebyshev polynomial-based access control (MCPAC) is presented. In MCPAC scheme, multiple levels of verification and authentications are carried out to provide resilience against widely recognized attacks. The proposed access control scheme is evaluated in a real private cloud infrastructure using the metrics, such as precision, recall and detection rate. It is proved that the proposed MCPAC offers better privacy protection with the precision of 0.8947, recall of 0.8983, and detection rate of 85.63%, which is high as compared to the conventional state-of-the-art methods. Security analysis is also done for the MCPAC scheme, and it indicates that the system efficiently handles the well-known attacks. The performance analysis shows that MCPAC meets the essential security mandates and excels in computational efficiency by making it suitable for the realistic applications hosted in a cloud computing environment.
引用
收藏
页码:187 / 203
页数:17
相关论文
共 50 条
  • [31] A cloud-user access control mechanism based on data masking
    Wu, Ting-Kuang
    Lin, Yung-Wang
    Lin, Iuon-Chang
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 165 - 168
  • [32] Research on Data Protection Based on Encrypted Attribute Access Control in Cloud Computing
    Zhang, Hua
    Lou, Fang
    Wang, Hao
    Tian, Zhihong
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 450 - 453
  • [33] MEDICAL DATA PRIVACY MONITORING BASED ON CLOUD COMPUTING AND ACCESS CONTROL STRATEGY
    Liu, W.
    Tang, C. C.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 107 - 107
  • [34] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [35] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    Wireless Personal Communications, 2021, 116 : 3039 - 3060
  • [36] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [37] Access control for Hadoop-based cloud computing
    Wang, Zhihua
    Pang, Haibo
    Li, Zhanbo
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 53 - 59
  • [38] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [39] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [40] Access control security model based on dual identity authentication in cloud computing environment
    Ning, Yumei
    Ding, Zhenguo
    Zeng, Ping
    Wang, Chen
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292