Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment

被引:0
|
作者
Benifa, J. V. Bibal [1 ]
Mini, G. Venifa [2 ]
机构
[1] Indian Inst Informat Technol, Kottayam, Kerala, India
[2] Noorul Islam Ctr Higher Educ, Kumaracoil, Tamil Nadu, India
关键词
Access control mechanism; Chebyshev polynomial; Elliptic curve cryptography; Cloud infrastructure; AUTHENTICATION SCHEME; PROVABLY SECURE; PASSWORD AUTHENTICATION; OUTSOURCED DATA; KEY AGREEMENT; EFFICIENT; PROTOCOL; INTERNET; SERVICE;
D O I
10.1007/s11761-020-00307-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a popular model for offering infinite storage resources for the users. In the present scenario, extremely sensitive data is stored in the third-party cloud service provider's infrastructure. For instance, patients who have direct access to the healthcare system may access the cloud-based health care data at any time based on the needs. Such sensitive data is subjected to various security issues because of the entities from multiple hosts connecting to cloud storage. In the proposed work, an optimized secured data access control mechanism named as modified Chebyshev polynomial-based access control (MCPAC) is presented. In MCPAC scheme, multiple levels of verification and authentications are carried out to provide resilience against widely recognized attacks. The proposed access control scheme is evaluated in a real private cloud infrastructure using the metrics, such as precision, recall and detection rate. It is proved that the proposed MCPAC offers better privacy protection with the precision of 0.8947, recall of 0.8983, and detection rate of 85.63%, which is high as compared to the conventional state-of-the-art methods. Security analysis is also done for the MCPAC scheme, and it indicates that the system efficiently handles the well-known attacks. The performance analysis shows that MCPAC meets the essential security mandates and excels in computational efficiency by making it suitable for the realistic applications hosted in a cloud computing environment.
引用
收藏
页码:187 / 203
页数:17
相关论文
共 50 条
  • [41] Time efficient secure DNA based access control model for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    Vijayakumar, Pandi
    Audithan, Sivaraman
    Balusamy, Balamurugan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 90 - 105
  • [42] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285
  • [43] Data Access Control in Cloud Computing: Flexible and Receiver Extendable
    Lai, Jianchang
    Guo, Fuchun
    Susilo, Willy
    Huang, Xinyi
    Jiang, Peng
    Zhang, Futai
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2658 - 2670
  • [44] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [45] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [46] Access Control Role Evolution Mechanism for Open Computing Environment
    Liu, Aodi
    Du, Xuehui
    Wang, Na
    ELECTRONICS, 2020, 9 (03)
  • [47] A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
    Lin, Hui
    Xu, Li
    Huang, Xinyi
    Wu, Wei
    Huang, Yijie
    AD HOC NETWORKS, 2015, 35 : 51 - 64
  • [48] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [49] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [50] Context Aware Based Access Control Model in Cloud Data Center Environment
    Byun, Yun Sang
    Kwak, Jin
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 515 - 524