Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access

被引:0
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
关键词
Cloud computing; Virtualization; Security; Access control; Confidentiality; Authentication; Heartbeat;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [1] A combined approach to ensure data security in cloud computing
    Sood, Sandeep K.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1831 - 1838
  • [2] Ensure Hierarchal Identity Based Data Security in Cloud Environment
    Kaushik, Shweta
    Gandhi, Charu
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (04) : 21 - 36
  • [3] An Improved Authentication and Data Security Approach Over Cloud Environment
    Dangi, Ramraj
    Pawar, Satish
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 1069 - 1076
  • [4] A scheme to ensure data security of cloud storage
    Wang, Huifeng
    Li, Zhanhuai
    Zhao, Xiaonan
    Qi, Chanying
    He, Qinlu
    Sun, Jian
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 79 - 82
  • [5] A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing
    Liu, Chuanyi
    Wang, Guofeng
    Han, Peiyi
    Pan, Hezhong
    Fang, Binxing
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 422 - 426
  • [6] Cloud Data Security Solution Based on Data Access Classification, Advanced Encryption Standard and Message Authentication Code
    Jawad, Mohammed Saeed
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 141 - 157
  • [7] A Framework to Ensure Data Storage Security in Cloud Computing
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [8] Efficient way to ensure the data security in cloud computing
    Pallikonda, Anil Kumar
    Chaduvula, Kavitha
    Markapudi, Baburao
    Jyothi, Ch Rathna
    Indira, D. N. V. S. L. S.
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2022, 15 (01): : 1 - 12
  • [9] Efficient Cloud Storage Confidentiality to Ensure Data Security
    Arockiam, L.
    Monikandan, S.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [10] Homomorphic Framework to Ensure Data Security in Cloud Environment
    Jain, Rachna
    Madan, Sushila
    Garg, Bindu
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 177 - 181