Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access

被引:0
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
关键词
Cloud computing; Virtualization; Security; Access control; Confidentiality; Authentication; Heartbeat;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [21] Access control security model based on dual identity authentication in cloud computing environment
    Ning, Yumei
    Ding, Zhenguo
    Zeng, Ping
    Wang, Chen
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292
  • [22] A New Framework for Cloud Storage Confidentiality to Ensure Information Security
    Singh, Deepak
    Verma, Harsh K.
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [23] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [24] Towards Healthcare Data Security in Cloud Computing
    Elmogazy, Huda
    Bamasak, Omaima
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 363 - 368
  • [25] Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud
    Sathish, A.
    Bajulunisha, A.
    Sridevi, R.
    Vatchala, S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 4805 - 4819
  • [26] A new lightweight data security system for data security in the cloud computing
    Mohammed S.
    Nanthini S.
    Bala Krishna N.
    Srinivas I.V.
    Rajagopal M.
    Ashok Kumar M.
    Measurement: Sensors, 2023, 29
  • [27] A NEW APPROACH IN MULTI CLOUD ENVIRONMENT TO IMPROVE DATA SECURITY
    Kanna, G. Prabu
    Vasudevan, V.
    2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 7 - 12
  • [28] Towards mobile cloud authentication and gait based security using time warping technique
    S. Sengole Merlin
    A. Chandrasekar
    Cluster Computing, 2019, 22 : 10595 - 10604
  • [29] Towards mobile cloud authentication and gait based security using time warping technique
    Merlin, S. Sengole
    Chandrasekar, A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10595 - 10604
  • [30] A Framework for Monitoring and Security Authentication in Cloud based on Eucalyptus
    Gao, Zefeng
    Li, Xiaoyong
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 349 - 353