Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access

被引:0
|
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
关键词
Cloud computing; Virtualization; Security; Access control; Confidentiality; Authentication; Heartbeat;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [31] A pairing-based cryptographic approach for data security in the cloud
    Morales-Sandoval, Miguel
    Luis Gonzalez-Compean, Jose
    Diaz-Perez, Arturo
    Sosa-Sosa, Victor J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 441 - 461
  • [32] A New Security Framework for Cloud Data
    Mall, Shalu
    Saroj, Sushil Kumar
    8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 765 - 775
  • [33] A pairing-based cryptographic approach for data security in the cloud
    Miguel Morales-Sandoval
    Jose Luis Gonzalez-Compean
    Arturo Diaz-Perez
    Victor J. Sosa-Sosa
    International Journal of Information Security, 2018, 17 : 441 - 461
  • [34] A Robust Mutual Authentication Scheme for Data Security in Cloud Architecture
    Sarvabhatla, Mrudula
    Vorugunti, Chandra Sekhar
    2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [35] Towards Cloud based Smart Cities Data Security and Privacy Management
    Khan, Zaheer
    Pervez, Zeeshan
    Ghafoor, Abdul
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 806 - 811
  • [36] IoT Security Access Authentication Method Based on Blockchain
    Cheng, Yang
    Lei, Min
    Chen, Shiyou
    Fang, Zigang
    Yang, Shuaipeng
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT II, 2019, 302 : 229 - 238
  • [37] Contemporary Authentication Access Approach for High Security Information Systems
    Dimitrova, Emiliya
    Dimitrova, Dragomira
    Dimitrov, Vasil
    Trifonov, Ventsislav
    2021 56TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES (ICEST), 2021, : 37 - 40
  • [38] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [39] The Cloud Data Security and Access Control Model in the Study
    Dong, Jing
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 498 - 500
  • [40] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34