An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data

被引:1
|
作者
Hammami, Hamza [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Ben Yahia, Sadok [5 ,6 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[2] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[3] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[4] Univ Sci & Technol Beijing, Beijing, Peoples R China
[5] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[6] Tallinn Univ Technol, Dept Software Sci, Akad Tee 15a, EE-12618 Tallinn, Estonia
关键词
Cloud Computing; Storage as a Service; Security; Authentication; Hybrid Cryptography; Costs; Confidentiality; Integrity; Attacks;
D O I
10.5220/0009824301100117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of cloud computing has become increasingly important due to many factors, including the cost-effective architecture that supports data transmission, storage and computation. It has become indispensable to setting up and providing IT services. Among these services, outsourced data storage, or Storage as a Service (StaaS), which is one of the most popular services in cloud computing; it reliably stores large volumes of data. In return, apart from its benefits in terms of cost and ease of management, StaaS poses new problems related to the security of data and their treatments during access. This is due to the storage of data at a distance beyond the perimeters of users and the involvement of one or more third parties such as service providers or infrastructure. Indeed, the provision of sensitive data to an external entity is a serious concern. The major issues of security, privacy and trust remain the main concerns that hamper the mass adoption of the cloud. Therefore, an automatic focus when using cloud services is the presence of a good strong authentication mechanism to properly authenticate users and mitigate as many vulnerabilities as possible. Our work is part of the research theme on security challenges including the protection of personal data during the authentication process, posed in cloud environments. With this in mind, we introduce an authentication mechanism that takes advantage of the opportunities offered by the hybrid cryptography techniques to protect each user's personal data in the cloud environment while preserving its privacy. The experiments show that the authentication mechanism, we offer, surpasses its competitors in terms of communication and computational costs, data confidentiality and integrity, and resistance to various types of attacks.
引用
收藏
页码:110 / 117
页数:8
相关论文
共 50 条
  • [41] A robust cloud access scheme with mutual authentication
    Chen, Chin-Ling
    Deng, Yong-Yuan
    Wang, Kun-hao
    Fan, Chun-Long
    INTERNATIONAL CONFERENCE ON COMPUTING AND PRECISION ENGINEERING (ICCPE 2015), 2016, 71
  • [42] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [43] A secure authentication scheme of health care based on the cloud
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Leu, Fang-Yie
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 499 - 504
  • [44] Notes on "Secure authentication scheme for IoT and cloud servers"
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    Sun, Chin-Yu
    PERVASIVE AND MOBILE COMPUTING, 2017, 38 : 275 - 278
  • [45] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [46] A secure and lightweight authentication scheme for next generation IoT infrastructure
    Rana, Minahil
    Shafiq, Akasha
    Altaf, Izwa
    Alazab, Mamoun
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Bin Zikria, Yousaf
    COMPUTER COMMUNICATIONS, 2021, 165 : 85 - 96
  • [47] A Secure, Efficient and Lightweight User Authentication Scheme For Wireless LAN
    Kumar, Amit
    Om, Hari
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [48] RSEL: revocable secure efficient lightweight RFID authentication scheme
    Fan, Kai
    Li, Jie
    Li, Hui
    Liang, Xiaohui
    Shen, Xuemin
    Yang, Yintang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1084 - 1096
  • [49] A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
    Nandy, Tarak
    Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Wahab, Ainuddin Wahid Abdul
    Bhattacharyya, Sananda
    Kolandaisamy, Raenu
    Yahuza, Muktar
    IEEE SENSORS JOURNAL, 2021, 21 (18) : 20998 - 21011
  • [50] A Lightweight and Secure Authentication Scheme for Remote Monitoring of Patients in IoMT
    Ali, Zohaib
    Mahmood, Saba
    Ul Hassan, Khwaja Mansoor
    Daud, Ali
    Alharbey, Riad
    Bukhari, Amal
    IEEE ACCESS, 2024, 12 : 73004 - 73020