Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud

被引:0
|
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, VTU Main Rd, Belgaum 590018, Karnataka, India
[2] Govt Coll Engn & Res, Comp Engn, Pune 412405, Maharashtra, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi 590008, Karnataka, India
关键词
cloud computing; privacy preservation; authentication; data encryption; data security; data storage and communication; DSaC; DATA-SECURITY; STORAGE; ENCRYPTION;
D O I
10.1504/IJICS.2023.135896
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced technology is the cloud computing that has the ability to preserve massive amount of data and shares the data resources over the internet. Cloud computing has a wide range of applications like business fields, software infrastructure, government agencies, and financial industries. The main challenging factors in cloud computing are data privacy and security. Such issues are addressed through the developed method named privacy preservation-based data security that secure protocol for data storage that is distributed and communication (DSaC) in the cloud such that this method provides effective authentication and secure data storage in cloud. An effective performance analysis is done between privacy preservation-based data security approach for authenticated encrypted access and secure data protocol for DSaC in cloud and the approaches are compared with the traditional schemes like Ins-PAbAC, homomorphic proxy re-encryption (HPRE), LAM-CIoT, SA-EDS, advanced encryption standard (AES) and data encryption standard (DES).
引用
收藏
页码:298 / 322
页数:26
相关论文
共 50 条
  • [41] An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
    Gehrmann, Christian
    Gunnarsson, Martin
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5744 - 5753
  • [42] A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud
    Zhang, Xuyun
    Yang, Chi
    Nepal, Surya
    Liu, Chang
    Dou, Wanchun
    Chen, Jinjun
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 105 - 112
  • [43] Performance Analysis of Tag Embedded Based Message Authentication Scheme
    Qaisi, Malak
    Althunibat, Saud
    Qaraqe, Marwa
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [44] PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs
    Zhang, Kuan
    Liang, Xiaohui
    Baura, Mrinmoy
    Lu, Rongxing
    Shen, Xuemin
    INFORMATION SCIENCES, 2014, 284 : 130 - 141
  • [45] A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (11)
  • [46] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [47] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Zhuo Ma
    Yang Liu
    Zhuzhu Wang
    Haoran Ge
    Meng Zhao
    Neural Computing and Applications, 2020, 32 : 16819 - 16831
  • [48] A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication
    Wang, Yan-Ping
    Wang, Xiao-Fen
    Dai, Hong-Ning
    Zhang, Xiao-Song
    Su, Yu
    Imran, Muhammad
    Nasser, Nidal
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2915 - 2920
  • [49] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [50] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Ma, Zhuo
    Liu, Yang
    Wang, Zhuzhu
    Ge, Haoran
    Zhao, Meng
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (22): : 16819 - 16831