Decentralized access control technique with multi-tier authentication of user for cloud storage

被引:2
|
作者
Shiny, S. [1 ]
Jasper, J. [2 ]
机构
[1] Ponjesly Coll Engn, Dept Comp Sci & Engn, Nagercoil, Tamil Nadu, India
[2] Ponjesly Coll Engn, Dept Elect & Elect Engn, Nagercoil, Tamil Nadu, India
关键词
Access control; Authentication; Multiple KDC; Multi-tier; Steganography; Decentralized; ATTRIBUTE-BASED-ENCRYPTION; IMAGES; AUTHORITY; EFFICIENT;
D O I
10.1007/s12083-021-01189-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The information kept in cloud is greatly sensitive. Security and privacy are two leading issues that often ascend in cloud computing. The objective of the research is to provide security and authentication of cloud data. So, we put forward with a novel decentralized access control scheme aimed at securely storing the data onto the cloud with multiple Key Distribution Center (KDC) based and multi-tier based authentication of user. In conjunction with cryptography to enrich the data security that is to be kept in the cloud we use steganography. In the proposed organization, irrespective of user's identity the cloud confirms the genuineness of the sequence prior to data storage. Our work likewise has the additional element of access control where just legitimate clients can decrypt the kept data and view the equivalent. The scheme supports multiple writing of data into cloud and multiple reading of information kept in the cloud. As a novelty we have introduced hidden attributes, accordingly the Cloud Service Provider (CSP) along with the KDC is unaware of user details and also a multi-tier based authentication to expand the authentication of user.
引用
收藏
页码:13 / 27
页数:15
相关论文
共 50 条
  • [1] Decentralized access control technique with multi-tier authentication of user for cloud storage
    S. Shiny
    J. Jasper
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 13 - 27
  • [2] A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment
    Singh, Ashish
    Chatterjee, Kakali
    [J]. 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [3] Identity Access Management for Multi-tier Cloud Infrastructures
    Faraji, Mohammad
    Kang, Joon-Myung
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    [J]. 2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [4] THE PROBLEM OF AUTHENTICATION IN THE MULTI-TIER APPLICATIONS
    Pautov, P. A.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 87 - 90
  • [5] pWebDAV: a multi-tier storage system
    Filippidis, Christos
    Cotronis, Yiannis
    [J]. 2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 643 - 650
  • [6] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [7] Multi User Authentication in Reliable Data Storage in Cloud
    Yakoob, Sk
    Reddy, V. Krishna
    Dastagiraiah, C.
    [J]. COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 531 - 539
  • [8] CloudPath: A Multi-Tier Cloud Computing Framework
    Mortazavi, Seyed Hossein
    Salehe, Mohammad
    Gomes, Carolina Simoes
    Phillips, Caleb
    de Lara, Eyal
    [J]. SEC 2017: 2017 THE SECOND ACM/IEEE SYMPOSIUM ON EDGE COMPUTING (SEC'17), 2017,
  • [9] Approaches for multi-tier cloud structure management
    Muthanna, Mohammed Manea Ahmed
    Nikolayevich, Vadim
    Volkov, Artem
    Abdukodir, Khakimov
    [J]. 2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2019,
  • [10] Availability modeling for multi-tier cloud environment
    Nalinipriya, G.
    Maheswari, K. G.
    Balusamy, Balamurugan
    Kotteswari, K.
    Sangaiah, Arun Kumar
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2017, 23 (03): : 485 - 492