Orchini Similarity User Authentication Based Streebog Hash Function for Secured Data Storage in Cloud

被引:0
|
作者
Bebe, P. Calista [1 ]
Akila, D. [1 ]
机构
[1] Vels Inst Sci & Adv Studies, Sch Comp Sci, Chennai, Tamil Nadu, India
关键词
cloud computing; storage security; authentication; orchini similarity measure; SCHEME;
D O I
10.1109/iccike47802.2019.9004393
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud provides a flexible on-demand data outsourcing services for the individuals and organizations to store their data in the server. Security of cloud storage is guaranteed through providing data confidentiality. The cloud computing provides several benefits but the major risk to provide security to the user's data since the cloud infrastructures vulnerable to various threats. In order to improve the secure cloud storage, an Orchini Similarity Authentication based Streebog Hashing Secured Data Storage (OSA-SHSDS) mechanismis introduced. The main aim of OSA-SHSDS mechanism is to store the cloud user data with higher confidentiality rate and lesser space complexity. In order to store the data in the cloud server, the cloud user personal details are to be registered. After registering, the cloud server generates the ID and password for every registered cloud user. Wheneverthe userwants to store the data, the user has to login with ID and password to the cloud server for authentication. The cloud server verifies whether the user has authenticatedthe user or not through orchini similarity measure. After authentication, the cloud user is allowed to store the data in the cloud server.. This helps to increase the data confidentiality rate and to minimize the space complexity. The experimental evaluation of OSA-SHSDS mechanism and existing methods are performed using Amazon dataset with the metrics such as authentication accuracy, computation time, data confidentiality rate and space complexity. The observed results reveal that the proposed OSA-SHSDS mechanism attains higher authentication accuracy and data confidentiality with minimum computation time as well as space complexity than the other state-the-art-methods.
引用
收藏
页码:468 / 473
页数:6
相关论文
共 50 条
  • [1] Anonymous User Authentication with Secured Storage and Sharing Of Data on Cloud
    Karad, Manisha D.
    Vaidya, Milind B.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 201 - 205
  • [2] Multi User Authentication in Reliable Data Storage in Cloud
    Yakoob, Sk
    Reddy, V. Krishna
    Dastagiraiah, C.
    [J]. COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 531 - 539
  • [3] Hash function design for cloud storage data auditing
    Doukas, Nikolaos
    Markovskyi, Oleksandr P.
    Bardis, Nikolaos G.
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 800 : 42 - 51
  • [4] Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services
    Punitha, P.
    Kumar, Lakshmana
    Revathi, S.
    Premalatha, R.
    Aiswarya, R. S.
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2024, 33 (03)
  • [5] Authentication and enterprise secured data storage
    Cottin, N
    Mignot, B
    Wack, M
    [J]. ETFA 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 2, PROCEEDINGS, 2001, : 245 - 252
  • [6] "SANDWICH"-LIKE KEYED ALGORITHM BASED ON THE "STREEBOG" HASH FUNCTION
    Kiryukhin, V. A.
    Sergeev, A. M.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2024, (63): : 24 - 48
  • [7] A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
    Li, Xinlong
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [8] Secured User's Authentication and Private Data Storage-Access Scheme in Cloud Computing Using Elliptic Curve Cryptography
    Singh, Shilpi
    Kumar, Vinod
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 791 - 795
  • [9] Secured Storage for Dynamic Data in Cloud
    Ponnuramu, Veeralakshmi
    Tamilselvan, Latha
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 53 - 61
  • [10] A chameleon hash authentication tree optimisation audit for data storage security in cloud calculation
    Bo, Yang
    [J]. International Journal of Innovative Computing and Applications, 2020, 11 (2-3): : 141 - 146