Orchini Similarity User Authentication Based Streebog Hash Function for Secured Data Storage in Cloud

被引:0
|
作者
Bebe, P. Calista [1 ]
Akila, D. [1 ]
机构
[1] Vels Inst Sci & Adv Studies, Sch Comp Sci, Chennai, Tamil Nadu, India
关键词
cloud computing; storage security; authentication; orchini similarity measure; SCHEME;
D O I
10.1109/iccike47802.2019.9004393
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud provides a flexible on-demand data outsourcing services for the individuals and organizations to store their data in the server. Security of cloud storage is guaranteed through providing data confidentiality. The cloud computing provides several benefits but the major risk to provide security to the user's data since the cloud infrastructures vulnerable to various threats. In order to improve the secure cloud storage, an Orchini Similarity Authentication based Streebog Hashing Secured Data Storage (OSA-SHSDS) mechanismis introduced. The main aim of OSA-SHSDS mechanism is to store the cloud user data with higher confidentiality rate and lesser space complexity. In order to store the data in the cloud server, the cloud user personal details are to be registered. After registering, the cloud server generates the ID and password for every registered cloud user. Wheneverthe userwants to store the data, the user has to login with ID and password to the cloud server for authentication. The cloud server verifies whether the user has authenticatedthe user or not through orchini similarity measure. After authentication, the cloud user is allowed to store the data in the cloud server.. This helps to increase the data confidentiality rate and to minimize the space complexity. The experimental evaluation of OSA-SHSDS mechanism and existing methods are performed using Amazon dataset with the metrics such as authentication accuracy, computation time, data confidentiality rate and space complexity. The observed results reveal that the proposed OSA-SHSDS mechanism attains higher authentication accuracy and data confidentiality with minimum computation time as well as space complexity than the other state-the-art-methods.
引用
收藏
页码:468 / 473
页数:6
相关论文
共 50 条
  • [31] HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment
    Kumar, P. Hari
    AnandhaMala, G. S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (03): : 3181 - 3209
  • [32] Secured Data Storage and Error Tolerant Design in Cloud Computing
    Sumalatha, M. R.
    Selvakumar, C.
    Rathnam, G. Jeeva
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 301 - 305
  • [33] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94
  • [34] Secured Data Storage on Cloud Systems via Wavefront Multiplexing
    Chang, Donald
    Lee, Joe
    yeh, Hen-Geul
    Lu, Frank
    Chen, Steve K.
    Yao, Kung
    [J]. 2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 494 - 499
  • [35] SECURED MEDICAL DATA STORAGE OVER CLOUD FOR COMPREHENSIVE TREATMENT
    Sankaran, Sathya
    Rajasekaran, Rajkumar
    [J]. 2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 257 - 262
  • [36] Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function
    Kim, Youngil
    Choi, Younsung
    Won, Dongho
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [37] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [38] A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
    Das, Ashok Kumar
    Odelu, Vanga
    Goswami, Adrijit
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [39] Multi-Cloud Based Secured Storage System
    Bramhe, M. V.
    Sarode, M. V.
    [J]. HELIX, 2018, 8 (05): : 4019 - 4023
  • [40] Optical hierarchical authentication based on interference and hash function
    He, Wenqi
    Peng, Xiang
    Meng, Xiangfeng
    Liu, Xiaoli
    [J]. APPLIED OPTICS, 2012, 51 (32) : 7750 - 7757