Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

被引:5
|
作者
Rajkumar, V [1 ,2 ]
Prakash, M. [3 ]
Vennila, V. [2 ,4 ]
机构
[1] Krishnasamy Coll Engn & Technol, Dept Comp Sci & Engn, Cuddalore 607109, India
[2] Anna Univ, Chennai, Tamil Nadu, India
[3] SRM Inst Sci & Technol, Sch Comp, Dept Comp Sci & Engn, Kattankulathur 603203, India
[4] KSR Coll Engn, Dept Comp Sci & Engn, Tiruchengode 637215, India
来源
关键词
Secure interactional proof system; access control; multi-step authentication; Gulliou-Quisquater protocol; ENCRYPTION; INTERNET; PRIVACY;
D O I
10.32604/csse.2022.019622
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is an incipient technology in today's world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the verifier who maintains the access list. Verification is conducted by following Gulliou-Quisquater protocol which determines the security level of the user in multi-step authentication process. Here, RSA algorithm performs the key generation process while the proposed methodology provides data integrity as well as confidentiality using asymmetric encryption. Various methodological operations such as time consumption have been used as performance evaluators in the proposed SIPS protocol. The proposed solution provides a secure system for firm data sharing in cloud environment with confidentiality, authentication and access control. Stochastic Timed Petri (STPN) Net evaluation tool was used to verify and prove the formal analysis of SIPS methodology. This evidence established the effectiveness of the proposed methodology in secure data sharing in cloud environment.
引用
收藏
页码:779 / 793
页数:15
相关论文
共 50 条
  • [1] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17):
  • [2] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    K. L. Neela
    V. Kavitha
    [J]. Cluster Computing, 2018, 21 : 115 - 124
  • [3] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Neela, K. L.
    Kavitha, V.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 115 - 124
  • [4] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    [J]. MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [5] Secure Data Access and Sharing Scheme for Cloud Storage
    Li, Xiong
    Kumari, Saru
    Shen, Jian
    Wu, Fan
    Chen, Caisen
    Islam, S. K. Hafizul
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5295 - 5314
  • [6] Secure Data Access and Sharing Scheme for Cloud Storage
    Xiong Li
    Saru Kumari
    Jian Shen
    Fan Wu
    Caisen Chen
    SK Hafizul Islam
    [J]. Wireless Personal Communications, 2017, 96 : 5295 - 5314
  • [7] Access control based privacy preserving secure data sharing with hidden access policies in cloud
    Sabitha, S.
    Rajasree, M. S.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2017, 75 : 50 - 58
  • [8] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Sita Kumari Kotha
    Meesala Shobha Rani
    Bharat Subedi
    Anilkumar Chunduru
    Aravind Karrothu
    Bipana Neupane
    V E Sathishkumar
    [J]. Wireless Personal Communications, 2022, 127 (3) : 2161 - 2188
  • [9] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Kotha, Sita Kumari
    Rani, Meesala Shobha
    Subedi, Bharat
    Chunduru, Anilkumar
    Karrothu, Aravind
    Neupane, Bipana
    Sathishkumar, V. E.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2161 - 2188
  • [10] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285