Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

被引:5
|
作者
Rajkumar, V [1 ,2 ]
Prakash, M. [3 ]
Vennila, V. [2 ,4 ]
机构
[1] Krishnasamy Coll Engn & Technol, Dept Comp Sci & Engn, Cuddalore 607109, India
[2] Anna Univ, Chennai, Tamil Nadu, India
[3] SRM Inst Sci & Technol, Sch Comp, Dept Comp Sci & Engn, Kattankulathur 603203, India
[4] KSR Coll Engn, Dept Comp Sci & Engn, Tiruchengode 637215, India
来源
关键词
Secure interactional proof system; access control; multi-step authentication; Gulliou-Quisquater protocol; ENCRYPTION; INTERNET; PRIVACY;
D O I
10.32604/csse.2022.019622
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is an incipient technology in today's world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the verifier who maintains the access list. Verification is conducted by following Gulliou-Quisquater protocol which determines the security level of the user in multi-step authentication process. Here, RSA algorithm performs the key generation process while the proposed methodology provides data integrity as well as confidentiality using asymmetric encryption. Various methodological operations such as time consumption have been used as performance evaluators in the proposed SIPS protocol. The proposed solution provides a secure system for firm data sharing in cloud environment with confidentiality, authentication and access control. Stochastic Timed Petri (STPN) Net evaluation tool was used to verify and prove the formal analysis of SIPS methodology. This evidence established the effectiveness of the proposed methodology in secure data sharing in cloud environment.
引用
收藏
页码:779 / 793
页数:15
相关论文
共 50 条
  • [21] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285
  • [22] Secure authorization, access control and data integrity in Bluetooth
    Nguyen, L
    Safavi-Naini, R
    Susilo, W
    Wysocki, T
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 428 - 433
  • [23] Secure approach to sharing digitized medical data in a cloud environment
    Pradeep Kumar K.
    Prathap B.R.
    Thiruthuvanathan M.M.
    Murthy H.
    Jha Pillai V.
    [J]. Data Science and Management, 2024, 7 (02): : 108 - 118
  • [25] Towards differential access control and privacy-preserving for secure media data sharing in the cloud
    Zheng, Tengfei
    Luo, Yuchuan
    Zhou, Tongqing
    Cai, Zhiping
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [26] Hybrid cryptosystem based healthcare data sharing with access control policy in cloud environment
    S. Vinothkumar
    J. Amutharaj
    [J]. International Journal of Information Technology, 2024, 16 (5) : 3349 - 3357
  • [27] A Confidentiality Preserving Data Leaker Detection Model for Secure Sharing of Cloud Data using Integrated Techniques
    Gupta, Ishu
    Singh, Ashutosh Kumar
    [J]. 2019 7TH INTERNATIONAL CONFERENCE ON SMART COMPUTING & COMMUNICATIONS (ICSCC), 2019, : 245 - 249
  • [28] Secure data storage and access for fish monitoring in cloud environment
    Saraswathy K.S.
    Sujatha S.S.
    [J]. Measurement: Sensors, 2023, 27
  • [29] Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment
    Alshehri, Suhair
    Bamasaq, Omaimah
    Alghazzawi, Daniyal
    Jamjoom, Arwa
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) : 4239 - 4256
  • [30] A Cloud data Access control and LockBox approach for data sharing
    Sahu, Chandraprabhat
    Pathre, Ayonija
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,