Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

被引:5
|
作者
Rajkumar, V [1 ,2 ]
Prakash, M. [3 ]
Vennila, V. [2 ,4 ]
机构
[1] Krishnasamy Coll Engn & Technol, Dept Comp Sci & Engn, Cuddalore 607109, India
[2] Anna Univ, Chennai, Tamil Nadu, India
[3] SRM Inst Sci & Technol, Sch Comp, Dept Comp Sci & Engn, Kattankulathur 603203, India
[4] KSR Coll Engn, Dept Comp Sci & Engn, Tiruchengode 637215, India
来源
关键词
Secure interactional proof system; access control; multi-step authentication; Gulliou-Quisquater protocol; ENCRYPTION; INTERNET; PRIVACY;
D O I
10.32604/csse.2022.019622
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is an incipient technology in today's world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the verifier who maintains the access list. Verification is conducted by following Gulliou-Quisquater protocol which determines the security level of the user in multi-step authentication process. Here, RSA algorithm performs the key generation process while the proposed methodology provides data integrity as well as confidentiality using asymmetric encryption. Various methodological operations such as time consumption have been used as performance evaluators in the proposed SIPS protocol. The proposed solution provides a secure system for firm data sharing in cloud environment with confidentiality, authentication and access control. Stochastic Timed Petri (STPN) Net evaluation tool was used to verify and prove the formal analysis of SIPS methodology. This evidence established the effectiveness of the proposed methodology in secure data sharing in cloud environment.
引用
收藏
页码:779 / 793
页数:15
相关论文
共 50 条
  • [41] Task-Oriented Access Model for Secure Data Sharing Over Cloud
    Ahmad, Mahmood
    Pervez, Zeeshan
    Lee, Sungyoung
    Kang, Byeong Ho
    [J]. ACM IMCOM 2015, PROCEEDINGS, 2015,
  • [42] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274
  • [43] Secure Data Sharing in Public Cloud
    Kanaparti, Venkataramana
    Kumar, Naveen R.
    Tatekalva, Sandhya
    Padmavathamma, M.
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [44] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    [J]. SYMMETRY-BASEL, 2023, 15 (12):
  • [45] Implementing secure, policy-driven data access in a cloud environment
    Salant, Eliot
    Baert, Klaas
    [J]. PROCEEDINGS OF THE 15TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS AND STORAGE, SYSTOR 2022, 2022, : 143 - 143
  • [46] Statistical privacy protection for secure data access control in cloud ☆
    Baseri, Yaser
    Hafid, Abdelhakim
    Firoozjaei, Mahdi Daghmehchi
    Cherkaoui, Soumaya
    Ray, Indrakshi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [47] Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud
    Michalas, Antonis
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 182 - 187
  • [48] Improved Technique for Data Confidentiality in Cloud Environment
    Ranjan, Pratyush
    Mishra, Preeti
    Rawat, Jaiveer Singh
    Pilli, Emmanuel S.
    Joshi, R. C.
    [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 183 - 193
  • [49] An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control
    Lin, Guofen
    Hong, Hanshu
    Xia, Yunhao
    Sun, Zhixin
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [50] Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT
    Halder, Subir
    Newe, Thomas
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,