Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication

被引:0
|
作者
Ahamad, Danish [1 ]
Akhtar, Md Mobin [2 ]
Hameed, Shabi Alam [1 ]
Al Qerom, Mahmoud Mohammad Mahmoud [3 ]
机构
[1] Shaqra Univ, Shaqraa, Saudi Arabia
[2] Riyadh Elm Univ, Riyadh, Saudi Arabia
[3] Univ Salford, Coll Comp Sci & Engn, Salford, Lancs, England
关键词
Access Control; Authentication; Cloud Computing; Data Privacy; Data Security; PROTOCOL; SCHEME;
D O I
10.4018/IJISP.2022010106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient hashing, encryption, and Chebyshev (HEC)-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms and 1,878 bytes for 100Kb data size, respectively.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [1] Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication
    Ahamad, Danish
    Akhtar, Md Mobin
    Hameed, Shabi Alam
    Al Qerom, Mahmoud Mohammad Mahmoud
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (05) : 475 - 497
  • [2] A provably secure multi-server authentication scheme based on Chebyshev chaotic map
    Chen, Rui
    Mou, Yongcong
    Li, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [3] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [4] On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem
    Rizomiliotis, Panagiotis
    Gritzalis, Stefanos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (02) : 151 - 154
  • [5] On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem
    Panagiotis Rizomiliotis
    Stefanos Gritzalis
    International Journal of Information Security, 2013, 12 : 151 - 154
  • [6] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [7] PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment
    Kumar, Vinod
    Al-Tameemi, Ammar Mohammed Ali
    Kumari, Adesh
    Ahmad, Musheer
    Falah, Mayadah Waheed
    Abd El-Latif, Ahmed A.
    IEEE ACCESS, 2022, 10 : 84776 - 84789
  • [8] Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial
    Roychoudhury, Probidita
    Roychoudhury, Basav
    Saikia, Dilip Kumar
    COMPUTER COMMUNICATIONS, 2018, 127 : 146 - 157
  • [9] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Ashish Kumar
    Hari Om
    Multimedia Tools and Applications, 2021, 80 : 14163 - 14189
  • [10] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Kumar, Ashish
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 14163 - 14189