Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication

被引:0
|
作者
Ahamad, Danish [1 ]
Akhtar, Md Mobin [2 ]
Hameed, Shabi Alam [1 ]
Al Qerom, Mahmoud Mohammad Mahmoud [3 ]
机构
[1] Shaqra Univ, Shaqraa, Saudi Arabia
[2] Riyadh Elm Univ, Riyadh, Saudi Arabia
[3] Univ Salford, Coll Comp Sci & Engn, Salford, Lancs, England
关键词
Access Control; Authentication; Cloud Computing; Data Privacy; Data Security; PROTOCOL; SCHEME;
D O I
10.4018/IJISP.2022010106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient hashing, encryption, and Chebyshev (HEC)-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms and 1,878 bytes for 100Kb data size, respectively.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [11] SECURE CLOUD AUTHENTICATION USING EIDS
    Zwattendorfer, Bernd
    Tauber, Arne
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 397 - 401
  • [12] An Improved Authentication and Data Security Approach Over Cloud Environment
    Dangi, Ramraj
    Pawar, Satish
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 1069 - 1076
  • [13] Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 37 - 43
  • [14] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [15] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [16] Design of a provably secure biometrics-based multi-cloud-server authentication scheme
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Choo, Kim-Kwang Raymond
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 320 - 330
  • [17] Cloud Data Security Solution Based on Data Access Classification, Advanced Encryption Standard and Message Authentication Code
    Jawad, Mohammed Saeed
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 141 - 157
  • [19] Provably secure fog-based authentication protocol for VANETs
    Awais, Syed Muhammad
    Yucheng, Wu
    Mahmood, Khalid
    Badar, Hafiz Muhammad Sanaullah
    Kharel, Rupak
    Das, Ashok Kumar
    COMPUTER NETWORKS, 2024, 246
  • [20] A Provably Secure Multi-server Based Authentication Scheme
    Kuo-Hui Yeh
    Wireless Personal Communications, 2014, 79 : 1621 - 1634