Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication

被引:0
|
作者
Ahamad, Danish [1 ]
Akhtar, Md Mobin [2 ]
Hameed, Shabi Alam [1 ]
Al Qerom, Mahmoud Mohammad Mahmoud [3 ]
机构
[1] Shaqra Univ, Shaqraa, Saudi Arabia
[2] Riyadh Elm Univ, Riyadh, Saudi Arabia
[3] Univ Salford, Coll Comp Sci & Engn, Salford, Lancs, England
关键词
Access Control; Authentication; Cloud Computing; Data Privacy; Data Security; PROTOCOL; SCHEME;
D O I
10.4018/IJISP.2022010106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient hashing, encryption, and Chebyshev (HEC)-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms and 1,878 bytes for 100Kb data size, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
    Mo, Jiaqing
    Hu, Zhongwang
    Shen, Wei
    IEEE ACCESS, 2022, 10 : 12137 - 12152
  • [22] A Biometric Based Authentication and Encryption Framework for Sensor Health Data in Cloud
    Sharma, Surender
    Balasubramanian, Venki
    PROCEEDINGS OF THE 2014 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MULTIMEDIA (ICIM), 2014, : 49 - 54
  • [23] Biometric authentication and image encryption for image security in cloud framework
    Kakkad, Vishruti
    Patel, Meshwa
    Shah, Manan
    MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2019, 2 (04) : 233 - 248
  • [24] Biometric authentication and image encryption for image security in cloud framework
    Vishruti Kakkad
    Meshwa Patel
    Manan Shah
    Multiscale and Multidisciplinary Modeling, Experiments and Design, 2019, 2 : 233 - 248
  • [25] ENHANCED DATA SECURITY FOR PUBLIC CLOUD ENVIRONMENT WITH SECURED HYBRID ENCRYPTION AUTHENTICATION MECHANISMS
    Prabu, S.
    Ganapathy, Gopinath
    Goyal, Ranjan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2018, 19 (04): : 351 - 360
  • [26] Enhanced data security for public cloud environment with secured hybrid encryption authentication mechanisms
    Prabu S.
    Ganapathy G.
    Goyal R.
    Scalable Computing, 2018, 19 (04): : 351 - 360
  • [27] A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)
    Chaudhari, Dipalee Ashok
    Umamaheswari, Ekambaram
    BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK, 2021, 66 (01): : 91 - 105
  • [28] Secure Authentication for Data Protection in Cloud Computing using Color Schemes
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 424 - 427
  • [29] Authentication method to secure cloud data centres using biometric technology
    Giri, Suresh
    Su, Jinfeng
    Zajko, George
    Prasad, P.W.C.
    CITISIA 2020 - IEEE Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, Proceedings, 2020,
  • [30] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298