Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication

被引:0
|
作者
Ahamad, Danish [1 ]
Akhtar, Md Mobin [2 ]
Hameed, Shabi Alam [1 ]
Al Qerom, Mahmoud Mohammad Mahmoud [3 ]
机构
[1] Shaqra Univ, Shaqraa, Saudi Arabia
[2] Riyadh Elm Univ, Riyadh, Saudi Arabia
[3] Univ Salford, Coll Comp Sci & Engn, Salford, Lancs, England
关键词
Access Control; Authentication; Cloud Computing; Data Privacy; Data Security; PROTOCOL; SCHEME;
D O I
10.4018/IJISP.2022010106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient hashing, encryption, and Chebyshev (HEC)-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms and 1,878 bytes for 100Kb data size, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique
    Mohanthy, AyodhyaRam
    Gurrala, Jagadish
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 337 - 345
  • [42] A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
    Wang, Feifei
    Xu, Guoai
    Wang, Chenyu
    Peng, Junhao
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [43] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [44] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [45] Biometric Based Signature Authentication Scheme for Cloud Healthcare Data Security
    Thangarasu, Gunasekar
    Dominic, P. D. D.
    Subramanian, Kayalvizhi
    Smiley, Sajitha
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 557 - 565
  • [46] A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
    Khan, Mohammad Ayoub
    Quasim, Mohammad Tabrez
    Alghamdi, Norah Saleh
    Khan, Mohammad Yahiya
    IEEE ACCESS, 2020, 8 : 52018 - 52027
  • [47] Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption
    Patil, Kavitha S.
    Mandal, Indrajit
    Rangaswamy, C.
    PERVASIVE AND MOBILE COMPUTING, 2022, 82
  • [48] Security Verification of an Authentication Algorithm Based on Verifiable Encryption
    Kihara, Maki
    Iriyama, Satoshi
    INFORMATION, 2023, 14 (02)
  • [49] A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
    Patel, Khushboo A.
    Shukla, Shivangi
    Patel, Sankita J.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02):
  • [50] IoT based ECG monitoring system with encryption and authentication in secure data transmission for clinical health care approach
    Raheja, Nisha
    Manocha, Amit Kumar
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 74