Privacy preserving model-based authentication and data security in cloud computing

Author:

Pawar Ankush Balaram,Ghumbre Dr. Shashikant U.,Jogdand Dr. Rashmi M.

Abstract

Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.

Publisher

Emerald

Subject

General Computer Science,Theoretical Computer Science

Reference30 articles.

1. ACM (2020), “Securing elasticity in the cloud”, available at: https://dl.acm.org/doi/fullHtml/10.1145/1743546.1743565 (accessed August 2020).

2. A review on object detection and tracking in video surveillance;International Journal of Advanced Research in Engineering and Technology,2020

3. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing;Microprocessors and Microsystems,2021

4. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds;Journal of Parallel and Distributed Computing,2020

5. Cloud security is not (just) virtualization security: a short paper,2009

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An effective cloud computing model enhancing privacy in cloud computing;Information Security Journal: A Global Perspective;2024-01-25

2. Enhancement of Security in Cloud Computing Using Optimal Risk Access Control Model;2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES);2023-12-14

3. Research on Service Governance Security Based on Federated Mechanism;2023 5th International Academic Exchange Conference on Science and Technology Innovation (IAECST);2023-12-08

4. Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management;KSII Transactions on Internet and Information Systems;2023-11-30

5. Evaluation of Regional Drought Evolution and Regularity Based on Cloud Computing Model and Copula Function;2023 International Conference on Network, Multimedia and Information Technology (NMITCON);2023-09-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3