Affiliation:
1. Research Scholar, Anna University, Chennai, India
2. Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, Coimbatore, India
Abstract
In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellman key exchange protocol and Hash-based Message Authentication Code (HMAC) to enhance the security. The proposed system begins with the preprocessing phase, which includes removing noise, standardizing formats and validating the integrity of the data. Next, the data is segmented into appropriate sections to enable efficient storage and retrieval in the cloud. Each segment is further processed to extract meaningful features, ensuring that the relevant information is preserved while reducing the risk of unauthorized access. For safeguarding the stored Aadhaar data, the system employs the Diffie-Hellman key exchange protocol which allows the data owner and the cloud service provider to establish a shared secret key without exposing it to potential attackers. Additionally, HMAC is implemented to verify the identity of users during the login process. HMAC enhances security by leveraging cryptographic hash functions and a shared secret key to produce a distinct code for each login attempt. This mechanism effectively protects the confidentiality and integrity of stored data. The combination of Diffie-Hellman key exchange and HMAC authentication provides a robust security framework for Aadhaar data. It ensures that the data remains encrypted and inaccessible without the secret key, while also verifying the identity of users during the login process. This comprehensive approach helps preventing unauthorized access thereby protecting against potential attacks, instilling trust and confidence in the security of Aadhaar data stored in the cloud. Results of the article depict that the proposed scheme achieve 0.19 s of encryption time and 0.05 s of decryption time.
Reference25 articles.
1. Opennessand security in cloud computing services: assessment methods andinvestment strategies analysis;Jian Xu;IEEE Access,2019
2. Data security and privacyprotection for cloud storage: A survey;Pan Yang;IEEE Access,2020
3. Data processing incyber-physical-social systems through edge computing;Rustem Dautov;IEEEAccess,2018
4. An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems;Zahid Ghaffar;IEEE Access,2020
5. Enhancing cloud-based IoT security through trusworthty cloudservice: an integration of security and reputation approach;Xiang Li;IEEE Access,2019