Secured user authentication and data sharing for mobile cloud computing using 2C-Cubehash and PWCC

IF 3.8 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Sustainable Computing-Informatics & Systems Pub Date : 2025-03-03 DOI:10.1016/j.suscom.2025.101107
Surendar Rama Sitaraman , Kalyan Gattupalli , Venkata Surya Bhavana Harish Gollavilli , Harikumar Nagarajan , Poovendran Alagarsundaram , Haris M. Khalid
{"title":"Secured user authentication and data sharing for mobile cloud computing using 2C-Cubehash and PWCC","authors":"Surendar Rama Sitaraman ,&nbsp;Kalyan Gattupalli ,&nbsp;Venkata Surya Bhavana Harish Gollavilli ,&nbsp;Harikumar Nagarajan ,&nbsp;Poovendran Alagarsundaram ,&nbsp;Haris M. Khalid","doi":"10.1016/j.suscom.2025.101107","DOIUrl":null,"url":null,"abstract":"<div><div>To share data securely, existing works use a public key and a private key for transmission. The secured data sharing along with user authentication is necessary for mobile devices. So, proper authorization is needed to access data owners' credential information from cloud computing. Therefore, the paper presents a novel framework for secured data sharing and user authentication. The security-based authorization in data transfer is taken significantly. Initially, DO and DU register to TA and then hashcode is generated using 2C-Cubehash for the login. After login, the data is encrypted by PWCC and then uploaded by the owner into the mobile cloud. Later, with an end-user request, the possessor and permitter verify the user and give PPK and smart contract to the end-user. Using the two PPK, the client downloads the data. The successful transaction in the blockchain is monitored by the proprietor by constructing UUI-MT. The proposed model resulted in 3123 ms processing time, 2941 ms latency, and 98.03 % security level. With the proposed model, secured user-authenticated data sharing is achieved.</div></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"46 ","pages":"Article 101107"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210537925000277","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

To share data securely, existing works use a public key and a private key for transmission. The secured data sharing along with user authentication is necessary for mobile devices. So, proper authorization is needed to access data owners' credential information from cloud computing. Therefore, the paper presents a novel framework for secured data sharing and user authentication. The security-based authorization in data transfer is taken significantly. Initially, DO and DU register to TA and then hashcode is generated using 2C-Cubehash for the login. After login, the data is encrypted by PWCC and then uploaded by the owner into the mobile cloud. Later, with an end-user request, the possessor and permitter verify the user and give PPK and smart contract to the end-user. Using the two PPK, the client downloads the data. The successful transaction in the blockchain is monitored by the proprietor by constructing UUI-MT. The proposed model resulted in 3123 ms processing time, 2941 ms latency, and 98.03 % security level. With the proposed model, secured user-authenticated data sharing is achieved.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
求助全文
约1分钟内获得全文 去求助
来源期刊
Sustainable Computing-Informatics & Systems
Sustainable Computing-Informatics & Systems COMPUTER SCIENCE, HARDWARE & ARCHITECTUREC-COMPUTER SCIENCE, INFORMATION SYSTEMS
CiteScore
10.70
自引率
4.40%
发文量
142
期刊介绍: Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.
期刊最新文献
Sustainable cost-energy aware load balancing in cloud environment using intelligent optimization SURETY-Fog: Secure Data Query and Storage Processing in Fog Driven IoT Environment Real-time performance enhancement of battery energy storage system in sustainable microgrids using Harris Hawks Optimization Optimizing power allocation in contemporary IoT systems: A deep reinforcement learning approach Hardware and application aware performance, power and energy models for modern HPC servers with DVFS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1