Privacy preserving model-based authentication and data security in cloud computing

IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS International Journal of Pervasive Computing and Communications Pub Date : 2021-06-17 DOI:10.1108/IJPCC-11-2020-0193
A. Pawar, S. Ghumbre, R. Jogdand
{"title":"Privacy preserving model-based authentication and data security in cloud computing","authors":"A. Pawar, S. Ghumbre, R. Jogdand","doi":"10.1108/IJPCC-11-2020-0193","DOIUrl":null,"url":null,"abstract":"\nPurpose\nCloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns.\n\n\nDesign/methodology/approach\nThe purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data.\n\n\nFindings\nThe effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset.\n\n\nOriginality/value\nThis paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.\n","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/IJPCC-11-2020-0193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 2

Abstract

Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算中基于模型的身份验证与数据安全
目的云计算在用户间安全通信的初始化中起着重要作用。先进的技术指向提供平台、资源、网络接入等多种服务。此外,云计算是一种更广泛的通信融合技术。在云计算架构中,数据安全和身份验证是主要的重要问题。设计/方法/方法本研究的目的是设计和开发云计算中的身份验证和数据安全模型。该方法包括云服务器、数据所有者、云用户、检查机构、属性机构和中央认证机构六个不同的单元。所开发的隐私保护方法包括设置阶段、密钥生成阶段、认证阶段和数据共享阶段。最初,设置阶段由所有者执行,其中输入是安全属性,而系统主密钥和公共参数是在密钥生成阶段产生的。之后,执行身份验证过程,以识别信息系统的安全控制。最后,在数据共享阶段对数据进行解密,实现数据共享,实现机密数据的数据隐私。利用动态拼接,利用哈希、ECC (Elliptic Curve Cryptography)、3DES (Data Encryption Standard-3)、插值、多项式核、异或等安全功能为敏感数据提供安全保障。结果:在其他方法的基础上对所开发的隐私保护方法的有效性进行了估计,显示出更好的隐私系数和检测率分别为0.83和0.65的高效结果,使用Cleveland数据集时,时间大大缩短了2815ms。原创性/价值本文提出了云环境中发起经过认证的加密访问的隐私保护技术,该技术是为系统中请求者和数据所有者的相互认证而设计的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Pervasive Computing and Communications
International Journal of Pervasive Computing and Communications COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
6.60
自引率
0.00%
发文量
54
期刊最新文献
Big data challenges and opportunities in Internet of Vehicles: a systematic review Cooperative optimization techniques in distributed MAC protocols – a survey Novel communication system for buried water pipe monitoring using acoustic signal propagation along the pipe A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks Clustering based EO with MRF technique for effective load balancing in cloud computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1