Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud

被引:0
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, VTU Main Rd, Belgaum 590018, Karnataka, India
[2] Govt Coll Engn & Res, Comp Engn, Pune 412405, Maharashtra, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi 590008, Karnataka, India
关键词
cloud computing; privacy preservation; authentication; data encryption; data security; data storage and communication; DSaC; DATA-SECURITY; STORAGE; ENCRYPTION;
D O I
10.1504/IJICS.2023.135896
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced technology is the cloud computing that has the ability to preserve massive amount of data and shares the data resources over the internet. Cloud computing has a wide range of applications like business fields, software infrastructure, government agencies, and financial industries. The main challenging factors in cloud computing are data privacy and security. Such issues are addressed through the developed method named privacy preservation-based data security that secure protocol for data storage that is distributed and communication (DSaC) in the cloud such that this method provides effective authentication and secure data storage in cloud. An effective performance analysis is done between privacy preservation-based data security approach for authenticated encrypted access and secure data protocol for DSaC in cloud and the approaches are compared with the traditional schemes like Ins-PAbAC, homomorphic proxy re-encryption (HPRE), LAM-CIoT, SA-EDS, advanced encryption standard (AES) and data encryption standard (DES).
引用
收藏
页码:298 / 322
页数:26
相关论文
共 50 条
  • [21] On the Unforgeability of "Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET"
    Lin, Xi-Jun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 10371 - 10372
  • [22] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [23] Security aware index based quasi-identifier approach for privacy preservation of data sets for cloud applications
    Sudhakar, Rayapati Venkata
    Rao, T. Ch. Malleswara
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2579 - 2589
  • [24] An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud
    Zhang, Xuyun
    Liu, Chang
    Nepal, Surya
    Chen, Jinjun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) : 542 - 555
  • [25] A High-Performance Transparent Memory Data Encryption and Authentication Scheme Based on Ascon Cipher
    Xu, Dongdong
    Wang, Xiang
    Hao, Qiang
    Wang, Jiqing
    Cui, Shuangjie
    Liu, Bo
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (05) : 925 - 937
  • [26] A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
    Khatiwada, Pankaj
    Bhusal, Hari
    Chatterjee, Ayan
    Gerdes, Martin W.
    2020 16TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2020,
  • [27] An Identity-Based Encryption Scheme with Performance Optimization for Privacy Preservation in Smart Grid Communication
    Baloglu, Ulas Baran
    Demir, Yakup
    TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL TELECOMMUNICATIONS (ICDT 2017), 2017, : 18 - 21
  • [28] Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
    Zhang J.
    Ma J.
    Ma Z.
    Li T.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (10): : 81 - 94
  • [29] Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET
    Yang, Yafang
    Zhang, Lei
    Zhao, Yunlei
    Choo, Kim-Kwang Raymond
    Zhang, Yan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 317 - 331
  • [30] A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing
    Zhang, Yin
    Xiong, Ling
    Li, Fagen
    Niu, Xianhua
    Wu, Hanzhou
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142