Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access

被引:0
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Ben Yahia, Sadok [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
来源
2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN) | 2018年
关键词
Cloud computing; Virtualization; Security; Access control; Confidentiality; Authentication; Heartbeat;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 17 条
[1]   A Prototype Implementation of Continuous Authentication for Tactical Applications [J].
Brown, J. David ;
Pase, William ;
McKenzie, Chris ;
Salmanian, Mazda ;
Tang, Helen .
AD HOC NETWORKS, ADHOCNETS 2016, 2017, 184 :342-353
[2]   Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks [J].
Butun, Ismail ;
Erol-Kantarci, Melike ;
Kantarci, Burak ;
Song, Houbing .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :47-53
[3]  
Coles C., 2015, CLOUD ADOPTION PRACT
[4]   CP-ABE With Constant-Size Keys for Lightweight Devices [J].
Guo, Fuchun ;
Mu, Yi ;
Susilo, Willy ;
Wong, Duncan S. ;
Varadharajan, Vijay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :763-771
[5]   Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption [J].
Jung, Taeho ;
Li, Xiang-Yang ;
Wan, Zhiguo ;
Wan, Meng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :190-199
[6]  
KPMG, 2014, Cloud Survey Report: Elevating Business in the Cloud
[7]  
KUMAR S, 2016, J SYST SOFTWARE, V4, P148, DOI DOI 10.17354/IJSS/2016/272
[8]   Identity-Based Encryption with Outsourced Revocation in Cloud Computing [J].
Li, Jin ;
Li, Jingwei ;
Chen, Xiaofeng ;
Jia, Chunfu ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) :425-437
[9]   Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services [J].
Liu, Joseph K. ;
Au, Man Ho ;
Huang, Xinyi ;
Lu, Rongxing ;
Li, Jin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) :484-497
[10]  
Msilini N, 2017, INTEL SYST REF LIBR, V115, P59, DOI 10.1007/978-3-319-44270-9_3