An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data

被引:1
作者
Hammami, Hamza [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Ben Yahia, Sadok [5 ,6 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[2] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[3] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[4] Univ Sci & Technol Beijing, Beijing, Peoples R China
[5] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[6] Tallinn Univ Technol, Dept Software Sci, Akad Tee 15a, EE-12618 Tallinn, Estonia
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1 | 2020年
关键词
Cloud Computing; Storage as a Service; Security; Authentication; Hybrid Cryptography; Costs; Confidentiality; Integrity; Attacks;
D O I
10.5220/0009824301100117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of cloud computing has become increasingly important due to many factors, including the cost-effective architecture that supports data transmission, storage and computation. It has become indispensable to setting up and providing IT services. Among these services, outsourced data storage, or Storage as a Service (StaaS), which is one of the most popular services in cloud computing; it reliably stores large volumes of data. In return, apart from its benefits in terms of cost and ease of management, StaaS poses new problems related to the security of data and their treatments during access. This is due to the storage of data at a distance beyond the perimeters of users and the involvement of one or more third parties such as service providers or infrastructure. Indeed, the provision of sensitive data to an external entity is a serious concern. The major issues of security, privacy and trust remain the main concerns that hamper the mass adoption of the cloud. Therefore, an automatic focus when using cloud services is the presence of a good strong authentication mechanism to properly authenticate users and mitigate as many vulnerabilities as possible. Our work is part of the research theme on security challenges including the protection of personal data during the authentication process, posed in cloud environments. With this in mind, we introduce an authentication mechanism that takes advantage of the opportunities offered by the hybrid cryptography techniques to protect each user's personal data in the cloud environment while preserving its privacy. The experiments show that the authentication mechanism, we offer, surpasses its competitors in terms of communication and computational costs, data confidentiality and integrity, and resistance to various types of attacks.
引用
收藏
页码:110 / 117
页数:8
相关论文
共 16 条
  • [1] [Anonymous], 2013, Cloud Computing - Theory and Practice
  • [2] Binu S., 2018, COMPUTER NETWORK SEC, P237
  • [3] MDA: message digest-based authentication for mobile cloud computing
    Dey, Saurabh
    Sampalli, Srinivas
    Ye, Qiang
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2016, 5
  • [4] Djellalbia A., 2016, THESIS
  • [5] Security Issues In Cloud Computing And Associated Alleviation Approaches
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    [J]. 2016 12TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2016, : 758 - 765
  • [6] Kumar M., 2020, FORENSIC INVESTIGATI, P257
  • [7] Exploring Data Security Issues and Solutions in Cloud Computing
    Kumar, P. Ravi
    Raj, P. Herbert
    Jelciana, P.
    [J]. 6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 691 - 697
  • [8] Authentication scheme for smart learning system in the cloud computing environment
    Lee A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2015, 11 (03) : 149 - 155
  • [9] Data security and risk assessment in cloud computing
    Li, Jing
    Li, Qinyuan
    [J]. 4TH ANNUAL INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN 2017), 2018, 17
  • [10] Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers
    Lin, Han-Yu
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)