A novel model to enhance the data security in cloud environment

被引:6
作者
Verma, Garima [1 ]
Kanrar, Soumen [2 ,3 ]
机构
[1] DIT Univ, Sch Comp, Dehra Dun, Uttarakhand, India
[2] Amity Univ, Ranchi, Jharkhand, India
[3] Vidyasagar Univ West Bengal, Kolkata, India
关键词
Cloud computing; security; biometrics; hyperelliptic curve cryptography; replay attack; PRESERVING BIOMETRIC IDENTIFICATION; PRIVACY; AUTHENTICATION; CRYPTOSYSTEM; FINGERPRINT; EFFICIENT;
D O I
10.3233/MGS-220361
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays cloud computing has given a new paradigm of computing. Despite several benefits of cloud computing there is still a big challenge of ensuring confidentiality and integrity for sensitive information on the cloud. Therefore to address these challenges without loss of any sensitive information and privacy, we present a novel and robust model called 'Enhanced Cloud Security using Hyper Elliptic Curve and Biometric' (ECSHB). The model ECSHB ensures the preservation of data security, privacy, and authentication of data in a cloud environment. The proposed approach combines biometric and hyperelliptic curve cryptography (HECC) techniques to elevate the security of data accessing and resource preservations in the cloud. ECSHB provides a high level of security using less processing power, which will automatically reduce the overall cost. The efficacy of the ECSHB has been evaluated in the form of recognition rate, biometric similarity score, False Matching Ratio (FMR), and False NonMatching Ratio (FNMR). ECSHB has been validated using security threat model analysis in terms of confidentiality. The measure of collision attack, replay attack and non-repudiation is also considered in this work. The evidence of results is compared with some existing work, and the results obtained exhibit better performance in terms of data security and privacy in the cloud environment.
引用
收藏
页码:45 / 63
页数:19
相关论文
共 53 条
[1]  
Al-Hamami Alaa, 2015, WORLD COMPUTER SCI I, V5, P23
[2]  
[Anonymous], 2001, PROCEEDING INT WORKS, DOI DOI 10.1007/3-540-45537-X_14
[3]  
Arora R.P., 2011, INT J INNOV TECHNOL, V1, P10
[4]  
Bala Y., 2017, ADV INTELLIGENT SYST, P13, DOI DOI 10.1007/978-981-10-6747-1_2
[5]  
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[6]  
Batchelor B.G, 2012, BOOK PATTERN RECOGNI, P1
[7]  
Bhattasali T, 2014, LECT NOTES COMPUT SC, V8838, P112, DOI 10.1007/978-3-662-45237-0_12
[8]  
Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
[9]  
Bringer J., 2014, WORKSH INF HID MULT, P187, DOI DOI 10.1145/2600918.2600922
[10]   Identification with encrypted biometric data [J].
Bringer, Julien ;
Chabanne, Herve ;
Kindarji, Bruno .
SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) :548-562