Authentication Protocol for Cloud Databases Using Blockchain Mechanism

被引:39
作者
Deep, Gaurav [1 ]
Mohana, Rajni [1 ]
Nayyar, Anand [2 ]
Sanjeevikumar, P. [3 ]
Hossain, Eklas [4 ]
机构
[1] Jaypee Univ Informat Technol, Dept CSE & IT, Solan 173234, India
[2] Duy Tan Univ, Grad Sch, Da Nang 550000, Vietnam
[3] Aalborg Univ, Dept Energy Technol, DK-6700 Esbjerg, Denmark
[4] Oregon Tech, OREC, Dept Elect Engn & Renewable Energy, Klamath Falls, OR 97601 USA
关键词
cloud computing; cloud databases; insider threat; outsider threat; access control; Blockchain; cluster; hash value; claims; INSIDER THREAT; SECURITY;
D O I
10.3390/s19204444
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user's are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offine guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust.
引用
收藏
页数:13
相关论文
共 51 条
[1]  
Amadio R.M, 2002, INT C CONC THEOR
[2]  
[Anonymous], 2018, CURRENT STATE CYBERC
[3]  
[Anonymous], 2018, ENERGY INFORMAT, DOI DOI 10.1186/S42162-018-0040-4/FIGURES/6
[4]  
BARACALDO N, 2017, IEEE T DEPEND SECURE, V16, P84, DOI DOI 10.1109/TDSC.2017.2654438
[5]   Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues [J].
Bhatia, Tarunpreet ;
Verma, A. K. .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (06) :2558-2631
[6]   Blockchain and the future of energy [J].
Brilliantov, Vlada ;
Thurner, Thomas Wolfgang .
TECHNOLOGY IN SOCIETY, 2019, 57 :38-45
[7]  
Chatarasi P., 2018, INT WORKSH LANG COMP, P1
[8]  
Chaudhry S.A, 2017, CLUST COMPUT
[9]  
Chen G., 2018, SMART LEARNING ENV, V5, P1, DOI [10.1186/s40561-017-0050-x, DOI 10.1186/S40561-017-0050-X]
[10]  
Cremers C., 2006, Semantics and Verification of Security Protocols