Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication

被引:0
作者
Ahamad, Danish [1 ]
Akhtar, Md Mobin [2 ]
Hameed, Shabi Alam [1 ]
Al Qerom, Mahmoud Mohammad Mahmoud [3 ]
机构
[1] Shaqra Univ, Shaqraa, Saudi Arabia
[2] Riyadh Elm Univ, Riyadh, Saudi Arabia
[3] Univ Salford, Coll Comp Sci & Engn, Salford, Lancs, England
关键词
Access Control; Authentication; Cloud Computing; Data Privacy; Data Security; PROTOCOL; SCHEME;
D O I
10.4018/IJISP.2022010106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient hashing, encryption, and Chebyshev (HEC)-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms and 1,878 bytes for 100Kb data size, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [12] ENHANCED DATA SECURITY FOR PUBLIC CLOUD ENVIRONMENT WITH SECURED HYBRID ENCRYPTION AUTHENTICATION MECHANISMS
    Prabu, S.
    Ganapathy, Gopinath
    Goyal, Ranjan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2018, 19 (04): : 351 - 360
  • [13] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02) : 2055 - 2070
  • [14] Enhanced data security for public cloud environment with secured hybrid encryption authentication mechanisms
    Prabu S.
    Ganapathy G.
    Goyal R.
    Scalable Computing, 2018, 19 (04): : 351 - 360
  • [15] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [16] A secure authentication and collaborative data-sharing model based on a blockchain network in the cloud
    Samuel, B.
    Kasturi, K.
    JOURNAL OF CONTROL AND DECISION, 2024, 11 (04) : 730 - 745
  • [17] Cloud Authentication Based on Encryption of Digital Image Using Edge Detection
    Yassin, Ali A.
    Hussain, Abdullah A.
    Mutlaq, Keyan Abdul-Aziz
    2015 INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND SIGNAL PROCESSING (AISP), 2015, : 1 - 6
  • [18] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [19] A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
    Khan, Mohammad Ayoub
    Quasim, Mohammad Tabrez
    Alghamdi, Norah Saleh
    Khan, Mohammad Yahiya
    IEEE ACCESS, 2020, 8 : 52018 - 52027
  • [20] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021