Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication

被引:0
作者
Ahamad, Danish [1 ]
Akhtar, Md Mobin [2 ]
Hameed, Shabi Alam [1 ]
Al Qerom, Mahmoud Mohammad Mahmoud [3 ]
机构
[1] Shaqra Univ, Shaqraa, Saudi Arabia
[2] Riyadh Elm Univ, Riyadh, Saudi Arabia
[3] Univ Salford, Coll Comp Sci & Engn, Salford, Lancs, England
关键词
Access Control; Authentication; Cloud Computing; Data Privacy; Data Security; PROTOCOL; SCHEME;
D O I
10.4018/IJISP.2022010106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient hashing, encryption, and Chebyshev (HEC)-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms and 1,878 bytes for 100Kb data size, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [32] A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)
    Chaudhari, Dipalee Ashok
    Umamaheswari, Ekambaram
    [J]. BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK, 2021, 66 (01): : 91 - 105
  • [33] Secure Authentication for Data Protection in Cloud Computing using Color Schemes
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 424 - 427
  • [34] Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption
    Alashjaee, Abdullah Mujawib
    Alqahtani, Fahad
    [J]. IEEE ACCESS, 2024, 12 : 29738 - 29747
  • [35] An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS
    Gaikwad, Vishesh P.
    Tembhurne, Jitendra, V
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Li, Chun-Ta
    [J]. IEEE ACCESS, 2021, 9 : 108586 - 108600
  • [36] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    [J]. CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [37] Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    [J]. SENSORS, 2025, 25 (01)
  • [38] DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security
    Neela, K. L.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (11):
  • [39] An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments
    Jasmine, R. Megiba
    Jasper, J.
    Geetha, M. R.
    [J]. WIRELESS NETWORKS, 2025, 31 (01) : 545 - 565
  • [40] An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
    Shrivastava, Pranav
    Alam, Bashir
    Alam, Mansaf
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 13675 - 13691