Novel Modelling of the Hash-based Authentication of Data in Dynamic Cloud Environment

被引:0
作者
Kumar, Anil G. [1 ,2 ]
Shantala, C. P. [1 ,2 ]
机构
[1] Channabasaveshwara Inst Technol, Dept Comp Sci & Engn, Gubbi, Tumkur, India
[2] Visvesvaraya Technol Univ, Belagavi, Karnataka, India
关键词
Cloud computing; data deduplication; data integrity; data privacy; data security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A datacenter in a cloud environment houses a massive quantity of data in a distributed manner. However, with the increasing number of threats like data deduplication attack over the cloud environment, it is quite challenging to ascertain data's full-fledged security. In this regard, data integrity and security are highly questionable. A review of existing literature shows that the existing solutions are not much suitable to meet the requirements and support the existing distributed storage system's security demands concerning data integrity due to the usage of the inferior authentication mechanism. Also, the most frequently used public- key encryption is found not to be purely suitable resource constraint devices. Therefore, this manuscript presents a unique model of authentication of data where a simplified hashing proposition has been designed towards scheduling a distributed chain of data. The idea is to perform dynamic authentication that is present of any form of the adversary. The design of proposed scheme is lightweight which offers cross-verifiable hash-based challenges matching scheme with the provision of the non- repudiation of the tractions using the inclusion of a cloud auditor units. The experiment was carried on numerical computing tool considering, data volume, verification count and verification delay as prime performance metrics. The simulation outcomes shows that the proposed system excels in better security performance as well it is flexible compared to the existing system.
引用
收藏
页码:269 / 275
页数:7
相关论文
共 30 条
  • [1] FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of Things
    Al-Asli, M.
    Elrabaa, M. E. S.
    Abu-Amara, M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 446 - 457
  • [2] Formal Verification of the xDAuth Protocol
    Alam, Quratulain
    Tabbasum, Saher
    Malik, Saif U. R.
    Alam, Masoom
    Ali, Tamleek
    Akhunzada, Adnan
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Buyya, Rajkumar
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 1956 - 1969
  • [3] Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review
    Alotaibi, Bandar
    [J]. IEEE SENSORS JOURNAL, 2019, 19 (23) : 10953 - 10971
  • [4] Anil Kumar G, 2016, EJERS EUROPEAN J ENG, V1
  • [5] Anil Kumar G., 2020, 1 INT C INN COMP SCI
  • [6] Anil Kumar G., 2020, INT J ELECT COMPUTER, V10, P2007
  • [7] HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform
    Chattaraj, Durbadal
    Sarma, Monalisa
    Das, Ashok Kumar
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2018, 6 : 75342 - 75382
  • [8] Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System
    Ding, Ran
    Zhong, Hong
    Ma, Jianfeng
    Liu, Ximeng
    Ning, Jianting
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8393 - 8405
  • [9] An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
    Feng, Bin
    Ma, Xinzhu
    Guo, Cheng
    Shi, Hui
    Fu, Zhangjie
    Qiu, Tie
    [J]. IEEE ACCESS, 2016, 4 : 7899 - 7911
  • [10] Spatial Query Integrity with Voronoi Neighbors
    Hu, Ling
    Ku, Wei-Shinn
    Bakiras, Spiridon
    Shahabi, Cyrus
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (04) : 863 - 876