An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

被引:1
作者
Raju, K. [1 ]
Chinnadurai, M. [1 ]
机构
[1] EGS Pillay Engn Coll, Dept Informat Technol, Nagapattinam, Tamil Nadu, India
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 69卷 / 01期
关键词
Data security; authentication; identity-based authentication; optimal key generation; biometric; ACCESS-CONTROL; PRIVACY;
D O I
10.32604/cmc.2021.016068
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMOISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern-based feature extraction process to extract features from the iris and fingerprint. Next, the features are fed into the hybrid social spider using the dragon fly algorithm to determine the optimal solution. This optimal solution acts as a key for an advanced encryption standard to encrypt and decrypt the data. A central benefit of determining the optimal value in this way is that the intruder cannot determine this value. The attacker also cannot work out which specific part of the fingerprint and iris feature values are acted upon as a key for the AES technique. Finally, the encrypted data can be saved in the cloud using a cloud simulator. Experimental analysis was performed on five fingerprint and iris images for a man-in-the-middle attack. The simulation outcome validated that the presented HMO-ISOA model achieved better results compared with other existing methods.
引用
收藏
页码:1057 / 1072
页数:16
相关论文
共 25 条
[1]  
Ambika R. L., 2019, INT J COMPUTERS APPL, V46, P1
[2]  
[Anonymous], 2016 INT C INF COMM
[3]  
[Anonymous], 2018, PAKISTAN J BIOTECHNO
[4]  
[Anonymous], 2018, WIRELESS PERS COMMUN
[5]   Directional local ternary quantized extrema pattern: A new descriptor for biomedical image indexing and retrieval [J].
Deep, G. ;
Kaur, L. ;
Gupta, S. .
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2016, 19 (04) :1895-1909
[6]   MDA: message digest-based authentication for mobile cloud computing [J].
Dey, Saurabh ;
Sampalli, Srinivas ;
Ye, Qiang .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2016, 5
[7]  
Doriya R., 2020, WIRELESS PERS COMMUN, V115, P1
[8]   Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage [J].
Guo, Cheng ;
Luo, Ningqi ;
Bhuiyan, Md Zakirul Alam ;
Jie, Yingmo ;
Chen, Yuanfang ;
Feng, Bin ;
Alam, Muhammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :190-199
[9]   A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework [J].
Irshad, Azeem ;
Usman, Muhammad ;
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shafiq, Muhammad .
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2020, 56 (04) :4425-4435
[10]   RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing [J].
Kumar, Vinod ;
Ahmad, Musheer ;
Mishra, Dheerendra ;
Kumari, Saru ;
Khan, Muhammad Khurram .
VEHICULAR COMMUNICATIONS, 2020, 22