doi: 10.17586/2226-1494-2022-22-2-355-363


Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment

K. Mohana Prabha, P. Raja Vidhya Saraswathi, B. Saminathan


Read the full article  ';
Article in English

For citation:
Mohana Prabha K., Vidhya Saraswathi P.R., Balamurali S. Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 2, pp. 355–363. doi: 10.17586/2226-1494-2022-22-2-355-363


Abstract
 Cloud systems allow data sharing capabilities for providing several benefits to users and organizations. However, authentication accuracy (AA) was not improved, and time consumption was not reduced. To increase authentication accuracy, Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) Technique is designed to access data on a server in a secured manner. During the registration process, users’ data are registered and stored on the server. After registering, the cloud server generates an ID and password for every registered user. For authentication, the user needs to login with an ID and password to the cloud server. During authentication, WPHMBSA Technique authenticates the biometric keys of the users. When a user is legitimate, WPHMBSA Technique confirms their authenticity to the server. Experimental evaluation of the WPHMBSA Technique and existing methods are performed by various parameters with the amount of cloud user’s information. The experimental results show that the WPHMBSA Technique obtains high accuracy and confidentiality rate within minimum time.

Keywords: cloud systems, data sharing, registration, authentication, ciphertext, cloud services, cloud

References
  1. Kumari S., Li X., Wu F., Das A.K., Choo K.K.R., Shen J. Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 2017, vol. 68, pp. 320–330. https://doi.org/10.1016/j.future.2016.10.004
  2. Narayanan U., Paul V., Joseph S. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University Computer and Information Sciences, 2020, in press. https://doi.org/10.1016/j.jksuci.2020.05.005
  3. Wei J., Liu W., Hu X. Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing, 2016, vol. 6, no. 4, pp. 1136–1148. https://doi.org/10.1109/TCC.2016.2545668
  4. Gahi Y., El Alaoui I. A secure multi-user database-as-a-service approach for cloud computing privacy. Procedia Computer Science, 2019, vol. 160, pp. 811–818. https://doi.org/10.1016/j.procs.2019.11.006
  5. Indu I., Anand P.R., Bhaskar V. Identity and access management in cloud environment: Mechanisms and challenges. Engineering Science and Technology, an International Journal, 2018, vol. 21, no. 4, pp. 574–588. https://doi.org/10.1016/j.jestch.2018.05.010
  6. Chadwick D.W., Fan W., Costantino G., De Lemos R., Di Cerbo F., Herwono I., Manea M., Mori P., Sajjad A., Wang X.S. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 2020, vol. 102, pp. 710–722. https://doi.org/10.1016/j.future.2019.06.026
  7. Lu X., Pan Z., Xian H. An efficient and secure data sharing scheme for mobile devices in cloud computing. Journal of Cloud Computing, 2020, vol. 9,no. 1, pp. 60. https://doi.org/10.1186/s13677-020-00207-5
  8. Wang F., Xu G., Wang C., Peng J. A provably secure biometrics-based authentication scheme for multiserver environment. Security and Communication Networks, 2019, pp. 2838615. https://doi.org/10.1155/2019/2838615
  9. Hörandner F., Ramacher S., Roth S. Selective end-to-end data-sharing in the cloud. Journal of Banking and Financial Technology, 2020, vol. 4, no. 1, pp. 139–157. https://doi.org/10.1007/s42786-020-00017-y
  10. Wei J., Huang X., Liu W., Hu X. Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security. International Journal of Foundations of Computer Science, 2017, vol. 28, no. 7, pp. 843–868. https://doi.org/10.1142/S0129054117500289
  11. Li J., Zhang Y., Chen X., Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 2018, vol. 72, pp. 1–12. https://doi.org/10.1016/j.cose.2017.08.007
  12. Shen J., Liu D., Shen J., Liu Q., Sun X. A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive and Mobile Computing, 2017, vol. 41, pp. 219–230. https://doi.org/10.1016/j.pmcj.2017.03.013
  13. Khelifi F., Brahimi T., Han J., Li X. Secure and privacy-preserving data sharing in the cloud based on lossless image coding. Signal Processing, 2018, vol. 148, pp. 91–101. https://doi.org/10.1016/j.sigpro.2018.02.016
  14. Fang L., Ge C., Huang Z., Wang J. Privacy preserving cloud data sharing system with flexible control. Computers & Electrical Engineering, 2018, vol. 70, pp. 978–986. https://doi.org/10.1016/j.compeleceng.2018.02.048
  15. Zhang Y., Zheng D., Chen X., Li J., Li H. Efficient attribute-based data sharing in mobile clouds. Pervasive and Mobile Computing, 2016, vol. 28, pp. 135–149. https://doi.org/10.1016/j.pmcj.2015.06.009
  16. Zhang Z., Chen X., Ma J., Shen J. SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. Future Generation Computer Systems, 2020, vol. 108, pp. 1338–1349. https://doi.org/10.1016/j.future.2018.01.025
  17. Singh C., Chauhan D., Deshmukh S.A., Vishnu S.S., Walia R. Medi-Block record: Secure data sharing using block chain technology. Informatics in Medicine Unlocked, 2021, vol. 24, pp. 100624. https://doi.org/10.1016/j.imu.2021.100624
  18. Gudeme J.R., Pasupuleti S., Kandukuri R. Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage. Journal of Parallel and Distributed Computing, 2021, vol. 156, pp. 163–175. https://doi.org/10.1016/j.jpdc.2021.06.001
  19. Shen J., Zhou T., Chen X., Li J., Susilo W. Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security, 2018, vol. 13, no. 4, pp. 912–925. https://doi.org/10.1109/TIFS.2017.2774439
  20. Xu S., Yang G., Mu Y., Deng R.H. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Transactions on Information Forensics and Security, 2018, vol. 13,no. 8, pp. 2101–2113. https://doi.org/10.1109/TIFS.2018.2810065


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика