Menu
Publications
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief
Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2022-22-2-355-363
Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment
Read the full article ';
Article in English
For citation:
Abstract
For citation:
Mohana Prabha K., Vidhya Saraswathi P.R., Balamurali S. Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 2, pp. 355–363. doi: 10.17586/2226-1494-2022-22-2-355-363
Abstract
Cloud systems allow data sharing capabilities for providing several benefits to users and organizations. However, authentication accuracy (AA) was not improved, and time consumption was not reduced. To increase authentication accuracy, Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) Technique is designed to access data on a server in a secured manner. During the registration process, users’ data are registered and stored on the server. After registering, the cloud server generates an ID and password for every registered user. For authentication, the user needs to login with an ID and password to the cloud server. During authentication, WPHMBSA Technique authenticates the biometric keys of the users. When a user is legitimate, WPHMBSA Technique confirms their authenticity to the server. Experimental evaluation of the WPHMBSA Technique and existing methods are performed by various parameters with the amount of cloud user’s information. The experimental results show that the WPHMBSA Technique obtains high accuracy and confidentiality rate within minimum time.
Keywords: cloud systems, data sharing, registration, authentication, ciphertext, cloud services, cloud
References
References
-
Kumari S., Li X., Wu F., Das A.K., Choo K.K.R., Shen J. Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 2017, vol. 68, pp. 320–330. https://doi.org/10.1016/j.future.2016.10.004
-
Narayanan U., Paul V., Joseph S. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University –Computer and Information Sciences, 2020, in press. https://doi.org/10.1016/j.jksuci.2020.05.005
-
Wei J., Liu W., Hu X. Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing, 2016, vol. 6, no. 4, pp. 1136–1148. https://doi.org/10.1109/TCC.2016.2545668
-
Gahi Y., El Alaoui I. A secure multi-user database-as-a-service approach for cloud computing privacy. Procedia Computer Science, 2019, vol. 160, pp. 811–818. https://doi.org/10.1016/j.procs.2019.11.006
-
Indu I., Anand P.R., Bhaskar V. Identity and access management in cloud environment: Mechanisms and challenges. Engineering Science and Technology, an International Journal, 2018, vol. 21, no. 4, pp. 574–588. https://doi.org/10.1016/j.jestch.2018.05.010
-
Chadwick D.W., Fan W., Costantino G., De Lemos R., Di Cerbo F., Herwono I., Manea M., Mori P., Sajjad A., Wang X.S. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 2020, vol. 102, pp. 710–722. https://doi.org/10.1016/j.future.2019.06.026
-
Lu X., Pan Z., Xian H. An efficient and secure data sharing scheme for mobile devices in cloud computing. Journal of Cloud Computing, 2020, vol. 9,no. 1, pp. 60. https://doi.org/10.1186/s13677-020-00207-5
-
Wang F., Xu G., Wang C., Peng J. A provably secure biometrics-based authentication scheme for multiserver environment. Security and Communication Networks, 2019, pp. 2838615. https://doi.org/10.1155/2019/2838615
-
Hörandner F., Ramacher S., Roth S. Selective end-to-end data-sharing in the cloud. Journal of Banking and Financial Technology, 2020, vol. 4, no. 1, pp. 139–157. https://doi.org/10.1007/s42786-020-00017-y
-
Wei J., Huang X., Liu W., Hu X. Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security. International Journal of Foundations of Computer Science, 2017, vol. 28, no. 7, pp. 843–868. https://doi.org/10.1142/S0129054117500289
-
Li J., Zhang Y., Chen X., Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 2018, vol. 72, pp. 1–12. https://doi.org/10.1016/j.cose.2017.08.007
-
Shen J., Liu D., Shen J., Liu Q., Sun X. A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive and Mobile Computing, 2017, vol. 41, pp. 219–230. https://doi.org/10.1016/j.pmcj.2017.03.013
-
Khelifi F., Brahimi T., Han J., Li X. Secure and privacy-preserving data sharing in the cloud based on lossless image coding. Signal Processing, 2018, vol. 148, pp. 91–101. https://doi.org/10.1016/j.sigpro.2018.02.016
-
Fang L., Ge C., Huang Z., Wang J. Privacy preserving cloud data sharing system with flexible control. Computers & Electrical Engineering, 2018, vol. 70, pp. 978–986. https://doi.org/10.1016/j.compeleceng.2018.02.048
-
Zhang Y., Zheng D., Chen X., Li J., Li H. Efficient attribute-based data sharing in mobile clouds. Pervasive and Mobile Computing, 2016, vol. 28, pp. 135–149. https://doi.org/10.1016/j.pmcj.2015.06.009
-
Zhang Z., Chen X., Ma J., Shen J. SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. Future Generation Computer Systems, 2020, vol. 108, pp. 1338–1349. https://doi.org/10.1016/j.future.2018.01.025
-
Singh C., Chauhan D., Deshmukh S.A., Vishnu S.S., Walia R. Medi-Block record: Secure data sharing using block chain technology. Informatics in Medicine Unlocked, 2021, vol. 24, pp. 100624. https://doi.org/10.1016/j.imu.2021.100624
-
Gudeme J.R., Pasupuleti S., Kandukuri R. Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage. Journal of Parallel and Distributed Computing, 2021, vol. 156, pp. 163–175. https://doi.org/10.1016/j.jpdc.2021.06.001
-
Shen J., Zhou T., Chen X., Li J., Susilo W. Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security, 2018, vol. 13, no. 4, pp. 912–925. https://doi.org/10.1109/TIFS.2017.2774439
-
Xu S., Yang G., Mu Y., Deng R.H. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Transactions on Information Forensics and Security, 2018, vol. 13,no. 8, pp. 2101–2113. https://doi.org/10.1109/TIFS.2018.2810065