Preview

Scientific and Technical Journal of Information Technologies, Mechanics and Optics

Advanced search

Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment

https://doi.org/10.17586/2226-1494-2022-22-2-355-363

Abstract

Cloud systems allow data sharing capabilities for providing several benefits to users and organizations. However, authentication accuracy (AA) was not improved, and time consumption was not reduced. To increase authentication accuracy, Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) Technique is designed to access data on a server in a secured manner. During the registration process, users’ data are registered and stored on the server. After registering, the cloud server generates an ID and password for every registered user. For authentication, the user needs to login with an ID and password to the cloud server. During authentication, WPHMBSA Technique authenticates the biometric keys of the users. When a user is legitimate, WPHMBSA Technique confirms their authenticity to the server. Experimental evaluation of the WPHMBSA Technique and existing methods are performed by various parameters with the amount of cloud user’s information. The experimental results show that the WPHMBSA Technique obtains high accuracy and confidentiality rate within minimum time.

About the Authors

K. Mohana Prabha
Kalasalingam Academy of Research and Education
Russian Federation

Krishnan Mohana Prabha — MCA, Research Scholar 

Tamil Nadu, 626126 

 sc 57321564100 



P.R. Vidhya Saraswathi
Kalasalingam Academy of Research and Education
India

 Perumal Raja Vidhya Saraswathi — PhD, Professor

 sc 55357148700 

 Tamil Nadu, 626126 



S. Balamurali Баламурали
Kalasalingam Academy of Research and Education
India

 Balamurali Saminathan — PhD, Professor 

 Tamil Nadu, 626126 

 sc 6602154096 



References

1. Kumari S., Li X., Wu F., Das A.K., Choo K.K.R., Shen J. Design of a provably secure biometrics-based multi-cloud-server authentication scheme // Future Generation Computer Systems. 2017. V. 68. P. 320– 330. https://doi.org/10.1016/j.future.2016.10.004

2. Narayanan U., Paul V., Joseph S. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment // Journal of King Saud University — Computer and Information Sciences. 2020. in press. https://doi.org/10.1016/j.jksuci.2020.05.005

3. Wei J., Liu W., Hu X. Secure data sharing in cloud computing using revocable-storage identity-based encryption // IEEE Transactions on Cloud Computing. 2016. V. 6. N 4. P. 1136–1148. https://doi.org/10.1109/TCC.2016.2545668 4. Gahi Y., El Alaoui I. A secure multi-user database-as-a-service approach for cloud computing privacy // Procedia Computer Science. 2019. V. 160. P. 811–818. https://doi.org/10.1016/j.procs.2019.11.006

4. Indu I., Anand P.R., Bhaskar V. Identity and access management in cloud environment: Mechanisms and challenges // Engineering Science and Technology, an International Journal. 2018. V. 21. N 4. .P 574–588. https://doi.org/10.1016/j.jestch.2018.05.010

5. Chadwick D.W., Fan W., Costantino G., De Lemos R., Di Cerbo F., Herwono I., Manea M., Mori P., Sajjad A., Wang X.S. A cloud-edge based data security architecture for sharing and analysing cyber threat information // Future Generation Computer Systems. 2020. V. 102. P. 710–722. https://doi.org/10.1016/j.future.2019.06.026

6. Lu X., Pan Z., Xian H. An efficient and secure data sharing scheme for mobile devices in cloud computing // Journal of Cloud Computing. 2020. V. 9. N 1. P. 60. https://doi.org/10.1186/s13677-020-00207-5

7. Wang F., Xu G., Wang C., Peng J. A provably secure biometrics-based authentication scheme for multiserver environment // Security and Communication Networks. 2019. P. 2838615. https://doi.org/10.1155/2019/2838615

8. Hörandner F., Ramacher S., Roth S. Selective end-to-end data-sharing in the cloud // Journal of Banking and Financial Technology. 2020. V. 4. N 1. P. 139–157. https://doi.org/10.1007/s42786-020-00017-y

9. Wei J., Huang X., Liu W., Hu X. Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security // International Journal of Foundations of Computer Science. 2017. V. 28. N 7. P. 843–868. https://doi.org/10.1142/S0129054117500289

10. Li J., Zhang Y., Chen X., Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing // Computers & Security. 2018. V. 72. P. 1–12. https://doi.org/10.1016/j.cose.2017.08.007

11. Shen J., Liu D., Shen J., Liu Q., Sun X. A secure cloud-assisted urban data sharing framework for ubiquitous-cities // Pervasive and Mobile Computing. 2017. V. 41. P. 219–230. https://doi.org/10.1016/j.pmcj.2017.03.013

12. Khelifi F., Brahimi T., Han J., Li X. Secure and privacy-preserving data sharing in the cloud based on lossless image coding // Signal Processing. 2018. V. 148. P. 91–101. https://doi.org/10.1016/j.sigpro.2018.02.016

13. Fang L., Ge C., Huang Z., Wang J. Privacy preserving cloud data sharing system with flexible control // Computers & Electrical Engineering. 2018. V. 70. P. 978–986. https://doi.org/10.1016/j.compeleceng.2018.02.048

14. Zhang Y., Zheng D., Chen X., Li J., Li H. Efficient attribute-based data sharing in mobile clouds // Pervasive and Mobile Computing. 2016. V. 28. P. 135–149. https://doi.org/10.1016/j.pmcj.2015.06.009

15. Zhang Z., Chen X., Ma J., Shen J. SLDS: Secure and locationsensitive data sharing scheme for cloud-assisted Cyber-Physical Systems // Future Generation Computer Systems. 2020. V. 108. P. 1338–1349. https://doi.org/10.1016/j.future.2018.01.025

16. Singh C., Chauhan D., Deshmukh S.A., Vishnu S.S., Walia R. MediBlock record: Secure data sharing using block chain technology // Informatics in Medicine Unlocked. 2021. V. 24. P. 100624. https://doi.org/10.1016/j.imu.2021.100624

17. Gudeme J.R., Pasupuleti S., Kandukuri R. Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage // Journal of Parallel and Distributed Computing. 2021. V. 156. P. 163–175. https://doi.org/10.1016/j. jpdc.2021.06.001

18. Shen J., Zhou T., Chen X., Li J., Susilo W. Anonymous and traceable group data sharing in cloud computing // IEEE Transactions on Information Forensics and Security. 2018. V. 13. N 4. P. 912–925. https://doi.org/10.1109/TIFS.2017.2774439

19. Xu S., Yang G., Mu Y., Deng R.H. Secure fine-grained access control and data sharing for dynamic groups in the cloud // IEEE Transactions on Information Forensics and Security. 2018. V. 13. N 8. P. 2101– 2113. https://doi.org/10.1109/TIFS.2018.2810065


Review

For citations:


Mohana Prabha K., Vidhya Saraswathi P.,  S.B. Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2022;22(2):355-363. https://doi.org/10.17586/2226-1494-2022-22-2-355-363

Views: 5


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-1494 (Print)
ISSN 2500-0373 (Online)