To read this content please select one of the options below:

Privacy preserving model-based authentication and data security in cloud computing

Ankush Balaram Pawar (Department of Computer Science and Engineering, Visvesvaraya Technological University, Belagavi, India)
Shashikant U. Ghumbre (Computer Engineering, Government College of Engineering and Research, Avasari, India)
Rashmi M. Jogdand (Computer Science and Engineering, KLS Gogte Institute of Technology, Belagavi, India)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 17 June 2021

Issue publication date: 28 February 2023

271

Abstract

Purpose

Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns.

Design/methodology/approach

The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data.

Findings

The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset.

Originality/value

This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.

Keywords

Citation

Pawar, A.B., Ghumbre, S.U. and Jogdand, R.M. (2023), "Privacy preserving model-based authentication and data security in cloud computing", International Journal of Pervasive Computing and Communications, Vol. 19 No. 2, pp. 173-190. https://doi.org/10.1108/IJPCC-11-2020-0193

Publisher

:

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles