Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication

Author(s):  
Danish Ahamad ◽  
Md Mobin Akhtar ◽  
Shabi Alam Hameed ◽  
Mahmoud Mohammad Mahmoud Al Qerom
2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


2016 ◽  
Vol 29 (9) ◽  
pp. 1529-1544 ◽  
Author(s):  
SK Hafizul Islam ◽  
Mohammad S. Obaidat ◽  
Ruhul Amin

2021 ◽  
Vol 166 ◽  
pp. 19-25
Author(s):  
Prosanta Gope ◽  
Owen Millwood ◽  
Neetesh Saxena

2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Siniša Tomović ◽  
Miodrag J. Mihaljević ◽  
Aleksandar Perović ◽  
Zoran Ognjanović

The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN) problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM) attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.


Author(s):  
Muhammad Asad Saleem ◽  
Zahid Ghaffar ◽  
Khalid Mahmood ◽  
Ashok Kumar Das ◽  
Joel J. P. C Rodrigues ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document