A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification

Author(s):  
Safarian Nejad Maryam ◽  
Mohammad V. Malakooti ◽  
Navid Hashemi Taba ◽  
Web Services ◽  
2019 ◽  
pp. 2115-2137
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
S. K. Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


2021 ◽  
pp. 167-187
Author(s):  
Yojna khandelwal ◽  
Kapil Chauhan

Author(s):  
Anilkumar Chunduru ◽  
Gowtham Mamidisetti

Cloud computing is a highly demanding zone in the present IT enterprise. The key characteristics are adaptability, productivity, pay-per-utilize, and cost viability. Access control and information security are the significant issues in cloud computing. Various access control strategies are present. The major problems of storing data in expandable access control and access rights from users are not used in this scheme. This chapter presents a generic survey on scalable and secure access control systems and schemes in cloud computing with a key focus on cloud security. Research gaps in the existing literature on cloud security are presented.


2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Vinothkumar Muthurajan ◽  
Balaji Narayanasamy

Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation.


2016 ◽  
pp. 2055-2075
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
Sanjay Kumar Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


Biometrics ◽  
2017 ◽  
pp. 205-232
Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
S. K. Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


Sign in / Sign up

Export Citation Format

Share Document