Skip to main content
Erschienen in: Cluster Computing 1/2017

24.02.2017

A novel dual authentication protocol (DAP) for multi-owners in cloud computing

verfasst von: A. R. Shajina, P. Varalakshmi

Erschienen in: Cluster Computing | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has reached the peak of Gartner hype cycle, and now the focus of every industry is the ability to scale with minimal investment. Scalability comes with its own challenges of data privacy and secured communication, and one of the key privacy concern is caused by frequent changes in membership and multiple owner data sharing. To address secured data sharing, a new dual authentication protocol for secure transmission of data with two level of authentication along with precedence based access control List has been proposed. Proven Triple DES algorithm is used for data encryption, wherein data Owners can encrypt data using their Identity with additional security attributes and the encrypted data is stored in cloud. Only the users who satisfies the encrypted attributes can decrypt the original data, and users can be anonymous if they want to be. Our proposed dual authentication protocol for multi-owner makes the system secured and robust and has been verified through multiple scenarios.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings FC, pp. 136–149 (2010) Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings FC, pp. 136–149 (2010)
4.
Zurück zum Zitat Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Annual International Cryptology Conference, pp. 41–55. Springer, Berlin (2004) Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Annual International Cryptology Conference, pp. 41–55. Springer, Berlin (2004)
5.
Zurück zum Zitat Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef
6.
Zurück zum Zitat Wang, C., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef Wang, C., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef
7.
Zurück zum Zitat Catteddu, D.: Cloud computing: benefits, risks and recommendations for information security. In: Serrão, C., Aguilera Díaz, V., Cerullo, F. (eds.) Web Application Security. Springer, Berlin (2010) Catteddu, D.: Cloud computing: benefits, risks and recommendations for information security. In: Serrão, C., Aguilera Díaz, V., Cerullo, F. (eds.) Web Application Security. Springer, Berlin (2010)
8.
Zurück zum Zitat Begam, O.R., et al.: Cooperative schedule data possession for integrity verification in multi-cloud storage. Int. J. Modern Eng. Res. (IJMER), 3, 2726–2741 Begam, O.R., et al.: Cooperative schedule data possession for integrity verification in multi-cloud storage. Int. J. Modern Eng. Res. (IJMER), 3, 2726–2741
9.
10.
Zurück zum Zitat Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)CrossRef Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)CrossRef
11.
Zurück zum Zitat Wang, Q., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
12.
Zurück zum Zitat Dunning, L.A., Kresman, R.: Privacy preserving data sharing with anonymous id assignment. IEEE Trans. Inf. Forensics Secur. 8(2), 402–413 (2013)CrossRef Dunning, L.A., Kresman, R.: Privacy preserving data sharing with anonymous id assignment. IEEE Trans. Inf. Forensics Secur. 8(2), 402–413 (2013)CrossRef
13.
Zurück zum Zitat Liu, X., et al.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2016)CrossRef Liu, X., et al.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2016)CrossRef
14.
Zurück zum Zitat Grzonkowski, S., Corcoran, P.M.: Sharing cloud services: user authentication for social enhancement of home networking. IEEE Trans. Serv. Comput. 57(3), 1424–1432 (2011) Grzonkowski, S., Corcoran, P.M.: Sharing cloud services: user authentication for social enhancement of home networking. IEEE Trans. Serv. Comput. 57(3), 1424–1432 (2011)
15.
Zurück zum Zitat Zhu, Y., et al.: Towards temporal access control in cloud computing. INFOCOM, 2012 Proceedings IEEE. IEEE (2012) Zhu, Y., et al.: Towards temporal access control in cloud computing. INFOCOM, 2012 Proceedings IEEE. IEEE (2012)
16.
Zurück zum Zitat Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Serv. Comput. 25(2), 384–394 (2014) Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Serv. Comput. 25(2), 384–394 (2014)
17.
Zurück zum Zitat Barsoum, A., Hasan, A.: Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Trans. Serv. Comput. 24(12), 2375–2385 (2013) Barsoum, A., Hasan, A.: Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Trans. Serv. Comput. 24(12), 2375–2385 (2013)
18.
Zurück zum Zitat Park, K.W., et al.: THEMIS: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6(2), 300–313 (2013)CrossRef Park, K.W., et al.: THEMIS: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6(2), 300–313 (2013)CrossRef
19.
Zurück zum Zitat Huang, X., et al.: Cost-effective authentic and anonymous data sharing with forward security. EEE Trans. Comput. 64(4), 971–983 (2015)MathSciNetCrossRef Huang, X., et al.: Cost-effective authentic and anonymous data sharing with forward security. EEE Trans. Comput. 64(4), 971–983 (2015)MathSciNetCrossRef
20.
Zurück zum Zitat Kiraz, M.S., et al.: Anonymous RFID authentication for cloud services. Int. J. Inf. Secur. Sci. 1(2), 32–42 (2012) Kiraz, M.S., et al.: Anonymous RFID authentication for cloud services. Int. J. Inf. Secur. Sci. 1(2), 32–42 (2012)
21.
Zurück zum Zitat Gaikwad, A.D., Deshpande Kiran, B.: Study of an auditing protocol for privacy preservation of data in cloud computing using Kerberos authentication system Gaikwad, A.D., Deshpande Kiran, B.: Study of an auditing protocol for privacy preservation of data in cloud computing using Kerberos authentication system
22.
Zurück zum Zitat Al-Dubai, Y.E., Khamitkar, S.D.: Kerberos: secure single sign-on authentication protocol framework for cloud access control. Glob. J. Comput. Sci. Technol. 14(1), 11 (2014) Al-Dubai, Y.E., Khamitkar, S.D.: Kerberos: secure single sign-on authentication protocol framework for cloud access control. Glob. J. Comput. Sci. Technol. 14(1), 11 (2014)
23.
Zurück zum Zitat Butler, F., et al.: A formal analysis of some properties of Kerberos 5 using MSR (2004) Butler, F., et al.: A formal analysis of some properties of Kerberos 5 using MSR (2004)
24.
Zurück zum Zitat Liu, Q., et al.: Dynamic grouping strategy in cloud computing. 2012 Second International Conference on Cloud and Green Computing (CGC). IEEE (2012) Liu, Q., et al.: Dynamic grouping strategy in cloud computing. 2012 Second International Conference on Cloud and Green Computing (CGC). IEEE (2012)
25.
Zurück zum Zitat Chaum, D., Van Heyst, E.: Group signatures. Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Berlin (1991) Chaum, D., Van Heyst, E.: Group signatures. Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Berlin (1991)
26.
Zurück zum Zitat Fugkeaw, S.: Achieving privacy and security in multi-owner data outsourcing. Digital 2012 Seventh International Conference on Information Management (ICDIM). IEEE (2012) Fugkeaw, S.: Achieving privacy and security in multi-owner data outsourcing. Digital 2012 Seventh International Conference on Information Management (ICDIM). IEEE (2012)
27.
Zurück zum Zitat Yang, K., Jia, X.: Attributed-based access control for multi-authority systems in cloud storage. 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS). IEEE (2012) Yang, K., Jia, X.: Attributed-based access control for multi-authority systems in cloud storage. 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS). IEEE (2012)
28.
Zurück zum Zitat Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. IJ Netw. Secur. 15(4), 231–240 (2013) Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. IJ Netw. Secur. 15(4), 231–240 (2013)
29.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. International Conference on Applied Cryptography and Network Security. Springer, Berlin (2012) Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. International Conference on Applied Cryptography and Network Security. Springer, Berlin (2012)
30.
Zurück zum Zitat Li, M., et al.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef Li, M., et al.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef
32.
Zurück zum Zitat Viganò, L.: Automated security protocol analysis with the AVISPA tool. IEEE Trans. Serv. Comput. 155, 61–86 (2006) Viganò, L.: Automated security protocol analysis with the AVISPA tool. IEEE Trans. Serv. Comput. 155, 61–86 (2006)
34.
Zurück zum Zitat AVISPA Project IST-2001-39252: Deliverable 2.1: the high-level protocol specification language, August (2003) AVISPA Project IST-2001-39252: Deliverable 2.1: the high-level protocol specification language, August (2003)
Metadaten
Titel
A novel dual authentication protocol (DAP) for multi-owners in cloud computing
verfasst von
A. R. Shajina
P. Varalakshmi
Publikationsdatum
24.02.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 1/2017
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-0774-y

Weitere Artikel der Ausgabe 1/2017

Cluster Computing 1/2017 Zur Ausgabe

Premium Partner