Secured Authentication Using ECC Based Fractal Fuzzy in Cloud

Authors

  • A. Ahadha Parveen Department of Computer Science, National College (Affiliated to Bharathidasan University), Trichy, Tamil Nadu, India, 620020
  • P. S. S. Akilashri Department of Computer Science, National College (Affiliated to Bharathidasan University), Trichy, Tamil Nadu, India, 620020

Keywords:

Fractal Fuzzy Model, Elliptic Curve Cryptography, Authentication, Distributed Cloud Systems

Abstract

In this paper, the study uses a novel design of the fractal fuzzy model in devising the secured authentication process via Elliptic Curve Cryptography (ECC). This model assists in improving the process of authentication in distributed cloud systems. The study uses attributed based data segregation that is developed using the preference of the data owners or users. Here, the priority is offered to sensitive data rather than non-sensitive data. After the grouping of the sensitive information based on the attribute, these subgroups are encrypted via group keys. Such encrypted information is then merged with the attributes that are of a non-sensitive type and then it is uploaded to the distributed cloud environment. The simulation is conducted in a cloudsim simulator to test the efficacy of the model against various types of attacks. The results of the simulation show that the proposed model performs with minimal computational complexity, storage space and processing time than the existing authentication models. Further, it offers an increased rate of security over sensitive and non-sensitive information than other methods.

Downloads

Download data is not yet available.

References

Narayanan, U., Paul, V., & Joseph, S. (2020). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University-Computer and Information Sciences.

Falmari, V. R., & Brindha, M. (2020). Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem. Journal of Information Security and Applications, 53, 102513.

Manivannan, D., & Brindha, M. (2022). Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC Based Cryptosystem. Advances in Systems Science and Applications, 22(1), 92-116.

Chen, Y., & Chen, J. (2021). A secure three-factor-based authentication with key agreement protocol for e-Health clouds. The Journal of Supercomputing, 77(4), 3359-3380.

Wang, F., Xu, G., Xu, G., Wang, Y., & Peng, J. (2020). A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure. Wireless Communications and Mobile Computing, 2020.

Giri, S., Su, J., Zajko, G., & Prasad, P. W. C. (2020, November). Authentication method to secure cloud data centres using biometric technology. In 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA) (pp. 1-9). IEEE.

Khan, N., Zhang, J., & Jan, S. U. (2022). A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server. Security and Communication Networks, 2022.

Kakkar, A. (2020). A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion, 62, 89-109.

Qiu, S., Wang, D., Xu, G., & Kumari, S. (2020). Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Transactions on Dependable and Secure Computing.

Ma, R., Cao, J., Feng, D., Li, H., Niu, B., Li, F., & Yin, L. (2020, May). A secure authentication scheme for remote diagnosis and maintenance in Internet of Vehicles. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-7). IEEE.

Srinivas, J., Das, A. K., Wazid, M., & Kumar, N. (2018). Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing, 17(6), 1133-1146.

Yuvaraj, N., Arshath Raja, R., & Kousik, N. V. (2021). Privacy preservation between privacy and utility using ECC-based PSO algorithm. In Intelligent computing and applications (pp. 567-573). Springer, Singapore.

Sham, E. E., & Vidyarthi, D. P. (2022). CoFA for QoS based secure communication using adaptive chaos dynamical system in fog-integrated cloud. Digital Signal Processing, 126, 103523.

Meshram, C., Imoize, A. L., Jamal, S. S., Alharbi, A. R., Meshram, S. G., & Hussain, I. (2022). CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps. IEEE Access.

Kotha, S. K., Rani, M. S., Subedi, B., Chunduru, A., Karrothu, A., Neupane, B., & Sathishkumar, V. E. (2021). A comprehensive review on secure data sharing in cloud environment. Wireless Personal Communications, 1-28.

Meshram, C., Lee, C. C., Meshram, S. G., & Meshram, A. (2020). OOS-SSS: an efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access, 8, 80063-80073.

Tanveer, M., Zahid, A. H., Ahmad, M., Baz, A., & Alhakami, H. (2020). LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment. IEEE Access, 8, 155645-155659.

Adhikari, S., & Karforma, S. (2022). A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multimedia Tools and Applications, 81(1), 759-784.

Villaverde, B. C., Pesch, D., Alberola, R. D. P., Fedor, S., & Boubekeur, M. (2012, July). Constrained application protocol for low power embedded networks: A survey. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous computing (pp. 702-707). IEEE.

Schneider, J., Kamiya, T., Peintner, D., & Kyusakov, R. (2011). Efficient XML interchange (EXI) format 1.0. W3C Proposed Recommendation, 20, 32.

Bhattacharyya, A., Bose, T., Bandyopadhyay, S., Ukil, A., & Pal, A. (2015, March). LESS: Lightweight establishment of secure session: A cross-layer approach using CoAP and DTLS-PSK channel encryption. In 2015 IEEE 29th international conference on advanced information networking and applications workshops (pp. 682-687). IEEE.

Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.

Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 1(1), 36-63.

Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331-1354.

Rahman, R. A., & Shah, B. (2016, March). Security analysis of IoT protocols: A focus in CoAP. In 2016 3rd MEC international conference on big data and smart city (ICBDSC) (pp. 1-7). IEEE.

Raza, S., Helgason, T., Papadimitratos, P., & Voigt, T. (2017). SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things. Future Generation Computer Systems, 77, 40-51.

Iglesias-Urkia, M., Orive, A., & Urbieta, A. (2017). Analysis of CoAP implementations for industrial Internet of Things: A survey. Procedia Computer Science, 109, 188-195.

Albalas, F., Al-Soud, M., Almomani, O., & Almomani, A. (2018). Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Power (mw), 1333, 151.

Harish, M., Karthick, R., Mohan Rajan, R., & Vetriselvi, V. (2018, January). Securing CoAP through payload encryption: Using elliptic curve cryptography. In International Conference on Communications and Cyber Physical Engineering 2018 (pp. 497-511). Springer, Singapore.

Dey, S., & Hossain, A. (2019). Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Letters, 3(4), 1-4.

Downloads

Published

23.02.2024

How to Cite

Parveen , A. A. ., & Akilashri, P. S. S. (2024). Secured Authentication Using ECC Based Fractal Fuzzy in Cloud. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 184–194. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4864

Issue

Section

Research Article