Secured Authentication Using ECC Based Fractal Fuzzy in Cloud
Keywords:
Fractal Fuzzy Model, Elliptic Curve Cryptography, Authentication, Distributed Cloud SystemsAbstract
In this paper, the study uses a novel design of the fractal fuzzy model in devising the secured authentication process via Elliptic Curve Cryptography (ECC). This model assists in improving the process of authentication in distributed cloud systems. The study uses attributed based data segregation that is developed using the preference of the data owners or users. Here, the priority is offered to sensitive data rather than non-sensitive data. After the grouping of the sensitive information based on the attribute, these subgroups are encrypted via group keys. Such encrypted information is then merged with the attributes that are of a non-sensitive type and then it is uploaded to the distributed cloud environment. The simulation is conducted in a cloudsim simulator to test the efficacy of the model against various types of attacks. The results of the simulation show that the proposed model performs with minimal computational complexity, storage space and processing time than the existing authentication models. Further, it offers an increased rate of security over sensitive and non-sensitive information than other methods.
Downloads
References
Narayanan, U., Paul, V., & Joseph, S. (2020). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University-Computer and Information Sciences.
Falmari, V. R., & Brindha, M. (2020). Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem. Journal of Information Security and Applications, 53, 102513.
Manivannan, D., & Brindha, M. (2022). Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC Based Cryptosystem. Advances in Systems Science and Applications, 22(1), 92-116.
Chen, Y., & Chen, J. (2021). A secure three-factor-based authentication with key agreement protocol for e-Health clouds. The Journal of Supercomputing, 77(4), 3359-3380.
Wang, F., Xu, G., Xu, G., Wang, Y., & Peng, J. (2020). A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure. Wireless Communications and Mobile Computing, 2020.
Giri, S., Su, J., Zajko, G., & Prasad, P. W. C. (2020, November). Authentication method to secure cloud data centres using biometric technology. In 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA) (pp. 1-9). IEEE.
Khan, N., Zhang, J., & Jan, S. U. (2022). A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server. Security and Communication Networks, 2022.
Kakkar, A. (2020). A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion, 62, 89-109.
Qiu, S., Wang, D., Xu, G., & Kumari, S. (2020). Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Transactions on Dependable and Secure Computing.
Ma, R., Cao, J., Feng, D., Li, H., Niu, B., Li, F., & Yin, L. (2020, May). A secure authentication scheme for remote diagnosis and maintenance in Internet of Vehicles. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-7). IEEE.
Srinivas, J., Das, A. K., Wazid, M., & Kumar, N. (2018). Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing, 17(6), 1133-1146.
Yuvaraj, N., Arshath Raja, R., & Kousik, N. V. (2021). Privacy preservation between privacy and utility using ECC-based PSO algorithm. In Intelligent computing and applications (pp. 567-573). Springer, Singapore.
Sham, E. E., & Vidyarthi, D. P. (2022). CoFA for QoS based secure communication using adaptive chaos dynamical system in fog-integrated cloud. Digital Signal Processing, 126, 103523.
Meshram, C., Imoize, A. L., Jamal, S. S., Alharbi, A. R., Meshram, S. G., & Hussain, I. (2022). CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps. IEEE Access.
Kotha, S. K., Rani, M. S., Subedi, B., Chunduru, A., Karrothu, A., Neupane, B., & Sathishkumar, V. E. (2021). A comprehensive review on secure data sharing in cloud environment. Wireless Personal Communications, 1-28.
Meshram, C., Lee, C. C., Meshram, S. G., & Meshram, A. (2020). OOS-SSS: an efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access, 8, 80063-80073.
Tanveer, M., Zahid, A. H., Ahmad, M., Baz, A., & Alhakami, H. (2020). LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment. IEEE Access, 8, 155645-155659.
Adhikari, S., & Karforma, S. (2022). A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multimedia Tools and Applications, 81(1), 759-784.
Villaverde, B. C., Pesch, D., Alberola, R. D. P., Fedor, S., & Boubekeur, M. (2012, July). Constrained application protocol for low power embedded networks: A survey. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous computing (pp. 702-707). IEEE.
Schneider, J., Kamiya, T., Peintner, D., & Kyusakov, R. (2011). Efficient XML interchange (EXI) format 1.0. W3C Proposed Recommendation, 20, 32.
Bhattacharyya, A., Bose, T., Bandyopadhyay, S., Ukil, A., & Pal, A. (2015, March). LESS: Lightweight establishment of secure session: A cross-layer approach using CoAP and DTLS-PSK channel encryption. In 2015 IEEE 29th international conference on advanced information networking and applications workshops (pp. 682-687). IEEE.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.
Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 1(1), 36-63.
Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331-1354.
Rahman, R. A., & Shah, B. (2016, March). Security analysis of IoT protocols: A focus in CoAP. In 2016 3rd MEC international conference on big data and smart city (ICBDSC) (pp. 1-7). IEEE.
Raza, S., Helgason, T., Papadimitratos, P., & Voigt, T. (2017). SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things. Future Generation Computer Systems, 77, 40-51.
Iglesias-Urkia, M., Orive, A., & Urbieta, A. (2017). Analysis of CoAP implementations for industrial Internet of Things: A survey. Procedia Computer Science, 109, 188-195.
Albalas, F., Al-Soud, M., Almomani, O., & Almomani, A. (2018). Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Power (mw), 1333, 151.
Harish, M., Karthick, R., Mohan Rajan, R., & Vetriselvi, V. (2018, January). Securing CoAP through payload encryption: Using elliptic curve cryptography. In International Conference on Communications and Cyber Physical Engineering 2018 (pp. 497-511). Springer, Singapore.
Dey, S., & Hossain, A. (2019). Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Letters, 3(4), 1-4.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.