Secured User Authentication and Data Sharing for Mobile Cloud Computing Using 2C-Cubehash and PWCC
Keywords:
Data Owner; Data User; Mobile Cloud Computing; Partial Private Key; User Authentication.Abstract
To share data securely, existing works use a public and private key for transmission. The secured data sharing along with user authentication is necessary for mobile devices. So, proper authorization is needed to access data owners' credential information from cloud computing. Therefore, this study presents a novel framework for secured data sharing and user authentication. The security-based authorization in data transfer is taken significantly. Initially, the data owner and data user register with a trusted authority, and then a hashcode is generated using 2C-Cubehash for the login. After login, the data is encrypted by primitive weierstrass curve cryptography and then uploaded by the owner into the mobile cloud. Later, with an end-user request, the possessor and permitter verify the user and give the end-user a partial private key (PPK) and smart contract. Using the two PPK, the client downloads the data. The proprietor monitors the successful transaction in the blockchain by constructing a Universally Unique Identifier-based Merkle Tree. The proposed model resulted in 3123ms processing time, 2941ms latency, and 98.03% security level. With the proposed model, secured user-authenticated data sharing as process innovation can be achieved.
Downloads
References
L. Devadass, S. S. Sekaran, & Thinakaran, R. (2017). Cloud computing in healthcare. International Journal of Students’ Research in Technology & Management, 5(1), 25-31.
N. D. Sarier, (2021) “Multimodal biometric authentication for mobile edge computing”, Information Sciences, 573, pp. 82–99, https://doi.org/10.1016/j.ins.2021.05.036
S. A. Chaudhry, T. Shon, F. Al-Turjman, & M. H. Alsharif, (2020) “Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems”, Computer Communications, 153, pp. 527–537, https://doi.org/10.1016/j.comcom.2020.02.025
M., Mamdouh, A. I., Awad, A. A. M., Khalaf, & H. F. A. Hamed, (2021) “Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions”, Computers and Security, 111, pp. 1–24, https://doi.org/10.1016/j.cose.2021.102491
V. Krishnasamy, & S. Venkatachalam, (2021) “An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm”, Materials Today: Proceedings, 81(2), pp. 931–936, https://doi.org/10.1016/j.matpr.2021.04.303
W. Wang, H. Huang, L. Xue, Q. Li, R. Malekian, & Y. Zhang, (2021) “Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment”, Journal of Systems Architecture, 115, pp. 1–12, https://doi.org/10.1016/j.sysarc.2021.102024
D. V. K. Vengala, D. Kavitha, & A. P. S. Kumar, (2023) “Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment”, Complex and Intelligent Systems, 9(3), pp. 2915–2928, https://doi.org/10.1007/s40747-021-00305-0
T. A. Alkhdour, M. A Almaiah, A. I. Ali, A. B Lutfi, M. A Alrawad, & T. T. Tin, (2024). “Revolutionizing Healthcare: Unleashing Blockchain Brilliance Through Fuzzy Logic Authentication” Journal of Theoretical And Applied Information Technology, 29, 102(4).
X. Lu, Z. Pan, & H. Xian, (2020) “An efficient and secure data sharing scheme for mobile devices in cloud computing”, Journal of Cloud Computing, 9(1), pp. 1–13, https://doi.org/10.1186/s13677-020-00207-5
W. Feng, Z. Yan, L. T. Yang, & Q. Zheng, (2022) “Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing. IEEE Internet of Things Journal, 9(16), pp. 14185–14202, https://doi.org/10.1109/JIOT.2020.3018878
D. Rangwani, & H. Om, (2021) “A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment”, Arabian Journal for Science and Engineering, 46(4), pp. 3865–3888, https://doi.org/10.1007/s13369-020-05276-x
M. Swetha, & M. Latha, (2023) “Security on mobile cloud computing using cipher text policy and attribute based encryption scheme”, Materials Today: Proceedings, 80, pp. 3059–3063, https://doi.org/10.1016/j.matpr.2021.06.462
M. Xie, Y. Ruan, H. Hong, & J. Shao, (2021) “A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices”, Future Generation Computer Systems, 121, pp. 114–122, https://doi.org/10.1016/j.future.2021.03.021
H. Zhong, C. Zhang, J. Cui, Y. Xu, & L. Liu, (2022) “Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud”, IEEE Transactions on Cloud Computing, 10(3), pp. 1592–1603, https://doi.org/10.1109/TCC.2020.3004334
T. Zhu, Z. Qu, H. Xu, J. Zhang, Z. Shao, Y. Chen, S. Prabhakar, & J. Yang, (2020) “RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild”, IEEE Transactions on Mobile Computing, 19(2), pp. 466–483, https://doi.org/10.1109/TMC.2019.2892440
B. D. Deebak, F. Al-Turjman, & L. Mostarda, (2020) “Seamless secure anonymous authentication for cloud-based mobile edge computing”, Computers and Electrical Engineering, 87, pp. 1–13, https://doi.org/10.1016/j.compeleceng.2020.106782
Z. Ghaffar, S. Ahmed, K. Mahmood, S. H. Islam, M. M. Hassan, & G. Fortino, (2020) “An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems”, IEEE Access, 8, pp. 47144–47160, https://doi.org/10.1109/ACCESS.2020.2977264
O. O. Olakanmi, & K. Odeyemi, (2021) “Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services”, Computers and Security, 108, pp. 1–14, https://doi.org/10.1016/j.cose.2021.102369
M. Vivekanandan, V. N. Sastry, & U. Srinivasulu Reddy, (2021) “Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment”, Peer-to-Peer Networking and Applications, 14(3), pp. 1572–1595, https://doi.org/10.1007/s12083-020-01065-3
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.