Secured User Authentication and Data Sharing for Mobile Cloud Computing Using 2C-Cubehash and PWCC

Authors

  • Bala Anand Muthu, Sivaparthipan C. B., Lakshmana Kumar R., Jayanthi S., Rajermani Thinakaran

Keywords:

Data Owner; Data User; Mobile Cloud Computing; Partial Private Key; User Authentication.

Abstract

To share data securely, existing works use a public and private key for transmission. The secured data sharing along with user authentication is necessary for mobile devices. So, proper authorization is needed to access data owners' credential information from cloud computing. Therefore, this study presents a novel framework for secured data sharing and user authentication. The security-based authorization in data transfer is taken significantly. Initially, the data owner and data user register with a trusted authority, and then a hashcode is generated using 2C-Cubehash for the login. After login, the data is encrypted by primitive weierstrass curve cryptography and then uploaded by the owner into the mobile cloud. Later, with an end-user request, the possessor and permitter verify the user and give the end-user a partial private key (PPK) and smart contract. Using the two PPK, the client downloads the data. The proprietor monitors the successful transaction in the blockchain by constructing a Universally Unique Identifier-based Merkle Tree. The proposed model resulted in 3123ms processing time, 2941ms latency, and 98.03% security level. With the proposed model, secured user-authenticated data sharing as process innovation can be achieved.

Downloads

Download data is not yet available.

References

L. Devadass, S. S. Sekaran, & Thinakaran, R. (2017). Cloud computing in healthcare. International Journal of Students’ Research in Technology & Management, 5(1), 25-31.

N. D. Sarier, (2021) “Multimodal biometric authentication for mobile edge computing”, Information Sciences, 573, pp. 82–99, https://doi.org/10.1016/j.ins.2021.05.036

S. A. Chaudhry, T. Shon, F. Al-Turjman, & M. H. Alsharif, (2020) “Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems”, Computer Communications, 153, pp. 527–537, https://doi.org/10.1016/j.comcom.2020.02.025

M., Mamdouh, A. I., Awad, A. A. M., Khalaf, & H. F. A. Hamed, (2021) “Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions”, Computers and Security, 111, pp. 1–24, https://doi.org/10.1016/j.cose.2021.102491

V. Krishnasamy, & S. Venkatachalam, (2021) “An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm”, Materials Today: Proceedings, 81(2), pp. 931–936, https://doi.org/10.1016/j.matpr.2021.04.303

W. Wang, H. Huang, L. Xue, Q. Li, R. Malekian, & Y. Zhang, (2021) “Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment”, Journal of Systems Architecture, 115, pp. 1–12, https://doi.org/10.1016/j.sysarc.2021.102024

D. V. K. Vengala, D. Kavitha, & A. P. S. Kumar, (2023) “Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment”, Complex and Intelligent Systems, 9(3), pp. 2915–2928, https://doi.org/10.1007/s40747-021-00305-0

T. A. Alkhdour, M. A Almaiah, A. I. Ali, A. B Lutfi, M. A Alrawad, & T. T. Tin, (2024). “Revolutionizing Healthcare: Unleashing Blockchain Brilliance Through Fuzzy Logic Authentication” Journal of Theoretical And Applied Information Technology, 29, 102(4).

X. Lu, Z. Pan, & H. Xian, (2020) “An efficient and secure data sharing scheme for mobile devices in cloud computing”, Journal of Cloud Computing, 9(1), pp. 1–13, https://doi.org/10.1186/s13677-020-00207-5

W. Feng, Z. Yan, L. T. Yang, & Q. Zheng, (2022) “Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing. IEEE Internet of Things Journal, 9(16), pp. 14185–14202, https://doi.org/10.1109/JIOT.2020.3018878

D. Rangwani, & H. Om, (2021) “A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment”, Arabian Journal for Science and Engineering, 46(4), pp. 3865–3888, https://doi.org/10.1007/s13369-020-05276-x

M. Swetha, & M. Latha, (2023) “Security on mobile cloud computing using cipher text policy and attribute based encryption scheme”, Materials Today: Proceedings, 80, pp. 3059–3063, https://doi.org/10.1016/j.matpr.2021.06.462

M. Xie, Y. Ruan, H. Hong, & J. Shao, (2021) “A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices”, Future Generation Computer Systems, 121, pp. 114–122, https://doi.org/10.1016/j.future.2021.03.021

H. Zhong, C. Zhang, J. Cui, Y. Xu, & L. Liu, (2022) “Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud”, IEEE Transactions on Cloud Computing, 10(3), pp. 1592–1603, https://doi.org/10.1109/TCC.2020.3004334

T. Zhu, Z. Qu, H. Xu, J. Zhang, Z. Shao, Y. Chen, S. Prabhakar, & J. Yang, (2020) “RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild”, IEEE Transactions on Mobile Computing, 19(2), pp. 466–483, https://doi.org/10.1109/TMC.2019.2892440

B. D. Deebak, F. Al-Turjman, & L. Mostarda, (2020) “Seamless secure anonymous authentication for cloud-based mobile edge computing”, Computers and Electrical Engineering, 87, pp. 1–13, https://doi.org/10.1016/j.compeleceng.2020.106782

Z. Ghaffar, S. Ahmed, K. Mahmood, S. H. Islam, M. M. Hassan, & G. Fortino, (2020) “An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems”, IEEE Access, 8, pp. 47144–47160, https://doi.org/10.1109/ACCESS.2020.2977264

O. O. Olakanmi, & K. Odeyemi, (2021) “Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services”, Computers and Security, 108, pp. 1–14, https://doi.org/10.1016/j.cose.2021.102369

M. Vivekanandan, V. N. Sastry, & U. Srinivasulu Reddy, (2021) “Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment”, Peer-to-Peer Networking and Applications, 14(3), pp. 1572–1595, https://doi.org/10.1007/s12083-020-01065-3

Downloads

Published

12.06.2024

How to Cite

Bala Anand Muthu. (2024). Secured User Authentication and Data Sharing for Mobile Cloud Computing Using 2C-Cubehash and PWCC . International Journal of Intelligent Systems and Applications in Engineering, 12(4), 4134 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7009

Issue

Section

Research Article