Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
- PDF / 2,163,515 Bytes
- 17 Pages / 595.276 x 790.866 pts Page_size
- 89 Downloads / 220 Views
SPECIAL ISSUE PAPER
Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment J. V. Bibal Benifa1 · G. Venifa Mini2 Received: 7 May 2020 / Revised: 22 September 2020 / Accepted: 24 October 2020 © Springer-Verlag London Ltd., part of Springer Nature 2020
Abstract Cloud computing is a popular model for offering infinite storage resources for the users. In the present scenario, extremely sensitive data is stored in the third-party cloud service provider’s infrastructure. For instance, patients who have direct access to the healthcare system may access the cloud-based health care data at any time based on the needs. Such sensitive data is subjected to various security issues because of the entities from multiple hosts connecting to cloud storage. In the proposed work, an optimized secured data access control mechanism named as modified Chebyshev polynomial-based access control (MCPAC) is presented. In MCPAC scheme, multiple levels of verification and authentications are carried out to provide resilience against widely recognized attacks. The proposed access control scheme is evaluated in a real private cloud infrastructure using the metrics, such as precision, recall and detection rate. It is proved that the proposed MCPAC offers better privacy protection with the precision of 0.8947, recall of 0.8983, and detection rate of 85.63%, which is high as compared to the conventional state-of-the-art methods. Security analysis is also done for the MCPAC scheme, and it indicates that the system efficiently handles the well-known attacks. The performance analysis shows that MCPAC meets the essential security mandates and excels in computational efficiency by making it suitable for the realistic applications hosted in a cloud computing environment. Keywords Access control mechanism · Chebyshev polynomial · Elliptic curve cryptography · Cloud infrastructure
1 Introduction Cloud computing has received greater attention from industrial and academic groups as a new standard business criterion in the recent years. The growth of cloud computing has enabled individuals and organizations to host their applications and sensitive data into the cloud rather than creating their own local data centers [1]. The cloud users enjoy various kinds of computing services offered by the public cloud service providers (CSP) at affordable costs [2]. All aspects of social life and network systems are constantly changing with the continuous development of communication techniques and cloud technologies. Online network accessibility attracts the attention of many stakeholders, for example, patients have
B
J. V. Bibal Benifa [email protected]
1
Indian Institute of Information Technology, Kottayam, India
2
Noorul Islam Centre for Higher Education, Kumaracoil, Tamil Nadu, India
easy access to the healthcare system hosted in the cloud for consulting physicians at any time [3]. User authentication is one of the initial significant components of all remote online services. The user must pro
Data Loading...