EFFICIENT SECURE DATA STORAGE AND DATA RETRIEVAL ON CLOUD USING MULTI‑STAGE AUTHENTICATION FROM CLOUD DATABASES

Tunuguntla Kishore Babu, Dr Guruprakash C

Abstract

Cloud computing is becoming a major player in the information technology business as of its increased effectiveness, broad accessibility, low cost, and numerous advantages. It similarly offers additional storage capacity for Internet users and faster data transmission from one locality to another. Because of the large amount of storage available, cloud users can save a significant amount of money on IT infrastructure while focusing on their central business. As a result, a growing number of businesses and organizations are migrating to the cloud. However, due to security and privacy issues, many customers are hesitant to use the cloud. In a cloud computing system, all data is distributed across a network of remote servers and locations. Unauthorized cloud users gained access to this information via virtual computers. To address this issue, this paper proposes efficient secure data storage and retrieval system for cloud environment. To offer an additional level for cloud data security, this paper proposes authentication through encryption consuming public key cryptography, as well as multiple authentication-based data retrieval. The proposed Authentication Based Encryption approach contributes to better data security and cloud user authentication. The profound data is encrypted first and at that time secretly saved with the user's biometric finger print image. The resulting image is then transferred via an insecure channel. To prevent unauthorized access, the image is deconstructed and saved in the cloud distinctly as an encrypted message and a fingerprint. To improve system security, the encrypted and decrypted key value is appropriately selected using a search method. Following the encryption process, a data recovery procedure based on multiple security authentications is initiated. Unauthorized individuals will not be able to assault the data as a result of this. The proposed methodology's performance is executed, and the results are examined using several measures.

Keywords:

:Cloud Computing, Multiple authentication, Binary crow search, Biometric based finger print encryption


Full Text:

PDF


References


1. RajkumarBuyya, James Broberg and Andrzej Goscinski, “Cloud Computing Principles and Paradigms”, John Wiley and Sons, Inc, 2011. 2. Bisong, A. and Rahman, S.S.M. (2011) “An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, Vol. 3, Issue 1, Pg. 30-45, 2011 3. Dinesha, H. A., & Agrawal, V. K. “Multi-level authentication technique for accessing cloud services” In 2012 International Conference on Computing, Communication and Applications (pp. 1-4). IEEE, Feb 2012 4. Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., & Tang, Y, Cloud-aided lightweight certificate less authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications, 106, 117-123, 2018. 5. Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari, Data Security using RSA Algorithm in Cloud Computing, International Journal of Advanced Research in Computer and Communication Engineering,Vol. 5, Issue 8, Aug 2016 6. D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano, Cheng “ Public Key Encryption with Keyword Search”, Proc. International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt), 2018. 7. R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, Sudhakar “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,” Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2020. 8. O S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r Brindha: Top-k Retrieval from a Confidential Index,” Proc. 12th International Conference on Extending Database Technology: Advances in Database Technology (EDBT), 2018. 9. A. Swaminathan, Pournaghi Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D.W. Oard, “Confidentiality-Preserving Rank-Ordered Search,” Proc. Workshop Storage Security and Survivability, 2020. 10. C. Wang, N. Cao, K. Ren, W. Lou, Suathi “ Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions On Parallel and Distributed Systems, Vol. 23, No. 8, August 2020. 11. P.S. Priya, D. Preethi, J. Priya, B. Shanthini, Suresha and Karthick “ Retrieval of Encrypted Data Using Multi Keyword Top-k Algorithm”, International Journal of Scientific and Research Publications, Vol. 4, Issue 4, April 2020. 12. P. Akriti, P. Mary Ann, D. Sarvanan, Kali “ Ranked Keyword Search Using RSE over Outsourced Cloud Data”, IPASJ International Journal of Computer Science, Vol. 2, Issue 3, March 2019. 13. Shen D.Song, D. Wanger, and A. Perrig, “Practical Techniques for Searches on Encrypted Data” Proc. IEEE symp. Security and Privacy, 2020 14. Sunanda B.Reddy Kandukuri, V. Ramakrishna, A. Rakshit, “Cloud Security Issues”, 2019 IEEE International Conference on service computing(SSC 2019), September 2019, Bangalore. pp. 517-520

Refbacks

  • There are currently no refbacks.