Skip to main content

Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption

Abstract

Cloud computing environment (CCE) can empower an association to re-appropriate computing resources to increase monetary benefits. For both developers and the cloud users (CUs), CCE is transparent. Accordingly, it presents new difficulties when contrasted with precedent types of distributed computing. The precision of assessment results in CCE security risk assessment to take care of the issue of the multifaceted nature of the system and the classified fuzzy cloud method (CFCM) applied to CCE chance ID stage that captures the CCE risk factors through a complete investigation of CCE security area. Current CCE frameworks present a specific restriction on ensuring the client’s INFO privacy. We offer a homomorphic proxy re-encryption (HPRE) in this paper that enables various CU to share INFO that they redistributed HPRE encrypted utilizing their PubKs with the plausibility by a close procedure such as INFO remotely. The test of giving secrecy, uprightness, and access control (AC) of INFO facilitated on cloud stages is not provided for by conventional AC models. CFCM models were created through the duration of numerous decades to satisfy the association’s necessities, which accepted full authority over the physical structure of the assets. The hypothesis of the INFO proprietor, an INFO controller, and a supervisor is available in the equivalent trusted area. Besides, CCESR features like the essential unit, fuzzy set (FS) hypothesis, and EW strategy utilized to precisely measure the likelihood of CCE security risks (SR) and the subsequent damages of CCESR estimation. Eventually, the computation and authentication model specified, and the lack of CCE SECU threat evaluation examined.

This is a preview of subscription content, access via your institution.

Fig. 1: SECU
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

References

  1. Abd Elminaam DS (2018) Improving the security of cloud computing by building new hybrid cryptography algorithms. IJEIE 8(1):40–48

    Google Scholar 

  2. Albakri SH, Shanmugam B, Samy GN, Ldris NB, Ahmed A (2014) Security risk assessment framework for cloud computing environments. Secur Comput Netw 7(11):2114–2124

    Article  Google Scholar 

  3. Athena J, Sumathy V (2017) Survey on public key cryptography scheme for securing data in cloud computing. Circuits Syst 8:77–92

    Article  Google Scholar 

  4. Baghel S, Theng D, Shetty N, Prasad N, Nalini N (2016) Multilevel security model for cloud third-party authentication. In: Emerging research in computing information communication and applications. Springer, Singapore

  5. Bröring A, Schmid S, Schindhelm CK, Khelil A, Kabisch S, Kramer D, Teniente E (2017) Enabling IoT ecosystems through platform interoperability. IEEE Softw 34(1):54–61

    Article  Google Scholar 

  6. Diffie W, Hellman M (2006) New directions in cryptography. IEEE Trans Inf Theor 22(6):644–654

    MathSciNet  Article  Google Scholar 

  7. Fu Y, Wu XP, Ye Q, Peng X (2010) An approach for information systems security risk assessment on fuzzy set and entropy-weight. Tien Tzu Hsueh Pao 38(7):1489–1494

    Google Scholar 

  8. Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13:57–65

    Article  Google Scholar 

  9. Jiang R, Ma ZF, Li T, Zhang QJ (2015) Study on security risk assessment for technology of cloud computing. Appl Electr Technol 41(3):111–115

    Google Scholar 

  10. Kwon H, Hahn C, Koo D, Hur J (2017) Scalable and reliable key management for secure deduplication in cloud storage. In: Proceedings of the IEEE 10th international conference on cloud computing (CLOUD), Honolulu in HI, USA

  11. Latif R, Abbas H, Assar S, Ali Q (2014) Cloud computing risk assessment: a systematic literature review. In: Park JJ, Stojmenovic I, Choi M, Xhafa F (eds) Future information technology, vol 276. Springer, Berlin, pp 285–295

    Chapter  Google Scholar 

  12. Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: Proceedings of the IEEE international conference on cloud computing, Beijing, China, 1–4 December 2009. Springer, Berlin/Heidelberg, pp 157–166

  13. Ma Y, Lifang W, Xiaofeng G, He J, Yang Z (2017) A secure face verification scheme based on homomorphic encryption and deep neural networks. IEEE Access 5:16532–16538

    Article  Google Scholar 

  14. Mell P, Grance T (2009) The NIST definition of cloud computing, version 15. National Institute of Standards and Technology, Gaithersburg in MD, USA. http://csrc.nist.gov/groups/SNS/cloud-computing

  15. Mohsen Nia A, Jha NK (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602

    Article  Google Scholar 

  16. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of advances in cryptology (Eurocrypt ‘99), Prague, Czech Republic, pp 223–238

  17. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 223–238

  18. Park T, Seo H, Lee S, Kim H (2018) Secure data encryption for cloud-based human care services. J Sensors 2018:1–10

    Google Scholar 

  19. Punarselvam E, Sikkandar MY, Bakouri M, Prakash NB, Jayasankar T, Sudhakar S (2020) Different loading condition and angle measurement of human lumbar spine MRI image using ANSYS. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01939-7

    Article  Google Scholar 

  20. Ramesh D, Mishra R, Edla DR (2017) Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy. Arab J Sci Eng 42:873–883

    MathSciNet  Article  Google Scholar 

  21. Sengan S, Chenthur Pandian S (2012) An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing. Int Rev Comput Softw 7(6):3037–3304

    Google Scholar 

  22. Sengan S, Chenthur Pandian S (2013a) A trust and co-operative nodes with affects of malicious attacks and measure the performance degradation on geographic aided routing in mobile ad hoc network. Life Sci J 10(4):158–163

    Google Scholar 

  23. Sengan S, Chenthur Pandian S (2013b) Trustworthy position-based routing to mitigate against the malicious attacks to signifies secured data packet using geographic routing protocol in MANET. WSEAS Trans Commun 12(11):584–2013

    Google Scholar 

  24. Sengan S, Chenthur Pandian S (2016) Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network. Int J Ad Hoc Ubiquit Comput 21(4):224–236

    Article  Google Scholar 

  25. Sudhakar S, Vijaya Kumar V, Sathiya Kumar C, Priya V, Ravi L, Subramaniyaswamy V (2020) Unmanned aerial vehicle (UAV) based forest fire detection and monitoring for reducing false alarms in forest-fires. Comput Communicat 149:1–16. https://doi.org/10.1016/j.comcom.2019.10.007

    Article  Google Scholar 

  26. Tang Q, Hartel P, Jonker W (2009) Inter-domain identity-based proxy re-encryption. In: Proceedings of the information security and cryptology, Beijing, China, 14–17 December 2008. Springer, Berlin/Heidelberg, pp 332–347

  27. Vasanthi R, Jayavadivel R, Prasadh K, Vellingiri J, Akilarasu G, Sudhakar S, Balasubramaniam PM (2020) A novel user interaction middleware component system for ubiquitous soft computing environment by using fuzzy agent computing system. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01893-4

    Article  Google Scholar 

  28. Wang HB, Liu F, Liu H (2012) A method of the cloud computing security management risk assessment. In: Zeng DH (ed) Advances in intelligent and soft computing, vol 141. Springer, Berlin, pp 609–618

    Google Scholar 

  29. Wang XA, Xhafa F, Ma J, Zheng Z (2019) Controlled secure social cloud data sharing based on a novel identity-based proxy re-encryption plus scheme. J Parallel Distrib Comput 130:153–165

    Article  Google Scholar 

  30. Weis S, Sarma S, Rivest R, Engels D (2004) Security and privacy aspects of low-cost radio frequency identification systems. Secur Pervas Comput 2802:201–212

    Article  Google Scholar 

  31. Xu P, Jiao T, Wu Q, Wang W, Jin H (2016) Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans Comput 65(1):66–79

    MathSciNet  Article  Google Scholar 

  32. Zhang X, Guo W, Li Z, Zhao X, Qin X (2014) MLFS: a multiple layers share file system for cloud computing. In: Globecom workshop, pp 99–105

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Devi Mani.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Communicated by V. Loia.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Veerabathiran, V.K., Mani, D., Kuppusamy, S. et al. Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Comput 24, 18893–18908 (2020). https://doi.org/10.1007/s00500-020-05119-9

Download citation

Keywords

  • CCE
  • Cloud security
  • Fuzzy set theory
  • Risk assessment
  • Access control mechanism