Abstract
Cloud computing environment (CCE) can empower an association to re-appropriate computing resources to increase monetary benefits. For both developers and the cloud users (CUs), CCE is transparent. Accordingly, it presents new difficulties when contrasted with precedent types of distributed computing. The precision of assessment results in CCE security risk assessment to take care of the issue of the multifaceted nature of the system and the classified fuzzy cloud method (CFCM) applied to CCE chance ID stage that captures the CCE risk factors through a complete investigation of CCE security area. Current CCE frameworks present a specific restriction on ensuring the client’s INFO privacy. We offer a homomorphic proxy re-encryption (HPRE) in this paper that enables various CU to share INFO that they redistributed HPRE encrypted utilizing their PubKs with the plausibility by a close procedure such as INFO remotely. The test of giving secrecy, uprightness, and access control (AC) of INFO facilitated on cloud stages is not provided for by conventional AC models. CFCM models were created through the duration of numerous decades to satisfy the association’s necessities, which accepted full authority over the physical structure of the assets. The hypothesis of the INFO proprietor, an INFO controller, and a supervisor is available in the equivalent trusted area. Besides, CCESR features like the essential unit, fuzzy set (FS) hypothesis, and EW strategy utilized to precisely measure the likelihood of CCE security risks (SR) and the subsequent damages of CCESR estimation. Eventually, the computation and authentication model specified, and the lack of CCE SECU threat evaluation examined.
This is a preview of subscription content, access via your institution.











References
Abd Elminaam DS (2018) Improving the security of cloud computing by building new hybrid cryptography algorithms. IJEIE 8(1):40–48
Albakri SH, Shanmugam B, Samy GN, Ldris NB, Ahmed A (2014) Security risk assessment framework for cloud computing environments. Secur Comput Netw 7(11):2114–2124
Athena J, Sumathy V (2017) Survey on public key cryptography scheme for securing data in cloud computing. Circuits Syst 8:77–92
Baghel S, Theng D, Shetty N, Prasad N, Nalini N (2016) Multilevel security model for cloud third-party authentication. In: Emerging research in computing information communication and applications. Springer, Singapore
Bröring A, Schmid S, Schindhelm CK, Khelil A, Kabisch S, Kramer D, Teniente E (2017) Enabling IoT ecosystems through platform interoperability. IEEE Softw 34(1):54–61
Diffie W, Hellman M (2006) New directions in cryptography. IEEE Trans Inf Theor 22(6):644–654
Fu Y, Wu XP, Ye Q, Peng X (2010) An approach for information systems security risk assessment on fuzzy set and entropy-weight. Tien Tzu Hsueh Pao 38(7):1489–1494
Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13:57–65
Jiang R, Ma ZF, Li T, Zhang QJ (2015) Study on security risk assessment for technology of cloud computing. Appl Electr Technol 41(3):111–115
Kwon H, Hahn C, Koo D, Hur J (2017) Scalable and reliable key management for secure deduplication in cloud storage. In: Proceedings of the IEEE 10th international conference on cloud computing (CLOUD), Honolulu in HI, USA
Latif R, Abbas H, Assar S, Ali Q (2014) Cloud computing risk assessment: a systematic literature review. In: Park JJ, Stojmenovic I, Choi M, Xhafa F (eds) Future information technology, vol 276. Springer, Berlin, pp 285–295
Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: Proceedings of the IEEE international conference on cloud computing, Beijing, China, 1–4 December 2009. Springer, Berlin/Heidelberg, pp 157–166
Ma Y, Lifang W, Xiaofeng G, He J, Yang Z (2017) A secure face verification scheme based on homomorphic encryption and deep neural networks. IEEE Access 5:16532–16538
Mell P, Grance T (2009) The NIST definition of cloud computing, version 15. National Institute of Standards and Technology, Gaithersburg in MD, USA. http://csrc.nist.gov/groups/SNS/cloud-computing
Mohsen Nia A, Jha NK (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of advances in cryptology (Eurocrypt ‘99), Prague, Czech Republic, pp 223–238
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 223–238
Park T, Seo H, Lee S, Kim H (2018) Secure data encryption for cloud-based human care services. J Sensors 2018:1–10
Punarselvam E, Sikkandar MY, Bakouri M, Prakash NB, Jayasankar T, Sudhakar S (2020) Different loading condition and angle measurement of human lumbar spine MRI image using ANSYS. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01939-7
Ramesh D, Mishra R, Edla DR (2017) Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy. Arab J Sci Eng 42:873–883
Sengan S, Chenthur Pandian S (2012) An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing. Int Rev Comput Softw 7(6):3037–3304
Sengan S, Chenthur Pandian S (2013a) A trust and co-operative nodes with affects of malicious attacks and measure the performance degradation on geographic aided routing in mobile ad hoc network. Life Sci J 10(4):158–163
Sengan S, Chenthur Pandian S (2013b) Trustworthy position-based routing to mitigate against the malicious attacks to signifies secured data packet using geographic routing protocol in MANET. WSEAS Trans Commun 12(11):584–2013
Sengan S, Chenthur Pandian S (2016) Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network. Int J Ad Hoc Ubiquit Comput 21(4):224–236
Sudhakar S, Vijaya Kumar V, Sathiya Kumar C, Priya V, Ravi L, Subramaniyaswamy V (2020) Unmanned aerial vehicle (UAV) based forest fire detection and monitoring for reducing false alarms in forest-fires. Comput Communicat 149:1–16. https://doi.org/10.1016/j.comcom.2019.10.007
Tang Q, Hartel P, Jonker W (2009) Inter-domain identity-based proxy re-encryption. In: Proceedings of the information security and cryptology, Beijing, China, 14–17 December 2008. Springer, Berlin/Heidelberg, pp 332–347
Vasanthi R, Jayavadivel R, Prasadh K, Vellingiri J, Akilarasu G, Sudhakar S, Balasubramaniam PM (2020) A novel user interaction middleware component system for ubiquitous soft computing environment by using fuzzy agent computing system. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01893-4
Wang HB, Liu F, Liu H (2012) A method of the cloud computing security management risk assessment. In: Zeng DH (ed) Advances in intelligent and soft computing, vol 141. Springer, Berlin, pp 609–618
Wang XA, Xhafa F, Ma J, Zheng Z (2019) Controlled secure social cloud data sharing based on a novel identity-based proxy re-encryption plus scheme. J Parallel Distrib Comput 130:153–165
Weis S, Sarma S, Rivest R, Engels D (2004) Security and privacy aspects of low-cost radio frequency identification systems. Secur Pervas Comput 2802:201–212
Xu P, Jiao T, Wu Q, Wang W, Jin H (2016) Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans Comput 65(1):66–79
Zhang X, Guo W, Li Z, Zhao X, Qin X (2014) MLFS: a multiple layers share file system for cloud computing. In: Globecom workshop, pp 99–105
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Additional information
Communicated by V. Loia.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Veerabathiran, V.K., Mani, D., Kuppusamy, S. et al. Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Comput 24, 18893–18908 (2020). https://doi.org/10.1007/s00500-020-05119-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-020-05119-9