PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Decentralized device authentication for cloud systems with blockchain using skip graph algorithm

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cloud computing provides centralized computing services to the user on demand. Despite this sophisticated service, it suffers from single-point failure, which blocks the entire system. Many security operations consider this single-point failure, which demands alternate security solutions to the aforesaid problem. Blockchain technology provides a corrective measure to a single-point failure with the decentralized operation. The devices communicating in the cloud environment range from small IoT devices to large cloud data storage. The nodes should be effectively authenticated in a blockchain environment. Mutual authentication is time-efficient when the network is small. However, as the network scales, authentication is less time-efficient, and dynamic scalability is not possible with smart contract-based authentication. To address this issue, the blockchain node runs the skip graph algorithm to retrieve the registered node. The skip graph algorithm possesses scalability and decentralized nature, and retrieves a node by finding the longest prefix matching. The worst time complexity is O(log n) for maximum n nodes. This method ensures fast nodal retrieval in the mutual authentication process. The proposed search by name id algorithm through skip graph is efficient compared with the state-of-art existing work and the performance is also good compared with the existing work where the latency is reduced by 30–80%, and the power consumption is reduced by 32–50% compared to other considered approaches.
Rocznik
Strony
203--221
Opis fizyczny
Bibliogr. 46 poz., rys., tab., wykr.
Twórcy
autor
  • Department of Information Technology, Noorul Islam Centre for Higher Education, Kumaracoil, Tamil Nadu, India
  • Department of Information Technology, Noorul Islam Centre for Higher Education, Kumaracoil, Tamil Nadu, India
Bibliografia
  • 1. P. Mell, T. Grance, The NIST definition of cloud computing, National Institute of Standards and Technology Special Publication, NIST Special Publication 800-145 , 53 : 1–7, 2011.
  • 2. A.T. Velte, T.J. Velte, R. Elsenpeter, Cloud Computing: A Practical Approach , McGraw-Hill, 2010.
  • 3. M. Ahronovitz et al. , Cloud Computing Use Cases , A white paper produced by the cloud computing use case discussion group version 4.0, 2010.
  • 4. M. Jensen, J. Schwenk, N. Gruschka, L.L. Iacono, On technical security issues in cloud computing, [in:] 2009 IEEE International Conference on Cloud Computing , 21–25 Sept., Bangalore, India, pp. 109–116, 2009, doi: 10.1109/CLOUD.2009.60.
  • 5. A. Mxoli, M. Gerber, N. Mostert-Phipps, Information security risk measures for cloud-based personal health records, [in:] International Conference on Information Society (i-Society 2014) , 1–12 Nov., London, UK, pp. 187–193, 2014, doi: 0.1109/i-Society.2014.7009039.
  • 6. A. Bouayad, A. Blilat, N.E.H. Mejhed, M. El Ghazi, Cloud computing: Security challenges, [in:] 2012 Colloquium in Information Science and Technology , 22–24 Oct., Fez, Morocco, pp. 26–31, 2012, doi: 10.1109/CIST.2012.6388058.
  • 7. B.R. Kandukuri, Ramakrishna Paturi V., A. Rakshit, Cloud security issues, [in:] 2009 IEEE International Conference on Services Computing , 21–25 Sept., Bangalore, India, pp. 517–520, 2009, doi: 10.1109/SCC.2009.84.
  • 8. D. Riquet, G. Grimaud, M. Hauspie, Large-scale coordinated attacks: Impact on the cloud security, [in:] 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) , 4–6 July, Palermo, Italy, pp. 558–563, 2012, doi: 10.1109/IMIS.2012.76.
  • 9. K. Kourai, T. Azumi, S. Chiba, A self-protection mechanism against stepping-stone attacks for IaaS clouds, [in:] 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Com- puting (UIC/ATC) , 4–7 Sept., Fukuoka, Japan, pp. 539–546, 2012, doi: 10.1109/UIC- ATC.2012.13.
  • 10. H. Wu, Y. Ding, C. Winer, L. Yao, Network security for virtual machine in cloud computing, [in:] 5th International Conference on Computer Sciences and Convergence Infor- mation Technology (ICCIT) , 30 Nov.–2 Dec., Seoul, South Korea, pp. 18–21, 2010, doi: 10.1109/ICCIT.2010.5711022.
  • 11. T. Acar, M. Belenkiy, A. Küpçü, Single password authentication, Computer Networks , 57 (13): 2597–2614, 2013, doi: 10.1016/j.comnet.2013.05.007.
  • 12. P. Liu, S.H. Shirazi, W. Liu, Y. Xie, pKAS: A secure password-based key agreement scheme for the edge cloud, Security and Communication Networks , 2021 : Article ID 6571700, pp. 1–10, 2021, doi: 10.1155/2021/6571700.
  • 13. S.M. Gurav, L.S. Gawade, P.K. Rane, N.R. Khochare, Graphical password authentication: Cloud securing scheme, [in:] 2014 IEEE International Conference on Electronic Systems, Signal Processing and Computing Technologies , 9–11 Jan., Nagpur, India, pp. 479–483, 2014, doi: 10.1109/ICESC.2014.90.
  • 14. A.A. Yassin, H. Jin, A. Ibrahim, D. Zou, Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing, [in:] 2012 Second IEEE International Conference on Cloud and Green Computing , 1–3 Nov., Xiangtan, China, pp. 282–289, 2012, doi: 10.1109/CGC.2012.91.
  • 15. M. Karnan, M. Akila, N. Krishnaraj, Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing , 11 (2): 1565–1573, 2011, doi: 10.1016/j.asoc.2010.08.003.
  • 16. K. Abhishek, S. Roshan, P. Kumar, R. Ranjan, A comprehensive study on multifactor authentication schemes, [in:] N. Meghanathan, D. Nagamalai, N. Chaki [Eds.], Advances in Computing and Information Technology, Advances in Intelligent Systems and Computing , 177 : 561–568, Springer, Berlin, Heidelberg, 2013, doi: 10.1007/978-3-642-31552-7_57.
  • 17. E.T. Anzaku, H. Sohn, Y.M. Ro, Multi-factor authentication using fingerprints and user-specific random projection, [in:] IEEE 2010 12th International Asia-Pacific Web Conference , 6–8 April, Busan, South Korea, pp. 415–418, 2010, doi: 10.1109/APWeb.2010.44.
  • 18. S. Ziyad, A. Kannammal, A multifactor biometric authentication for the cloud, [in:] G. Krishnan, R. Anitha, R. Lekshmi, M. Kumar, A. Bonato, M. Graña [Eds.], Computational Intelligence, Cyber Security and Computational Models , 246 : 395–403, Springer, New Delhi, 2014, doi: 10.1007/978-81-322-1680-3_43.
  • 19. X.C. Jiang, J.D. Zheng, An indirect fingerprint authentication scheme in cloud computing, Applied Mechanics and Materials , 484–485 : 986–990, 2014, doi: 10.4028/www.scientific.net/AMM.484-485.986.
  • 20. M. Babaeizadeh, M. Bakhtiari, M.A. Maarof, Keystroke dynamic authentication in mobile cloud computing, International Journal of Computer Applications , 90 (1): 29–36, 2014, doi: 10.5120/15541-4274.
  • 21. M.A. Ferrer, A. Morales, C.M. Travieso, J.B. Alonso, Low cost multimodal biometric identification system based on hand geometry, palm and finger print texture, [in:] 2007 41st IEEE International Carnahan Conference on Security Technology , 8–11 Oct., Ottawa, Canada, pp. 52–58, 2007, doi: 10.1109/CCST.2007.4373467.
  • 22. B. Cui, T. Xue, Design and realization of an intelligent access control system based on voice recognition, [in:] 2009 ISECS International Colloquium on Computing, Communication, Control, and Management , 8–9 Aug., Sanya, China, pp. 229–232, 2009, doi: 10.1109/CCCM.2009.5270462.
  • 23. R. Jafri, H.R. Arabnia, A survey of face recognition techniques, Journal of Information Processing Systems , 5 (2): 41–68, 2009, doi: 10.3745/JIPS.2009.5.2.041.
  • 24. A.K. Jain, S. Prabhakar, L. Hong, S. Pankanti, Filterbank-based fingerprint matching, IEEE Transactions on Image Processing , 9 (5): 846–859, 2000, doi: 10.1109/83.841531.
  • 25. D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems , 28 (3): 583–592, 2012, doi: 10.1016/j.future.2010.12.006.
  • 26. J. Chen, G. Wu, L. Shen, Z. Ji, Differentiated security levels for personal identifiable information in identity management system, Expert Systems with Applications , 38 (11): 14156–14162, 2011, doi: 10.1016/j.eswa.2011.04.226.
  • 27. U. Khalid, M. Asim, T. Baker, P.C.K. Hung, M.A. Tariq, L. Rafferty, A decentralized lightweight blockchain-based authentication mechanism for IoT systems, Cluster Computing , 23 : 2067–2087, 2020, doi: 10.1007/s10586-020-03058-6.
  • 28. M.T. Hammi, B. Hammi, P. Bellot, A. Serhrouchni, Bubbles of Trust: A decentralized blockchain-based authentication system for IoT, Computers & Security , 78 : 126–142, 2018, doi: 10.1016/j.cose.2018.06.004.
  • 29. C.H. Lau, K.-H.Y. Alan, F. Yan, Blockchain-based authentication in IoT networks, [in:] 2018 IEEE Conference on Dependable and Secure Computing (DSC) , 10–13 Dec., Kaohsiung, Taiwan, pp. 1–8, 2018, doi: 10.1109/DESEC.2018.8625141.
  • 30. D. Li, W. Peng, W. Deng, F. Gai, A blockchain-based authentication and security mechanism for IoT, [in:] 2018 27th IEEE International Conference on Computer Communication and Networks (ICCCN) , 30 July–2 Aug., Hangzhou, China, pp. 1–6, 2018, doi: 10.1109/ICCCN.2018.8487449.
  • 31. G. Kumar, R. Saha, M.K. Rai, R. Thomas, T.H. Kim, Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics, IEEE Internet of Things Journal , 6 (4): 6835–6842, 2019, doi: 10.1109/JIOT.2019.2911969.
  • 32. J. Kang, Z. Xiong, D. Niyato, P. Wang, D. Ye, D.I. Kim, Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks, [in:] IEEE Wireless Communications Letters , 8 (1): 157–160, 2019, doi: 10.1109/LWC.2018.2864758.
  • 33. J. Sousa, A. Bessani, M. Vukolic, A Byzantine fault-tolerant ordering service for the hyper-ledger fabric blockchain platform, [in:] 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) , 25–28 June, Luxembourg, Luxem- bourg, pp. 51–58, 2018, doi: 10.1109/DSN.2018.00018.
  • 34. B. Chase, E. MacBrough, Analysis of the XRP ledger consensus protocol, arXiv , 2018, doi: 10.48550/arXiv.1802.07242.
  • 35. Y. Hassanzadeh-Nazarabadi, A.U. Şahin, Ö. Özkasap, A. Küpçü, SkipSim: Scalable skip graph simulator, [in:] 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) , 2–6 May, Toronto, Canada, pp. 1–2, 2020, doi: 10.1109/ICBC48266. 2020.9169426.
  • 36. F. Wu, X. Li, L. Xu, S. Kumari, M. Karuppiah, J. Shen, A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server, Computers & Electrical Engineering , 63 : 168–181, 2017, doi: 10.1016/j.compeleceng.2017.04.012.
  • 37. M.N. Aman, K.C. Chua, B. Sikdar, Mutual authentication in IoT systems using physical unclonable functions, IEEE Internet of Things Journal , 4 (5): 1327–1340, 2017, doi: 10.1109/JIOT.2017.2703088.
  • 38. P. Gope, B. Sikdar, Lightweight and privacy-preserving two-factor authentication scheme for IoT devices, IEEE Internet of Things Journal , 6 (1): 580–589, 2019, doi: 10.1109/JIOT.2018.2846299.
  • 39. A. Singh, K. Chatterjee, A secure multi-tier authentication scheme in cloud computing environment, [in:] 2015 International Conference on Circuits, Power and Computing Technologies , 19–20 March, Nagercoil, India, pp. 1–7, 2015, doi: 10.1109/ICCPCT.2015.7159276.
  • 40. S.M. Bellovin, M. Merritt, Encrypted key exchange: password based protocols secure against dictionary attacks, [in:] Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy (SRSP92) , 4–6 May, Oakland, California, pp. 72–84, 1992, doi: 10.1109/RISP.1992.213269.
  • 41. P.S. Kumar, R. Subramanian, An efficient and secure protocol for ensuring data storage security in cloud computing, IJCSI International Journal of Computer Science Issues , 8 (6): 261–274, 2011.
  • 42. K. Gunjan, G. Sahoo, R.K. Tiwari, Identity management in cloud computing – A review, International Journal of Engineering Research & Technology , 1 (4): 1–5, 2012.
  • 43. K. Alhamazani et al. , An overview of the commercial cloud monitoring tools: Research dimensions, design issues, and state-of-the-art, Computing , 97 (4): 357–377, 2015, doi: 10.1007/s00607-014-0398-5 .
  • 44. C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, A survey of intrusion detection techniques in cloud, Journal of Network and Computer Applications , 36 (1): 42–57, 2013, doi: 10.1016/j.jnca.2012.05.003.
  • 45. J. Tong, G. Xiong, Y. Zhao, L. Guo, A research on the vulnerability in popular P2P protocols, [in:] 2013 8th International Conference on Communications and Networking in China (CHINACOM) , 14–16 Aug., Guilin, China, pp. 405–409, 2013, doi: 10.1109/ChinaCom.2013.6694630.
  • 46. K. Amit, C. Chinmay, J. Wilson, A novel fog computing approach for minimization of latency in healthcare using machine learning, International Journal of Interactive Multimedia and Artificial Intelligence , 6 (7): 7–17, 2020, doi: 10.9781/ijimai.2020.12.004.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c9cd5359-4590-4135-aa1c-f8362dd6f3c1
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.