Open Access iconOpen Access

ARTICLE

crossmark

An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

K. Raju*, M. Chinnadurai

Department of Information Technology, E. G. S. Pillay Engineering College, Nagapattinam, Tamilnadu, India.

* Corresponding Author: K. Raju. Email: email

Computers, Materials & Continua 2021, 69(1), 1057-1072. https://doi.org/10.32604/cmc.2021.016068

Abstract

Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMO-ISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process to extract features from the iris and fingerprint. Next, the features are fed into the hybrid social spider using the dragon fly algorithm to determine the optimal solution. This optimal solution acts as a key for an advanced encryption standard to encrypt and decrypt the data. A central benefit of determining the optimal value in this way is that the intruder cannot determine this value. The attacker also cannot work out which specific part of the fingerprint and iris feature values are acted upon as a key for the AES technique. Finally, the encrypted data can be saved in the cloud using a cloud simulator. Experimental analysis was performed on five fingerprint and iris images for a man-in-the-middle attack. The simulation outcome validated that the presented HMO-ISOA model achieved better results compared with other existing methods.

Keywords


Cite This Article

K. Raju and M. Chinnadurai, "An identity-based secure and optimal authentication scheme for the cloud computing environment," Computers, Materials & Continua, vol. 69, no.1, pp. 1057–1072, 2021.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1896

    View

  • 1192

    Download

  • 0

    Like

Share Link