Open Access iconOpen Access

ARTICLE

crossmark

Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

V. Rajkumar1,*, M. Prakash2, V. Vennila3

1 Department of Computer Science and Engineering, Krishnasamy College of Engineering and Technology (Affiliated to Anna University, Chennai), Cuddalore, 607109, India
2 Department of Computer Science and Engineering, School of Computing, SRM Institute of Science & Technology, Kattankulathur, 603203, India
3 Department of Computer Science and Engineering, K.S.R. College of Engineering (Affiliated to Anna University, Chennai), Tiruchengode, 637215, India

* Corresponding Author: V. Rajkumar. Email: email

Computer Systems Science and Engineering 2022, 40(2), 779-793. https://doi.org/10.32604/csse.2022.019622

Abstract

Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the verifier who maintains the access list. Verification is conducted by following Gulliou-Quisquater protocol which determines the security level of the user in multi-step authentication process. Here, RSA algorithm performs the key generation process while the proposed methodology provides data integrity as well as confidentiality using asymmetric encryption. Various methodological operations such as time consumption have been used as performance evaluators in the proposed SIPS protocol. The proposed solution provides a secure system for firm data sharing in cloud environment with confidentiality, authentication and access control. Stochastic Timed Petri (STPN) Net evaluation tool was used to verify and prove the formal analysis of SIPS methodology. This evidence established the effectiveness of the proposed methodology in secure data sharing in cloud environment.

Keywords


Cite This Article

APA Style
Rajkumar, V., Prakash, M., Vennila, V. (2022). Secure data sharing with confidentiality, integrity and access control in cloud environment. Computer Systems Science and Engineering, 40(2), 779-793. https://doi.org/10.32604/csse.2022.019622
Vancouver Style
Rajkumar V, Prakash M, Vennila V. Secure data sharing with confidentiality, integrity and access control in cloud environment. Comput Syst Sci Eng. 2022;40(2):779-793 https://doi.org/10.32604/csse.2022.019622
IEEE Style
V. Rajkumar, M. Prakash, and V. Vennila, “Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment,” Comput. Syst. Sci. Eng., vol. 40, no. 2, pp. 779-793, 2022. https://doi.org/10.32604/csse.2022.019622



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2368

    View

  • 1827

    Download

  • 0

    Like

Share Link