Preserving User Privacy with Anonymous Authentication in Cloud Computing
نویسندگان
چکیده
Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most of the current authentication schemes rely on trusted third party to identify and verify user’s credential which can lead to transparency issue. In order to ensure for a secured transaction, they have to preserve user’s privacy from being exposed. The reveal information of user’s credential will make it easier for attacker to gain the information for accessing to classified data. They can intercept and manipulate user’s identity to gain access to sensitive data of user in the cloud storage. This issue can be solved by introducing anonymity features in the authentication scheme by hiding the user’s information as well as to protect the user’s identity from getting abused. Anonymity will protect user’s identity by hiding the real users’ identity during the authentication process especially when users have to deal with third party in their communication. The threat does not only come from external attacker but also comes from internal party who has full authority access to the server. This paper proposed an anonymous authentication scheme which is a combination of password-based authentication and anonymity feature in order to preserve user’s privacy without involving the trusted third party during the authentication process. As a result, it can guarantee a secured transaction with anonymity features to protect user’s privacy. This paper also presents the description of data privacy and security which can influence user’s trust in using cloud services. Security analysis descriptions of possible attacks to the proposed scheme are also presented in this paper. The Secure Remote Password (SRP) protocol is used for this project with some enhancement to algorithm. In the future, the proposed scheme will be tested with some of the possible attack threats to prove that it is secured against the attack. The significant of this research is to preserve user’s privacy with anonymous password-based authentication in the cloud environment without any requirement to trusted third party which can resist from vulnerability to attacks.
منابع مشابه
An Efficient Data Security Mechanism in Cloud Computing Using Anonymous ID Algorithm
Cloud computing has evolved from a risky and confusing concept to a strategy that organization large and small are beginning to adopt as part of their to overall computing strategy. Cloud computing is a method of providing a set of shared computing resources that includes application, computing, storage, netorking, development and deployment platforms as well as business processes.. Research on...
متن کاملPrivacy - Preserving Public Authentication for Shared Data in Cloud
Data security is an important in cloud. Access control is major issue to secure the stored data in cloud. Thus the proposing privacy preserving authenticated access control scheme for securing shared data in cloud. In the proposed scheme supports authenticated access control for anonymous user to share data on cloud also additional feature in access control which provides authentication for the...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملSecure Cloud based Privacy Preserving DataMinning Platform
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blinda...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015