Enhanced Data Privacy and Security in Cloud Storage: A Robust Authentication Scheme for Cyber-Physical-Social Systems
Metadatos
Mostrar el registro completo del ítemEditorial
Universidad de Granada
Materia
Cloud storage Data security Authentication User anonymity Elliptic curve cryptography
Fecha
2024-12-31Referencia bibliográfica
S.Mahesh Reddy, M.Sana, M.Sushma, M.Divya Sri. (2024). Enhanced Data Privacy and Security in Cloud Storage: A Robust Authentication Scheme for Cyber-Physical-Social Systems,Vol.15(5).383-392. ISSN 1989-9572
Resumen
Cloud storage services are increasingly being adopted by organizations for managing and storing data
due to their cost-effectiveness and resource scalability. However, the rise in cloud usage brings concerns
regarding data security and user authentication, particularly in Cyber-Physical-Social Systems (CPSS).
According to recent reports, over 60% of cloud users experience data breaches, and more than 30% are
concerned about unauthorized access to personal data. Existing cloud security mechanisms such as
encryption often fall short in ensuring user anonymity and preventing impersonation attacks. To address
these gaps, the proposed paper introduces a robust authentication scheme aimed at enhancing data
privacy and security in cloud storage. The core innovations lie in two critical aspects: user anonymity
and protection against user/cloud impersonation attacks. User identities, including usernames and
biometric data, are anonymized through hashing, ensuring that cloud servers cannot track or misuse this
information. Additionally, sessions are dynamically created and terminated during login/logout,
preventing the cloud server from logging activities or accessing sensitive data. The paper outlines a
comprehensive approach involving user registration, login verification, file upload and download, and
session management, along with the application of advanced encryption techniques like Elliptic Curve
Cryptography (ECC) and CHACHA. The computation performance of these algorithms is also
evaluated through a comparison graph, highlighting their efficiency. The novel contributions enhance
data security while ensuring seamless cloud data access and sharing.