Visible to the public TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD

TitleTIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Publication TypeConference Paper
Year of Publication2018
AuthorsPrabha, K. M., Saraswathi, D. P. Vidhya
Conference Name2018 2nd International Conference on 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
KeywordsAccess Control, authenticated user, authentication, authentication accuracy, authentication server, authentications time, authenticity, authorisation, Blowfish encryption, cloud computing, cloud server, cloud services, cloud user, confidentiality rate, cryptography, CS grants, CU, encrypted ticket, Encryption, genuine user, Human Behavior, Kerberos, Kerberos biometric blowfish user authentication, message authentication, Metrics, pubcrawl, Registration, Resiliency, secured data access, security, Servers, Ticket Granting, tiger hash, Tiger Hash-based Kerberos biometric blowfish authentication, unauthorized users, user ID, user identity, users ID
Abstract

Cloud computing is a standard architecture for providing computing services among servers and cloud user (CU) for preserving data from unauthorized users. Therefore, the user authentication is more reliable to ensure cloud services accessed only by a genuine user. To improve the authentication accuracy, Tiger Hash-based Kerberos Biometric Blowfish Authentication (TH-KBBA) Mechanism is introduced for accessing data from server. It comprises three steps, namely Registration, Authentication and Ticket Granting. In the Registration process, client enrolls user details and stores on cloud server (CS) using tiger hashing function. User ID and password is given by CS after registration. When client wants to access data from CS, authentication server (AS) verifies user identity by sending a message. When authenticity is verified, AS accepts user as authenticated user and convinces CS that user is authentic. For convincing process, AS generates a ticket and encrypted using Blowfish encryption. Encrypted ticket is sent back to user. Then, CU sends message to server containing users ID and encrypted ticket. Finally, the server decrypts ticket using blowfish decryption and verifies the user ID. If these two ID gets matched, the CS grants requested data to the user. Experimental evaluation of TH-KBBA mechanism and existing methods are carried out with different factors such as Authentication accuracy, authentications time and confidentiality rate with respect to a number of CUs and data.

URLhttps://ieeexplore.ieee.org/document/8653713
DOI10.1109/I-SMAC.2018.8653713
Citation Keyprabha_tiger_2018