TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Title | TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Prabha, K. M., Saraswathi, D. P. Vidhya |
Conference Name | 2018 2nd International Conference on 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) |
Keywords | Access Control, authenticated user, authentication, authentication accuracy, authentication server, authentications time, authenticity, authorisation, Blowfish encryption, cloud computing, cloud server, cloud services, cloud user, confidentiality rate, cryptography, CS grants, CU, encrypted ticket, Encryption, genuine user, Human Behavior, Kerberos, Kerberos biometric blowfish user authentication, message authentication, Metrics, pubcrawl, Registration, Resiliency, secured data access, security, Servers, Ticket Granting, tiger hash, Tiger Hash-based Kerberos biometric blowfish authentication, unauthorized users, user ID, user identity, users ID |
Abstract | Cloud computing is a standard architecture for providing computing services among servers and cloud user (CU) for preserving data from unauthorized users. Therefore, the user authentication is more reliable to ensure cloud services accessed only by a genuine user. To improve the authentication accuracy, Tiger Hash-based Kerberos Biometric Blowfish Authentication (TH-KBBA) Mechanism is introduced for accessing data from server. It comprises three steps, namely Registration, Authentication and Ticket Granting. In the Registration process, client enrolls user details and stores on cloud server (CS) using tiger hashing function. User ID and password is given by CS after registration. When client wants to access data from CS, authentication server (AS) verifies user identity by sending a message. When authenticity is verified, AS accepts user as authenticated user and convinces CS that user is authentic. For convincing process, AS generates a ticket and encrypted using Blowfish encryption. Encrypted ticket is sent back to user. Then, CU sends message to server containing users ID and encrypted ticket. Finally, the server decrypts ticket using blowfish decryption and verifies the user ID. If these two ID gets matched, the CS grants requested data to the user. Experimental evaluation of TH-KBBA mechanism and existing methods are carried out with different factors such as Authentication accuracy, authentications time and confidentiality rate with respect to a number of CUs and data. |
URL | https://ieeexplore.ieee.org/document/8653713 |
DOI | 10.1109/I-SMAC.2018.8653713 |
Citation Key | prabha_tiger_2018 |
- security
- Human behavior
- Kerberos
- Kerberos biometric blowfish user authentication
- message authentication
- Metrics
- pubcrawl
- Registration
- Resiliency
- secured data access
- genuine user
- Servers
- Ticket Granting
- tiger hash
- Tiger Hash-based Kerberos biometric blowfish authentication
- unauthorized users
- user ID
- user identity
- users ID
- cloud server
- authenticated user
- authentication
- authentication accuracy
- authentication server
- authentications time
- authenticity
- authorisation
- Blowfish encryption
- Cloud Computing
- Access Control
- cloud services
- cloud user
- confidentiality rate
- Cryptography
- CS grants
- CU
- encrypted ticket
- encryption