Abstract

Objectives: To measure an accurate trustworthiness of dynamically changing usage patterns of the cloud computing necessitates the mathematical trust and reputation mechanisms along with the high-security remote authentication. Method: As a result, we have proposed an efficient trustee-based methodology that will provide trusted mutual authentication in order to protect sensitive information from the malicious users. The advantage of our scheme is that authentication key credentials and trust and reputation values are never revealed to the Cloud Service Providers (CSPs) and also assist stakeholders to select genuine, appropriate and trustworthy CSPs before registering any cloud services. Findings: In our proposed authentication approach, mutual identity will be verified based on n-party bilinear pairing key distribution and random nonce. Trust and reputation values are calculated using direct evidence, indirect evidence and user’s historical feedbacks. In addition to formulating an effective authentication and an accurate trust and reputation mechanisms, we have analyzed completeness of proposed approaches using Gong, Needham and Yahalom (GNY) cryptographic belief logic and different data sets. Application/Improvements: The performance analysis shows that proposed framework resist from various impersonation attacks and gives better computational efficiency and also results better in fingerprint samples recognition rates than existing schemes. Keywords: Authentication, Privacy, Reputation, Trustee

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call